Define:
AWS
Iaas
Define and describe:
Free redundancy
rapid scalability
server failover
maintainability
Explain each lesson and determine whether you agree or not with each one.
May 13
az
1) Define:
AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3.
Iaas - infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention.
2) Define and describe:
Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center.
Rapid scalability- Scalability approach that doesn't require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes.
Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server.
Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a "golden image" has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation.
3) Explain each lesson and determine whether you agree or not with each one.
Wrong lesson #1
The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical server
Iran has been forced to disconnect key oil facilities after suffering a malware attack on Sunday, say reports. The computer virus is believed to have hit the internal computer systems at Iran's oil ministry and its national oil company. Equipment on the Kharg island and at other Iranian oil plants has been disconnected from the net as a precaution.
The Piracy Problem: How Broad?
Why are copyright violations are a serious problem?
Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned.
Describe two advantages and two issues with illegitimate downloading.
Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world.
Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately.
Explain two possible solutions to this kind of piracy.
Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA.
Not enough is being done to tackle cyberbullying, according to the NSPCC.
Give examples of cyberbullying.
Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7.
Describe possible solutions.
Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks.
Trendnet securit
1. Identify the area of impact the scenario relates to.
Business, Home and leisure,
2. Identify the main stakeholders to the IT system.
The main stakeholders of the Internet users and the internet advertisement provider (such as Google)
3. Identify and describe one ITGS social/ethical concern in the article.
A social/ ethical concern in this article is privacy. This article refer to advertisement stalking you around and show up in every site that you are in. The concern is privacy because of the tracking of ads on the users. The IT systems uses cookie to track the user. For example if a user open a commercial website such as ebay and amazon the clicking into a certain product will place a cookie onto your web browser. The next time the user open the web browser, the ads will track you around. The companies that it target marketing which shows users the product that they are interest in at the right time. However is it ok for this ads to track the users around?
4. Describe ITGS terminology and systems.
Web browser: a software application for retrieving, presenting and traversing information resources on the World Wide Web.
Cookie: Computing a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
5.Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
One solution that can help solve this problem is to install an adsblocker. Advertisement blockers will block the advertisement from showing on the web browsers. However the cookie is still in your computer. Some web browsers or operating system allow the user to delete the cookie on your computer.
This article starts with issue of one woman losing her iPhone, which was stolen by someone who lives 20 km away from her. Since there is a app called Track my iPhone, she used this app to go after the thieve and asked for her iPhone back. Not only her who had been finding the thief herself but lots of people are doing it to avoid conflict with the police. This is causing a concern with the police officer because of the increase in phone robbery in many places and if these are gang member, it can cause life to be lost. Even though the police had devoted more resources to combat the theft, but accessibility of police is quite low. Therefore, people usually like to take action alone neglecting the danger that they might find. Therefore, police came up with further and better solution called 'kill switch'. Which automatically make your phone unavailable and unattractive to the thieves.
Mashable is the top source for news in social and digital media, technology and web culture started by Pete Cashmore back in July 05. With more than 40 million monthly page views, Mashable is the most prolific news site reporting breaking web news, providing analysis of trends, reviewing new websites and services, and offering social media resources and guides. The site contains various news update blogs in the social media, tech & Gadegets, business & marketing, areas as well as video mobile, dev & design, media, social good, and startups categories.
I might use Adobe Buzzword, BibMe and 4 shared. For example Adobe Buzzword is helping me to write document on desktop therefore I can prepare my report or essay perfectly with free cost. BibMe is making citations in MLA format automatically so I don't have to spend my time writing and sort out about citation formatting. 4 shared is good program which gives all users free 5 GB of storage. So that I can save my work and I don't have to bring my USB all the time and if there is internet access, I can access to the internet and work on my work which saved in 4 shared.
1. Identify the area of impact the scenario relates to.
The area of impact the scenario relates to the company who are selling product on security to the other company that need a security, and they got suffered. Business
2. Identify the main stakeholders to the IT system.
The main stakeholders to the IT system are company and government who uses secuID
3. Describe one ITGS social/ethical concern in the article.
The Data Breach in this article refers to their security system data being violated by an outside offender, such as it being stolen or copied when it's not supposed to be. The advanced cryptographic system is the security system that has an extra layer of security by an electronic token authenticator that generates a time-based number for the users to input while logging in with their password. It is suspected that the master key for the encryption algorithm was stolen, which is the huge secret number that is part of the system.
4. Describe ITGS terminology and systems.
SecurID- a mechanism developed by RSA Security for performing two-factor authentication for a user to a network resource
5. If possible, describe a solution to the concern (issue).
The solution for this issue is to update the security system often and try to get against from hackers. Having SecurID make up a new algorithm to be used for the system could reinforce the system's security again, if it's possible to make up a new algorithm. Other than that, SecurID would probably have to make up a whole new security system since their current stolen algorithm is probably going to be published and recopied, and the system not secure anymore.
1. Identify the area of impact the scenario relates to.
Security
2. Identify the main stakeholders to the IT system.
The hacking group which is called 'Turkguvenligi' and seven victims (Sites)
3. Identify one ITGS social/ethical concern in the article.
Privacy and anonymity
4. Describe ITGS terminology and systems.
URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web.
DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs.
NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP.
NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite.
SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose,
SELECT count(user_id) from USER_TB where user_id='test' and pw='1234'
(Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack.
5. If possible, describe a solution to the concern (issue).
Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
1. Identify the scenario.
Business
2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article.
Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites.
3. Describe the IT concepts and processes.
Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website.
IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location.
(DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.)
SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed.
http://msdn.microsoft.com/en-us/library/ms161953.aspx
4. Explain the relationship between the IT system referred to in the article and the concern presented above.
The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database.
5. Describe and evaluate the impact of a social/ethical issue on the stakeholders
The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT.
6. Explain and evaluate one solution to the issue identified.
A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
1. Identify the area of impact the scenario relates to.
Home, business
2. Identify the main stakeholders to the IT system.
Facebook, Websesnse, Facebook users, Malicious web developers
3. Identify one ITGS social/ethical concern in the article.
Reliability
4. Describe ITGS terminology and systems.
URL: llows all resources on the internet to be located in a uniform manner. A URL is a website address that has all the pertinent information for finding the exact location attached to it. (E.g.WWW.facebook.com)
Database-driven: Web pages that store information in their database.
Phishing: Tricking Internet users into providing personal data for malicious or fraudulent use.
1. Identify the area of impact the scenario relates to.
Business and employment
2. Identify the main stakeholders to the IT system.
Gucci, employees
3. Identify one ITGS social/ethical concern in the article.
Security
4. Describe ITGS terminology and systems.
Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
http://www.webopedia.com/TERM/V/VPN.html
Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose.
http://www.wisegeek.com/what-is-computer-hacking.htm
Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer.
http://www.webopedia.com/TERM/V/virtual_server.html
E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network.
Ecommerce - Electronic commerce, business to sell and buy online electronically.
Identity Theft - The stealing of and ID, or impersonating a fake person.
5. If possible, describe a solution to the concern (issue).
Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
Explain the meaning of the following guidelines:
Do you check the validity of site certificates when sending sensitive information to another website?
Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site?
You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary.
may 9
cream
Explain the meaning of the following guidelines:
Do you check the validity of site certificates when sending sensitive information to another website?
It is about checking the validity of site certificates for guarantee myself that I sent sensitive information to real and Safety Company.
Do you check for locks (bottom right browser status line) or the notation that the site is secure (https:// = secure = lock in status line) prior to entering sensitive information to that site?
This action is when you see a green lock in the URL space of web browser such as hotmail.com, which it says about US privacy and stuff. Https codes help you know that you are transmitting via a safe system. If the padlock is open, do not transmit sensitive information!
You must safeguard your information if you are going to store it on your computer. However, if you must store personal information on your computer, encryption is necessary.
It is best to ere on the side of caution and use encryption to not only protect the data but also protect yourself
* Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms.
* Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers.
* Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis.
* Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose.
* Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers.