Suggest ways to prevent pop-up windows.
Why do travelers are seem to be a good target for hackers?
How did the hackers hack travelers' laptop?
What are the solutions to this attack?
How does the SSL secure the connection?
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites, local media reported Sunday. Photo illustration of keyboard with both Roman letters and Chinese "radicals" or "particles" - parts of Chinese charactures.
Oracle has issued a patch for loopholes in its Java program that was being actively abused by cyber-thieves. The software giant took the unusual step of issuing the patch well before the usual date for security updates. The patch closes loopholes that together left users of almost every operating system vulnerable to infection by viruses.
How does Facebook use the information people share to make money?
Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money.
Describe the issues that Facebook should address.
Issues that Facebook should address include:
Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online.
Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
Explain the ways these networks are being hacked.
It is explained in the article that these networks are being hacked by using the stole credentials to log into the user's Facebook account. When the hackers logs into the Facebook account, it is used to transmit malicious links to other people such as friends. Friends would be a trustworthy person so the link would be visited. This would increase the speed of the malware's speed.
Also, some users use the same password for many accounts which can be used by ill-intentioned people on the web.
How could you know if your facebook account had been hacked?
For you to know if your Facebook account had been hacked, users should run an anti-virus software to check and get rid of any malware that is hacking your account.
Identify the issue and scenario.
Describe 3 incidents of cyberattacks by China.
List some of the most desired data.
Describe how the US is responding to these cyberthreats.
all
nov 10
kuni
Identify the issue and scenario.
China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies.
Describe 3 incidents of cyberattacks by China.
1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists.
2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company.
3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies.
List some of the most desired data.
Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts.
Describe how the US is responding to these cyberthreats.
The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
They intentionally sent a Trojan virus in to try and steel information from chemical and defense firms. They also used a Duqu malware attacks against organizations in at least eight countries.
The Piracy Problem: How Broad?
Why are copyright violations are a serious problem?
Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned.
Describe two advantages and two issues with illegitimate downloading.
Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world.
Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately.
Explain two possible solutions to this kind of piracy.
Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA.
Not enough is being done to tackle cyberbullying, according to the NSPCC.
Give examples of cyberbullying.
Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7.
Describe possible solutions.
Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks.
Trendnet securit
Explain the problem and solution.
How should you Choose a Laptop for Your Small Business?
How can you Recover a Lost Phone, Tablet, or Laptop?
How can you Stop Laptop Theft?
all
march 13
Kevin
Summarise:
Facebook is one of the biggest social network that is used by millions of users worldwide, but recently it has been getting complaints about its security and privacy. Therefore, Facebook is clarifying their policy on User Identification Data, because third party companies are not allowed to share the UIDs it collects to ad networks. Facebook modified its policy to forbid UIDs from leaving third-party applications and for such information to remain confidential. Ad networks had to sign a policy deal to make sure that they delete any information they obtain. Any who break this policy get placed on moratoriums, and will be observed, so that they don't do it again. Not only were the small developers effected, but also big companies such as Zynga were also caught transmitting some information.
Anonymization can be defined as the act of making anonymous onto a person who accesses to the Internet. According JAP as it describes in the article, JAP makes it possible the Internet anonymously. The system is like how you wont get tracked by hackers.
Explain the purpose of this site.
The purpose of this site is to inform users what security related information is exposed by the web browser to any website that the users visited. This website can also be used to judge how effectively your identity is hidden if you are accessing the site via a proxy or a VPN.
What does *) mean?
The items marked with the asterisk will be most likely to be recorded by web servers.
Authentication- Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password.
Tokens- A Hardware Token is an Authenticator in the form of a physical object, where the user's interaction with a login system proves that the user physically possesses the object. Hardware Tokens authenticate users on the basis that only the Token assigned to the user could have generated the pseudo-random number or code response keyed in by the user. Successful entry of this code implies that the user is in physical possession of the Token. This implies that the user does not allow users to use his Token, and has not lost it. It is use to prove one's identity electronically, and it is small enough to put it in the pocket or attach to keychain.
Smart Card-A card with an embedded computer chip on which information can be stored and processed. It is a plastic card about the size of a credit card, with an embedded microchip that can be loaded with data, used for telephone calling, electronic cash payments, and other applications, and then periodically refreshed for additional use.
Biometric- Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.