- this technology is that the normal video communicate that by the internet to connect to each other. For example, Skype, or Facetime etc.
Advantages and disadvantages.
- The advantage is that when children want to learn some music but parents don't have time to drive them to the music school, they could have lessons at home which is easy to do.
- The disadvantage is that we need many thing to learn via computer, for example, webcam or video camera, good quality speaker, good quality microphone etc.
1. Identify the area of impact the scenario relates to.
Business, Goverment
2. Identify the main stakeholders to the IT system.
Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows
3. Identify one ITGS social/ethical concern in the article.
Security
4. Describe ITGS terminology and systems.
SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery.
Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data.
DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations.
HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems.
5. If possible, describe a solution to the concern (issue).
Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo