Skip to main content

Home/ Globaltech/ Group items tagged systems

Rss Feed Group items tagged

anonymous

Bangkok Post : Simulation systems could help - 2 views

  •  
    Describe these IT systems: satellite imagery remote systems climate databases Explain how these systems help with forecasting. april 26 soo
  •  
     Satellite imagery Photograph of Earth or other planets made by means of artificial satellites Sources: http://en.wikipedia.org/wiki/Satellite_imagery  Remote Systems System which may be connected to by a local computer by using a modem or network Sources: http://dictionary.babylon.com/remote_system/  Climate databases Climate databases can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage  Explain how these systems help with forecasting By these systems, people can find out the wind flow, geology issues easily and fast. If these systems are developing, the false information will be eliminating. Also it can help authorities evaluate damage more efficiently. Systems using satellite imagery, remote sensing, climate databases and high computing power can predict risk coverage areas by simulating water flows and rain density, with geo-informatics applied to estimate how many households could face damage.
  •  
    1. ITGS 2. Simulation 3. Systems 4. Modeling simulations 5. Database 6. computer 7. network
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

SecurID Company Suffers Security Breach - NYTimes.com - 1 views

  •  
    brief march 29 kuninari
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to the company who are selling product on security to the other company that need a security, and they got suffered. Business 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system are company and government who uses secuID 3. Describe one ITGS social/ethical concern in the article. The Data Breach in this article refers to their security system data being violated by an outside offender, such as it being stolen or copied when it's not supposed to be. The advanced cryptographic system is the security system that has an extra layer of security by an electronic token authenticator that generates a time-based number for the users to input while logging in with their password. It is suspected that the master key for the encryption algorithm was stolen, which is the huge secret number that is part of the system. 4. Describe ITGS terminology and systems. SecurID- a mechanism developed by RSA Security for performing two-factor authentication for a user to a network resource 5. If possible, describe a solution to the concern (issue). The solution for this issue is to update the security system often and try to get against from hackers. Having SecurID make up a new algorithm to be used for the system could reinforce the system's security again, if it's possible to make up a new algorithm. Other than that, SecurID would probably have to make up a whole new security system since their current stolen algorithm is probably going to be published and recopied, and the system not secure anymore.
Alex Lenk

BBC News - Australia's central bank targeted by hackers - 2 views

  •  
    Eun Young  October 17th  BAA
  •  
    1. Identify the area of impact the scenario relates to. The area of impact the scenario relates to is 'business and employment'. 2. Identify the main stakeholders to the IT system. The main stakeholders to the IT system from this article are the RBA (Reserve Bank of Australia) and customers. 3. Identify and describe one ITGS social/ethical concern in the article. The social/ethical concern that has been identified in this article is 'security'. Security refers to the protection of hardware, software from unauthorized access. Security tries to prevent the access by hackers. In this article, the RBA has been hacked (cyber attacked). For an example, the malware has embedded in the emails. They think it is China to blame because they thought that China has already been through a similar cyber attack, which aimed to get the information out of it. The staffs in the RBA have opened several malware emails. This malware application has managed to go through the computer system. 4. Describe ITGS terminology and systems. * Malware: Malware refers to software programs that are designed to damage or do other unwanted actions on a computer system. * Cyber Attack: Cyber attackers use malicious code to alter computer code,logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes (information and identity theft). * Computer Viruses: Small but insidious piece of programming-code that attacks computer and network systems through infected data files, introduced into a system via disks or Internet. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Even though the RBA did not lose any of their information, it's better to have a safe security system/software to protect their information. The RBA needs to be more careful when opening email files, and for a better protection, they would need to find a better way to secure. I would suggest them to have an encryp
anonymous

Google beefs up voice search with personal recognition - 5 views

  •  
    Describe the IT terms. march 29 jenny
  •  
    1.11_people_machines 3.2 _software
  •  
    1. Describe the IT terms. Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention. http://www.whatspatented.com/ http://arstechnica.com/gadgets/ Cloud-based - software systems that based on the cloud (internet) Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database. http://www.wisegeek.com/what-is-voice-recognition.htm Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned. Automated voicemail - Automatic voicemail system that stores voice messages. Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands). http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps. http://code.goo
Azman Fadhilah

FoxNews.com - Uncovered: Images From Full-Body Scanners Hit the Web - 2 views

  •  
    brief jen nov 22
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. People who go through full-body scans Operators controlling the scan machines 3. Identify one ITGS social/ethical concern in the article Privacy 4. Describe ITGS terminology and systems. The systems in this situation include both hardware and software. The hardware is the actual scanning machine while the software is the scanning machine's system that controls whether or not the scanned files of the people passing through are saved into the system or discarded or not. 5. If possible, describe a solution to the concern (issue). Modifying the system to remove the option of saving files could be useful because if the option to save was not present, then it can be assured that the operators do not have the ability to go against the policy. If it is a requirement for the system to need to save files, then the system should be modified to only save files that detect an abnormality that goes against the policy of the scanning. (For example if the scan shows that the person is carrying weapons etc.) Only having the authorized people to view it when it is need with stricter rules.
anonymous

Google accuses China of interfering with Gmail email system | Technology | The Guardian - 4 views

  •  
    What evidence does Google present for Chinese government censorship? How does this impact the Jasmine revolution? Describe LinkedIn. Why was LinkedIn disrupted? What are the 7 International Safe Harbor Privacy Principles? Explain the major criticism of this system (International...)? Explain "self-censorship is a non-negotiable legal requirement". Explain "China's political elite have a love hate relationship with the internet". march 25 woo
  •  
    1. What evidence does Google present for Chinese government censorship? Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government. 2. How does this impact the Jasmine revolution? The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly. 3. Describe LinkedIn. LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection. 4. Why was LinkedIn disrupted? LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
anonymous

Former Gucci Employee Indicted For $200,000 Hack - International Business Times - 1 views

  •  
    brief april 26 az
  •  
    1. Identify the area of impact the scenario relates to. Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce - Electronic commerce, business to sell and buy online electronically. Identity Theft - The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.
anonymous

Bangkok Post : The cloud has been around for a while - 0 views

  •  
    summary about the cloud soo nov 22
  •  
    1. The cloud has been around for a while  Summary about the cloud Many people are doing their own business everywhere around the world and they need something that can communicate with their customers, workers, and many other people. We call these communicating systems as Clouding. For example, currently there is phone call, emails and messaging systems are examples of clouding system. When people are using clouding system, they have to care about backup system to protect their files from losing. To have good clouding system, people need connection of Internet to send or receive their emails with cell phones or laptops. Then people should have their free email accounts like G-mail or Yahoo. Theses free email accounts allow large attachments and people can access theses emails everywhere. Unfortunately, business user who has Google or Yahoo accounts with their company name should pay a small annual fee. These systems are all cloud. People are using clouding computing already.
Woogyeong Jung

http://www.bangkokpost.com/mail/207851/ - 1 views

  •  
    brief analysis march 23 azman
  •  
    Identify the area of impact the scenario relates to. Health Identify the main stakeholders to the IT system. Patients, Brain Computer Interface, Tridi Identify one ITGS social/ethical concern in the article. Reliability Describe ITGS terminology and systems. BCI- Brain Computer Interface recognizes brain signals and uses them to control electrical or communication devices and can even assist in repairing human cognitive or sensory-motor functions. The technology use sensors to detect brain activity and amplify signals, which can then be processed into messages or commands to aid decision-making. If possible, describe a solution to the concern (issue). The reliability of the IT systems may be a concerned because the IT system may not be able to handle the different kind of disability, because there are many different kinds of disability. Moreover, the current concerns are that the users' lack of strengths. A possible solution for the system is to experiment the system to different people with different needs, so that it can handle different kind of people and their specific needs. A possible solution for the users, is to train them so that they can use the systems for a long time without getting exhausted, because the purpose of the BCI is to be able to use for a long term.
anonymous

Bangkok Post : Heads in the cloud - 1 views

  • Tangerine, a reseller of Google enterprise product, says business policies for dealing with cloud computing in Thailand will start to emerge this year
  • The cloud applications specialist has just started providing consulting and selling cloud services for Salesforce.com after providing services for enterprises and supply chains for two decades.
  • The new generation encourages collaboration
  •  
    Why is cloud computing gaining widespread adoption? Why is it cheaper? Describe saas Describe the Tangerine example. What kind of customers does salesforce target? How does cloud computing encourage collaboration? march 17 soo
  •  
    1.Why is cloud computing gaining widespread adoption? Cloud computing is gaining widespread adoption because cloud computing enables users to connect to corporate data and applications via online enabled devices. It offers the complexities and unique requirements of sophisticated applications, yet delivers them in less time and with lower startup costs. 2.Why is it cheaper? Cloud computing is cheaper cost when they deliver IT systems because businesses pay for only what is used and by that they could reduce the amount of cost in capital and operating cost. 3.Describe SaaS. SaaS stands for Software as a Service. Users who use services that is net-based are charged for the software they used, either as a subscription or as a pay-as-you-go basis. It is basically charging the service costs for the software that the users are utilizing. 4.Describe the Tangerine example. Tangerine is a company that sells enterprise version of Google mail and applications. These applications uses Gmail or Google's online document systems as an interface. Users who use Tangerine are charged a subscription fee for the usage of Tangerine. 5.What kind of customer does sales-force target? Salesforce is targeting people who actively use clouding computing system. Basically, it could be individual people but mostly many huge companies are using clouding computing to work efficiently. Also this system could save the money for the storage systems. 6. How does cloud computing encourage collaboration? By using user-friendly services like Facebook rather than conventional e-mail, feeds rather than memos, a touch-based system rather than a click-user interface, a push-based information system rather than pull or browse, location-based technology rather than unknown locations, and web service/HTML rather than Windows or Mac.
anonymous

Bangkok Post : Easing the healthcare burden with technology - 3 views

  •  
    article analysis march 29 soo
  •  
    1. Identify the area of impact the scenario relates to. This article is related to Heath problems 2. Identify all the ITGS terminology and phrases (IT and Social/Ethical) Video conferencing system=A form of synchronous learning in which two or more locations are connected through live video to facilitate collaboration and information sharing, unified communications, Wi-Fi, Mobile IP, RFID, translator, smart phones, Telemedicine, electronic, portable camera 3. Describe one ITGS social/ethical concern in the article. Internet access and privacy problems, digital divide and internet access equality 4. Describe the relationship of the main stakeholders to the IT system. Main stakeholders : doctors, patients Doctors can now look at each patient over the system, without physically being there with their patient. What this basically means that it can input the symptoms of the patient through a computer, rather than writing it up on paper. The advantage of the system is that doctors and patients don't need to travel to each others' place just to get looked at, because it can all be done via video conferencing. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. The issue of reliability is related to the IT System (software and internet) in which the software relies on the internet connection. Therefore, if the internet connection fails to work properly, the software would not be efficient, and thus not reliable. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. The major problem that will arise from the impact of the reliability concern are the patients' lives. The patients lives would be in danger if the doctor diagnoses the illness incorrectly, and prescribes medication incorrectly. Wrong doses of certain medical treatments would be a threat to the patients' lives. 7. Evaluate one solution that addresses the problem identified. A solution that has been done is
anonymous

Corporate computing: Online reputations in the dirt | The Economist - 2 views

  •  
    Explain the issues that are in common with both Amazon and Sony? Explain the reasons that cloud computing will continue to grow? What could have prevented Sony from getting hacked? Describe: Rambo architecture Chaos monkey Explain the reason that data centers for cloud computing need backups? may 9 woo
  • ...1 more comment...
  •  
    incomplete
  •  
    1. Explain the issues that are in common with both Amazon and Sony? Issues that are in common with both Amazon and Sony are their reliability and integrity as well as its security. Amazon has just revealed that its Availability Zone in northern Virginia has failed to accommodate customers that were using their services. Sony's hack incident includes its network protection system to be unreliable. Also the security of Amazon's customer's data along with Sony's online users' data is at risk, as well as sensitive information linked to bank accounts. Both Sony and Amazon suffer a setback on their online reputation. Both companies have their servers down which affect a lot of their customers using their services. They both revived worries about the safety of storing and processing data over the Internet. The two crises have also raised questions about the speed and quality of information provided by tech companies when confronted with systems failures. This further links to the data integrity. Amazon users have said that some data may be corrupted or loss resulting from their sites crashing. Sony's users' accounts data may have been altered by unauthorized people. 2. Explain the reasons that cloud computing will continue to grow? Cloud computing will still continue to grow despite its recent incidents because the benefits users receive outweigh the risks that come with cloud computing. The outage suffered by Amazon has been rare. Also, managing one's own network is hardly a guarantee of reliability; it costs a lot of money and is high maintenance. Cloud computing provides another alternative that can save costs for businesses. Also, the recent incidents have proven that managing one's own network is not as reliable as some think considering protection issues and failure/crashes in the network itself. 3. What could have prevented Sony from getting hacked? Sony could have increased its protection system, as well as create random simulations in orde
  •  
    Tags: 1.1 Reliability and integrity 1.2 Security 3.3 Network
Alex Lenk

The science and technology of air traffic control | Ars Technica - 6 views

  •  
    Da Woon November 1st  Describe the IT system
  •  
    This article tells us the air traffic controller (ATC) which helps us to have safe fly. ATC has access to sophisticated radar systems that provide an overview of the airspace they control, and they have communication tools to coordinate flight paths with the air crew. When the aircraft travel at higher speed than common modes of transport, the time available for pilots to react to a dangerous situation can be quite short. And ATC helps to aircraft approaching an airfield carefully and it checks the weather conditions for prevent pilots can't see other aircraft. ATC uses radar systems positioned at ATC facility to get a real time overview of the aircraft flying in the airspace they control. Many types of radar equipment are served for traffic on the ground. Primary Surveillance Radars (PSR) - The radar sends a directed pulse into the atmosphere, and when that pulse encounters an object it gets reflected back to the radar station. The bearing of the object with respect to the radar station and its approximate distance can be calculated by this. The radar is typically enclosed in a dome to protect it from adverse weather. Secondary Surveillance Radars (SSR) - the Secondary Surveillance Radar listens for messages from the aircraft's transponder. The radar rotates about the vertical axis, but transmits a specific signal on 1030 MHz. This signal is subsequently received by the aircraft's onboard transponder, which responds with a reply on 1090 MHz. SSR Modes - There are different modes of interrogation that compliant transponders respond to. A - The transponder responds with its squawk code, a unique identifier for the aircraft assigned by ATC comprising of four octal numbers. This code enables ATC to differentiate between the various aircraft being monitored, though it can also be used to discretely communicate the existence of an emergency situation onboard the aircraft. C - the transponder responds with the aircraft's pressure altitude, which is the altitude ab
anonymous

BBC News - Facebook profile access 'leaked' claims Symantec - 3 views

  •  
    brief may 17 soo
  •  
    - Identify the area of impact the scenario relates to Home and Leisure, Business and e-commerce - Identify the main stakeholders to the IT system People who are using Facebook, Facebook Company and Application Company - Identify one ITGS social/ethical concern in the article Security, Privacy - Describe ITGS terminology and systems  Facebook Application= Apps on Facebook.com are web apps that are loaded in the context of Facebook. You can build your app using any language or tool chain that supports web programming, such as PHP, Python, Java or C#.Apps on Facebook.com are loaded into a Canvas Page. A Canvas Page is quite literally a blank canvas within Facebook on which to run your app. You populate the Canvas Page by providing a Canvas URL that contains the HTML, JavaScript and CSS that make up your app.  http://developers.facebook.com/docs/guides/canvas/  Symantec= Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.  http://kb.iu.edu/data/agzf.html - If possible, describe a solution to the concern (Issues) Facebook should enhance the security systems and authentication systems. User's personal information was leaked because they didn't work hard to manage transferring user's account to application systems. Therefore, it is better to enhance and put more effort to the transferring process.
anonymous

A Terrifying Threat Obama and Romney Aren't Talking About - Bloomberg - 7 views

  •  
    1. Identify the area of impact the scenario relates to. 2. Identify the main stakeholders to the IT system. 3. Identify and describe one ITGS social/ethical concern in the article. 4. Describe ITGS terminology and systems. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. all: Y1-2 due: oct 18+19 Palm Rot
anonymous

BBC News - Trendnet security cam flaw exposes video feeds on net - 6 views

  •  
    How was the system hacked? Describe possible solutions. all feb 13 hyojeon
  •  
    How was the system hacked? - Shodan search engine which specializes in finding online devices that could be used to discover cameras vulnerable to the flaw. - People set the camera with an own password, it video stream became accessible to anyone who typed in the correct net address. This consisted of the user's IP address followed by an identical sequence of 15 characters. The camera captures people password and IP address. This will invade camera users' privacy. Describe possible solutions. - The Trednet has to foster its network system and try to do their security system that they have to make new firmware and update which resolves the vulnerability of its cameras.
Alex Lenk

Seeing That Ad on Every Site? You're Right. It's Tracking You. - NYTimes.com - 0 views

  •  
    Smile October 28th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business, Home and leisure, 2. Identify the main stakeholders to the IT system. The main stakeholders of the Internet users and the internet advertisement provider (such as Google) 3. Identify and describe one ITGS social/ethical concern in the article. A social/ ethical concern in this article is privacy. This article refer to advertisement stalking you around and show up in every site that you are in. The concern is privacy because of the tracking of ads on the users. The IT systems uses cookie to track the user. For example if a user open a commercial website such as ebay and amazon the clicking into a certain product will place a cookie onto your web browser. The next time the user open the web browser, the ads will track you around. The companies that it target marketing which shows users the product that they are interest in at the right time. However is it ok for this ads to track the users around? 4. Describe ITGS terminology and systems. Web browser: a software application for retrieving, presenting and traversing information resources on the World Wide Web. Cookie: Computing a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server. 5.Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. One solution that can help solve this problem is to install an adsblocker. Advertisement blockers will block the advertisement from showing on the web browsers. However the cookie is still in your computer. Some web browsers or operating system allow the user to delete the cookie on your computer.
Alex Lenk

Would you pay for a good parking spot? | SmartPlanet - 1 views

  •  
    Rot November 5th  BAA
  •  
    Brief Article Analysis 1. Identify the area of impact the scenario relates to. Business 2. Identify the main stakeholders to the IT system. The drivers 3. Identify and describe one ITGS social/ethical concern in the article. Security: The system is currently in Beta, meaning it is prone to security faults such as hacking. This could potentially pose a problem to the users, as their location could get found out (where they live) and the hacker could use this information for potnetially malicious purposes. 4. Describe ITGS terminology and systems. Application: Sotfware that provides an auxillary function to the current IT operating system. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Improve the system's security, or test how well it can hold up against hacking in order to keep the customers safe.
anonymous

On Computers » BACKUP, AND THEN WHAT? - 1 views

  •  
    Describe the IT systems. Az nov 22
  •  
    The IT system in this article is software that lets you restore your whole system back on the old or new computer in case your computer dies. But first, you need a "bootable disk". If your computer won't start, insert the bootable disk and the operating system will find it and start up. Second, you need to backup your computer to an external hard drive or DVD before it died. Then, you can use this software called "Acronis True Image Home 2011" that put Windows and all your programs, files and settings, onto a different computer without any hardware conflicts. True Image also comes with a "Try and Decide" mode where you can try any program that is stored on your external hard drive and decide whether you want to keep it on your new computer. Acronis True Image Home also comes with online backup, which is free for 2gb and it makes a bootable disk for you.
1 - 20 of 99 Next › Last »
Showing 20 items per page