Skip to main content

Home/ Globaltech/ Group items tagged use

Rss Feed Group items tagged

anonymous

US water facility 'was shut down by hackers' - Telegraph - 17 views

  •  
    How was the attack done? How did they know an attack happened? Why is this an important issue? Describe a possible solution. all nov 23 Chut
  •  
    How was the attack done? The hackers were able to obtain credentials from a company that makes software used to control the industrial systems. How did they know an attack happened? They knew that there was an attack because one of the pumps that is used to deliver water to the city was turned off. Why is this an important issue? This is an important issue because it indicates the amount of attention the United States government is giving to cyber-attacks. A terrorist attack like the one happened on September 9th 2001 can be said to be the faults of those who were monitoring the cyber activity. If the government aren't able to connect the dots to why they are doing this and the patterns of the attacks it might cause the US to be under attack like what happened over ten years ago. Describe a possible solution. Since that the credential software are saved on the clients' server, the employees can do a part in protecting the software. The staffs can help support the software.
Alex Lenk

Electronic Brain Helps Cut Credit Card Fraud : NPR - 1 views

shared by Alex Lenk on 08 Oct 13 - Cached
  •  
    Da Woon October 10 Brief Article Analysis Answer here.
  •  
    1. Identify the area of impact the scenario relates to. Business and employment, home and leisure 2. Identify the main stakeholders to the IT system. in this article, the credit card user and credit card companies are the main stakeholder 3. Identify and describe one ITGS social/ethical concern in the article. In this article, the social/ethical concern is integrity. In this article, it tells that Credit Card Company uses neural networks to keep track of every purchase people make and sorts them into patterns and categories. If people changed their purchasing pattern, the credit card calls you and ask you about did you really buy it. So, if we buy the computer first time, we changed our purchase pattern, so we are losing our integrity to Credit Card Company. So we are really hard to use our own credit card. 4. Describe ITGS terminology and systems. Transaction - Electronic funds transfer, the electronic exchange or transfer of money from one account to another Software - any set of machine-readable instructions that directs a computer's processor to perform specific operations. Hardware - the collection of physical elements that comprise a electrical device system 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. The one solution in this social/ethical concern would be making a password then using that password with signature to prove our identity when we purchase the product which is not in our pattern such as put our password on our mobile device when we purchasing product with transaction. So we don't need to get the call from Credit Card Company when we purchase the product which is not in our purchasing pattern. Also we can using biometrics on our digital device to prove that we purchase that product when we using transaction to purchase the product.
Alex Lenk

Maybe Your Old Credit Cards Are Smart Enough - NYTimes.com - 3 views

  •  
    Jason October 17th  BAA
  •  
    1.Identify the area of impact the scenario relates to. Business and employee 2.Identify the main stakeholders to the IT system. The main stakeholder in this article is the credit cards company such as, Visa, MasterCard & American Express. The customer how are using these credit cards company service as well. 3.Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in the article is Reliability/ Security. In this article it talk about the old expired credit card that can be re-used again. Unwanted access and get a magnet chip/stripes of a credit card and still use it, to buy whatever they want. The magnet chip/stripes still provide some information of the conventional card. 4. Describe ITGS terminology and systems. PIN- A PIN is a 4-digit number that is used in combination with your Social Security Number, name, and date of birth to identify you as someone who has the right to access your own personal information Chips- is an integrated circuit in which all the components needed for a computer or other system are included on a single chip 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article When a customer uses their credit card to buy product from shops their must type in they PIN to continue the process and if the PIN is enter incorrectly the process cancels. This will allows the original card hold to buy the products only. Dynamics Inc recently unveiled smart-card technology that doesn't require a smart reader but could still require a PIN: the issuer could program the card so that the PIN has to be tapped on special buttons found on the card itself.
anonymous

Egypt's Internet Block Aims at Social Media - PCWorld - 3 views

  •  
    aNt Feb 4 Why did Egypt block the internet? How has the internet supported civil disobedience? What does it mean when the US says social media is a fundamental right?
  •  
    Why did Egypt block the internet? To shut down communications within the people of Egypt to stop them from organizing protests against the government using social networks as a tool of communication. How has the internet supported civil disobedience? Many of the protests were organised with the use of social networks such as Facebook and Twitter, which helped everyone to organise the protest with people they didn't know. What does it mean when the US says social media is a fundamental right? US is saying that social media is a fundamental right, therefore should not be blocked or shut down, because it has become an important source of communication, and people have the right to know what's going on in the world.
anonymous

How to Check if a Web Site Is Safe Video - 5min.com - 7 views

  •  
    Describe the steps for checking the safety of a site. All September 2 Tick
  •  
    - Always check the URL to see that where it take place is logic. - Use site: google.com/safebrowsing/diagnotis?site= then type the name of the site you want to go on after type =. - Use the site: hosts-file.net then type the name of the site you want to go on into the seach box, then it will show you hat is that site is safe. - Use safeweb.norton.com, then type the name of the site you want to go on into the seach box, then it will show you hat is that site is safe. - Also you can use unmaskparasites.com - If you use Mac os or ios you dan't have to care about it because you are safe.
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/ - 4 views

  •  
    brief april 28 jen
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment 2. Identify the main stakeholders to the IT system. Amazon and companies using Amazon's cloud service 3. Identify one ITGS social/ethical concern in the article Reliability 4. Describe ITGS terminology and systems. The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones. Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud. Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers. Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance. http://aws.amazon.com/ 5. If possible, describe a solution to the concern (issue). A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
anonymous

Learning The Right Lessons From The Amazon Outage - 5 views

  •  
    Define: AWS Iaas Define and describe: Free redundancy rapid scalability server failover maintainability Explain each lesson and determine whether you agree or not with each one. May 13 az
  •  
    1) Define: AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3. Iaas - infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention. 2) Define and describe: Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center. Rapid scalability- Scalability approach that doesn't require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes. Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server. Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a "golden image" has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation. 3) Explain each lesson and determine whether you agree or not with each one. Wrong lesson #1 The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical server
kuninari

How the Cloud Democratizes and Complicates Disaster Recovery | PCWorld Business Center - 4 views

  •  
    What is DR? What is problem with Laissez-Faire DR? What are the advantages and disadvantages using cloud on DR? all April 26 Martin
  •  
    What is DR? - Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions What is problem with Laissez-Faire DR? - The problem with Laissez-Faire DR is data loss Laissez-Faire DR can't do anything when you data are hacked What are the advantages and disadvantages using cloud on DR? - One of the advantages of using cloud on DR is it is easy to access. You just need a computer to access your data. - Disadvantage for using cloud on DR is lack of back up. When you lose your data, your data can be lost.
anonymous

Correction: Facebook-Privacy Q&A story - The Washington Post - 10 views

  •  
    How does Facebook use the information people share to make money? Describe the issues that Facebook should address. all Dec 6 cream
  •  
    How does Facebook use the information people share to make money? Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money. Describe the issues that Facebook should address. Issues that Facebook should address include: Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online. Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
anonymous

BBC News - Worm steals 45,000 Facebook passwords, researchers say - 8 views

  •  
    Explain the ways these networks are being hacked. How could you know if your facebook account had been hacked? all jan 17 jang
  •  
    Explain the ways these networks are being hacked. It is explained in the article that these networks are being hacked by using the stole credentials to log into the user's Facebook account. When the hackers logs into the Facebook account, it is used to transmit malicious links to other people such as friends. Friends would be a trustworthy person so the link would be visited. This would increase the speed of the malware's speed. Also, some users use the same password for many accounts which can be used by ill-intentioned people on the web. How could you know if your facebook account had been hacked? For you to know if your Facebook account had been hacked, users should run an anti-virus software to check and get rid of any malware that is hacking your account.
anonymous

Amazon Goes Back to the Future With 'NoSQL' Database | Wired Enterprise | Wired.com - 1 views

  •  
    Describe NoSQL and its purpose. Explain how it is used differently than MySQL. M12 jan30 az
  •  
    Describe NoSQL and its purpose. NoSQL is a highly scalable and reliable non-relational databases designed to maintain high performance and to be highly cost efficient for workloads of any scale, from the smallest to the largest internet-scale applications. It is also used to build a new kind of database for "unstructured" information that comes spilling off the Internet with each passing second. It is capable of handling large amounts of data du to the fact that they use flash storage rather than traditional spinning disks. These solid-state drives can provide single-digit millisecond response times. Explain how it is used differently than MySQL. MySQL database is a relational database that stores data in neat rows and columns, and it's designed to run on a single machine, while NoSQL database can store data in a more flexible way and is designed to scale across a very large number of machines. "SQL databases are like automatic transmission and NoSQL databases are like manual transmission. Once you switch to NoSQL, you become responsible for a lot of work that the system takes care of automatically in a relational database system. Similar to what happens when you pick manual over automatic transmission. Secondly, NoSQL allows you to eke more performance out of the system by eliminating a lot of integrity checks done by relational databases from the database tier. Again, this is similar to how you can get more performance out of your car by driving a manual transmission versus an automatic transmission vehicle." http://stackoverflow.com/questions/2559411/sql-mysql-vs-nosql-couchdb
anonymous

US Report Blasts China, Russia for Cybercrime - ABC News - 15 views

  •  
    Identify the issue and scenario. Describe 3 incidents of cyberattacks by China. List some of the most desired data. Describe how the US is responding to these cyberthreats. all nov 10 kuni
  •  
    Identify the issue and scenario. China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies. Describe 3 incidents of cyberattacks by China. 1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists. 2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company. 3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies. List some of the most desired data. Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts. Describe how the US is responding to these cyberthreats. The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
anonymous

How Do Search Engines Rank Websites? - 4 views

  •  
    Describe the major areas of search engine optimization. m12 nov 10 alec
  •  
    1. Building Quality Back Links to Your Website - the way to a better ranking is to have quality websites link to yours. Such as websites in you niche or social media websites. If your site has these types of links search engines are more likely to give you website a higher ranking. 2. Anchor Text in Back Links - using anchor text also gets you a higher ranking, for example: if you use the URL www.sourcelinemedia.com - then the search engine only sees the site domain as part of its rankings. If you use anchor text such as Website Marketing and Design then search engines will rank you higher for anyone that searches for website marketing or website design. 3. On Page Optimization - Using key words helps to optimize your websites hits during a search. For example a site that has many key words relating to the information in its articles is more likely to get a hit on a search because the words relate to what they are searching. For example if you search Social Networking sites like Facebook, Twitter, and Tumblr would come up as the top few hits.
anonymous

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 10 views

  •  
    List the precautions Mr. Lieberthal takes when visiting China. Define digital espionage. Why is it easy to steal information remotely? How was the US Chamber of Commerce hacked? Explain the reason for thwarting the cybertheft of trade secrets. all feb 16 soo paulo
  •  
    List the precautions Mr. Lieberthal takes when visiting China. * He leaves his cellphone and laptop at home. * He brings "loaner" devices. * He erases information before and after the trip. * He disables Bluetooth and Wifi. * He turns off his phone, and takes the battery out. * He only connects to the internet through an encrypted password protected channel. * He copies and pastes his password from a USB. Define digital espionage. Digital Espionage - The spying on digital information including corporate secrets and government secrets. These secrets are stored as digital data, and can be spied on and stolen. Why is it easy to steal information remotely? Because digital devices today are mostly connected to an internet network, and through this network, information can be stolen remotely if the hacker is able to hack into the system. Smart phones and digital personal devices are very common today. These devices are connected into workplace networks and carry information around. Hackers are able to hack into these devices and get onto the corporate network and steal information. How was the US Chamber of Commerce hacked? The US Chamber of Commerce was hacked through four of their employees, Asia policy experts' devices who travelled frequently to China. The Chamber's office digital devices including its printer and thermostat had a connection to an internet address in China. Through these remote connections to the digital devices, China could penetrate the inside information of the Chamber. Explain the reason for thwarting the cybertheft of trade secrets. Thwarting the cybertheft of trade secrets is to the benefit of the owner of those trade secrets. If cybertheft of trade secrets is not prevented, then other corporations would be able to use stolen trade information to their benefit, and possibly come out with the same product with slight modifications in order to gain more profit from other companies' ideas. This would also ruin the product
anonymous

Google beefs up voice search with personal recognition - 5 views

  •  
    Describe the IT terms. march 29 jenny
  •  
    1.11_people_machines 3.2 _software
  •  
    1. Describe the IT terms. Patented - Granted and protected by rights. A patent is a set of exclusive rights granted by a state, national government, to the inventor for a limited period of time in exchange for a public disclosure of the invention. http://www.whatspatented.com/ http://arstechnica.com/gadgets/ Cloud-based - software systems that based on the cloud (internet) Voice recognition system- computer technology that uses audio input to enter data instead of a keyboard input. Audio input is carried through a connected microphone. The Software is designed to recognize words or phrases with an internal database. The program would then match the audio signature of speech with corresponding data in the database. http://www.wisegeek.com/what-is-voice-recognition.htm Cloud-based voice recognition - The voice recognition software the is important to virtual reality since it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. The audio signals are converted to electrical signals, and then transformed into coding patterns to which meanings have been assigned. Automated voicemail - Automatic voicemail system that stores voice messages. Goog-411 - an automated information service that uses voice recognition to find information for what the caller is asking for on local businesses. This also has a feature to send the information to the caller's phone via text messaging. Goog-411 has provided a foundation for Voice Search (search Google by speaking instead of typing, Voice Input (filling in any text field on Andriod by speaking), and Voice Actions (Controlling Android phones with voice commands). http://arstechnica.com/business/news/2007/04/google-rolls-out-free-411-service.ars Android - Google's mobile operating system (a modified Linux Kernal system). This is the software stack for mobile devices that include the operating system as well as the middleware along with key apps. http://code.goo
Woogyeong Jung

http://www.bangkokpost.com/mail/207851/ - 1 views

  •  
    brief analysis march 23 azman
  •  
    Identify the area of impact the scenario relates to. Health Identify the main stakeholders to the IT system. Patients, Brain Computer Interface, Tridi Identify one ITGS social/ethical concern in the article. Reliability Describe ITGS terminology and systems. BCI- Brain Computer Interface recognizes brain signals and uses them to control electrical or communication devices and can even assist in repairing human cognitive or sensory-motor functions. The technology use sensors to detect brain activity and amplify signals, which can then be processed into messages or commands to aid decision-making. If possible, describe a solution to the concern (issue). The reliability of the IT systems may be a concerned because the IT system may not be able to handle the different kind of disability, because there are many different kinds of disability. Moreover, the current concerns are that the users' lack of strengths. A possible solution for the system is to experiment the system to different people with different needs, so that it can handle different kind of people and their specific needs. A possible solution for the users, is to train them so that they can use the systems for a long time without getting exhausted, because the purpose of the BCI is to be able to use for a long term.
anonymous

Bangkok Post : Leveraging social networks for sales - 4 views

  •  
    What does it mean to leverage social networks? Define digimarketing. Explain the mistakes marketers make with social networking. march 17 nat
  •  
    What does it mean to leverage social networks? To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising. Define digimarketing. Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online. Explain the mistakes marketers make with social networking. Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers. Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
anonymous

http://www.eweek.com/c/a/Security/Senate-Do-Not-Track-Bill-Aims-to-Add-Teeth-to-Web-Pri... - 3 views

  •  
    Why is the US introducing a bill to limit tracking? Explain problems with implementing a no-tracking law. may 17 jen
  •  
    Why is the US introducing a bill to limit tracking? The US is introducing a bill to limit tracking because practically every website you visit keep track of at least some activity for some conventional purposes, while some aren't (such as preventing you to vote twice in a poll). With this bill, the users will be able to have the Do Not Track option while visiting the website. Explain problem with implementing a no-tracking law. The problem with implementing a no-tracking law is that once the law is passed, users will still have a hard time of knowing whether or not a site is tracking them. Not all sites will honor the no-tracking law, and because they don't honor it, they probably won't tell their users' that they're still being tracked, along with what information is being gathered for what purpose.
anonymous

BBC - Newsbeat - HULC exoskeleton system ready for soldier tests - 16 views

  •  
    brief all sept 29 champ
  •  
    1. Identify the area of impact the scenario relates to. Business, government 2. Identify the main stakeholders to the IT system. US soldiers, US Department of Defense(Military), HULC project manager, Lokheed Martin, US Army's Natick Soldier Research Center 3. Indentify on ITGS social/ethical concern in the article. Reliability, People and machines 4. Describe ITGS terminology and systems. Robotic: The technology developed to combine software, mechanical manipulators, sensors, controllers and computers to provide programmable automation. The use of automated machines to replace human effort, although they may not perform. HULC (Human Universal Load Carrier) allows soldiers to carry weights of up to 200lbs (91kg) with little effort and is designed to reduce the strain of carrying heavy equipment which means soldiers can fight in the war very efficiently. Exoskeleton: outer layer that help covers, supports and protect the soldier body.
‹ Previous 21 - 40 of 179 Next › Last »
Showing 20 items per page