Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites, local media reported Sunday. Photo illustration of keyboard with both Roman letters and Chinese "radicals" or "particles" - parts of Chinese charactures.
Agree
Agree to some extent. Internet freedom can be sacrificed only to a certain extent to fight piracy. Getting rid of internet freedom is basically the same thing as shutting out the communication lines of the world. The source of the reason why piracy is done is mainly due to the fact that people can't afford the items that they wish to use, or need to use, because they are ridiculously overpriced. These industries don't think that way because they want profit, however, if piracy was stopped, then no one will buy their products anyways because they still can't afford it. Popularity of the product will decrease, and the marketing of the product basically just failed. We need to compromise something so that piracy is decreased until there is no more. But suddenly stopping everything in one shot with something like SOPA isn't the way to go.
Disagree
I disagree. The internet should be free and open. We need to educate people not to download pirated software, movies and music. Doing so is the same as stealing from a shop, which most people would not do. Most people would be prepared to pay small amount for the right to download these things. If governments try to remove websites, it is the same as censorship which sometimes happens in dictatorships but should not happen in free societies. We really need freedom for the internet, so that we can easily share our own ideas, and thoughts. Unlike China, where people can't even talk gossip about governments, which is a basic human right. But China is still very famous for internet piracy. The United States should not have the power to prevent freedom of internet because they are not the world's police force. They should not have the power to dictate what happens in the rest of the world. That's why internet freedom should not be sacrificed.
Describe the kinds of attacks.
- First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages.
Explain the security measures.
- Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
1. Identify the area of impact the scenario relates to. Business and Employment.
2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products.
3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites.
4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities.
5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
1. Identify the area of impact the scenario relates to.
Business, Home and leisure,
2. Identify the main stakeholders to the IT system.
The main stakeholders of the Internet users and the internet advertisement provider (such as Google)
3. Identify and describe one ITGS social/ethical concern in the article.
A social/ ethical concern in this article is privacy. This article refer to advertisement stalking you around and show up in every site that you are in. The concern is privacy because of the tracking of ads on the users. The IT systems uses cookie to track the user. For example if a user open a commercial website such as ebay and amazon the clicking into a certain product will place a cookie onto your web browser. The next time the user open the web browser, the ads will track you around. The companies that it target marketing which shows users the product that they are interest in at the right time. However is it ok for this ads to track the users around?
4. Describe ITGS terminology and systems.
Web browser: a software application for retrieving, presenting and traversing information resources on the World Wide Web.
Cookie: Computing a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
5.Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article.
One solution that can help solve this problem is to install an adsblocker. Advertisement blockers will block the advertisement from showing on the web browsers. However the cookie is still in your computer. Some web browsers or operating system allow the user to delete the cookie on your computer.
Gmail tips summary
Basically, Gmail gives you a plenty of space to storage for example 7 gigabytes for free, which is already a lot. Even though you are running out of the space. You are able to get more spaces for just $5 per year, is quite cheap.
What is so good about Gmail?
The most useful feature is that you can link your other email account, AOL, Yahoo, or Hotmail right away to your Gmail, which means you do need to open up many email to check your Inbox.
a) You can set up filters to skip the Inbox and go right to the folder or a trash can.
b) If you happen to find some information that is quite old, Gmail uses GooGle search engine to allow you to find it easily.
c) Gmail offers " canned message" You can set up a filter so that a certain type of email always gets a canned response.
1. Adjust social-network privacy settings,
You should adjust privacy setting in Facebook by changing the privacy option in Facebook. Facebook updated its privacy dashboard in October, which now, it can change the privacy setting in mobile phone, and you don't have to do it in computer. You can also protect twitter to not let show in the public.
2. Ensure personal data is sent over a secure connection,
You should find if the site is secured enough before giving a credit card number. Make sure the adress shows that the site is encrypted.
3. Consider opting out of ad tracking,
You should get rid of ad tracking by disabling the third party cookies. Now, no one will be able to track your pc.
4. Use private Web browsing features or install a VPN
Install VPN for more strong security for your browser. Such as Little Snich, which gives out a warning sign every time the website automatically changes your settings.
5. Think before you post.
You should always check and think if the site is secured enough to give out a privacy information or post email. You have to be careful to not let hackers get into your computer. And don't give out privacy information even to friends.
1. Identify the area of impact the scenario relates to.
-- Leisure, Business
2.Identify all ITGS terminology and phrases (IT and Social/Ethical)
-- Twitter, Trojan, Facebook, E-mail spamming, Botnet, messaging service, social inbox, spam, e-mail, networks, online-security firms, junk e-mails, blacklisted addresses, output, domain names, .cn, internet registrars, fraud, web-hosting, cybercrime, hard drives.
3.Describe one ITGS social/ethical concern in the article.
--Security is a concern in this article where users and spam is concerned. The security of the users' sensitive information is at risk when users click on spam links no matter from what source, from e-mails (which are decreasing now) to Twitter tweet links. By clicking onto these harmful links, users set free spam that can infiltrate the user's hard drive in search for sensitive information for example bank account numbers.
4.Describe the relationship of the main stakeholders to the IT system.
---The main stakeholder will be hackers and people who are using e-mail and social networking. The relationships between them are, normally hackers used spam mail to spend virus or hack their computer with Trojan horse, but as the email security develop hackers slowly moved to social network which is Facebook, and other many programs. They know that people are currently using social networking a lot and their privacy is open and they could easily get people's email too. Therefore by using Koobface, they could hack people's computer and information
5. Explain the relationship between the IT system and the social/ethical issue identified in question 3.
-- The problem with the security is that the security of the users of their personal and public communications are at risk where spam is concerned. Spam is nowadays being planted in almost every corner of the internet, no matter where, in order to try and trick users into clicking on the harmful links in order to spread malware, such as Trojans. Spam is comm
the ­asocial pursuit of profit is what drives social media
more capricious technology” than radio or television
capricious technology” than radio or television. Neither radio nor TV has
“keyword-based filtering,” which allows regimes to use URLs and text to identify
and suppress dangerous Web sites, or, like marketers, to collect information on
the people who visit them
Does the Net allow more freedom or is it a tool for governments and businesses to control us?
The Net allows both. The users can roam freely to their discretion where and what they want to put onto the web. It is just a matter of a country censoring the content, or the user self-censoring what is to be put on the web. Also, the governments and businesses both can use the Net to their advantage. The government can learn and find out various information of various individuals and trends of the public through the Net's social networking websites and other portal that have discussion between citizens themselves. Business are able to keep track of trends to see what is happening, such as the stock prices to what people like to eat, listen to, what they like to use. Thus the businesses are able to stay in business a little easier through knowing the information from the web. The businesses can also advertise themselves through the net, and that way, it is actually faster than having actual offline campaigns and advertisement.
Therefore, the net can allow us both. We are free to use it more than let it control us. It's just a matter of fact that higher class society, social ranking, or economic status-ed has more chances to controlling the net due to their connections with the higher ups. Yet, censorship and surveillance is everywhere, and thus doesn't allow absolute freedom.
Mashable is the top source for news in social and digital media, technology and web culture started by Pete Cashmore back in July 05. With more than 40 million monthly page views, Mashable is the most prolific news site reporting breaking web news, providing analysis of trends, reviewing new websites and services, and offering social media resources and guides. The site contains various news update blogs in the social media, tech & Gadegets, business & marketing, areas as well as video mobile, dev & design, media, social good, and startups categories.
Who is Julian?
- Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.
What is WikiLeaks?
- WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.
Describe cyber attacks
- A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.
How did politics impact WikiLeaks?
- Protect citizens from knowing the secrets about politics
- They keep find track on information
-
How did WikiLeaks fight back?
- Protesting way back Julian being treated (Letting attacks to each other)
1. Identify the area of impact the scenario relates to.
Business, E-commerce
2. Identify the main stakeholders to the IT system.
Online Newspaper companies, newspaper subscribers
3. Identify one ITGS social/ethical concern in the article.
Globalization
4. Describe ITGS terminology and systems.
- Groupon: a deal-of-the-day website that is localized to major geographic markets worldwide. Launched in November 2008, the first market for Groupon was Chicago.
- LivingSocial: an international social buying company based in Washington, D.C. They specialize in daily deals offered in cities across the United States, as well as in Canada, Europe and Australia.
- TimeLiimited: is a service just like Groupon, which emails its readers on special offers for travel and living terms
The New York Times newspapers are going to start using the internet, and connection of the companies to its subscribers for a fee to their advantage, even though there is a slim chance now. It is the spread of public communication of news, the latest trends, and discounts to events and merchandise while connecting directly to personal communication means of its subscribers (through their e-mails).
5. If possible, describe a solution to the concern (issue).
Straightforward copying Groupon is not the answer for the success online. The New York times might be able to have a chance against Groupon and LivingSocial, but these two big groups have already topped the business of connecting companies with deals to its customers and subscribers for a fee. The companies should be able to manage connection between merchants and their customers. The New York Times would have to come up with special deals that appeal to users, such as a subscription discount, so on, and so forth to grab customers' attention from Goupon and LivingSocial to the New York Time's TimesLimited. The process involves sending people e-mail offers and discounts from companies and service providers, then charging a fee for
Identify the area of impact the scenario relates to.
Business
Identify the main stakeholders to the IT system.
Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google
3. Identify one ITGS social/ethical concern in the article.
Privacy and anonymity
4. Describe ITGS terminology and systems.
IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
Sources : http://en.wikipedia.org/wiki/IP_address
iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV.
Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers.
5. If possible, describe a solution to the concern (issue).
There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.
How does apple propose to solve the tracking program?
Describe two examples of data tracking services that people use.
Do you think privacy is still an issue with phones and apps?
May 17
cream
1. How does apple propose to solve the tracking program?
Apple released newly developed software that cuts the amount of stored data to just a week and no longer transfer it to the owner's computer when the phone is connected. And if users disable the location services setting on their iPhone or iPad, it will stop collecting data completely.
2. Describe two examples of data tracking services that people use.
- Foursquare: Foursquare is a location-based social networking website based on software for mobile devices.
- Mobile Me: Mobile Me automatically pushes new email, contacts, and calendar events to your iPhone, Mac, and PC. So your devices always stay in perfect sync.
3. Do you think privacy is still an issue with phones and apps?
Of course yes because mobile devices are connected to networks for all the time in order to access to files and media. Privacy is always going to be an issue with phones and apps because even though Apple is storing data for shorter time, the stored data can be used or leaked anytime when threats attack.
M13
List and describe the guidelines for PC security.
M12
Describe additional guidelines that should be considered for PC security.
August 31
Chut
Jenny
Additional Guidelines:
Password locking/encrypting important, sensitive information containing files and folders.
Using a proxy or a VPN, to access the internet through the tunnel that can also include encryption. A Proxy and a VPN can scramble your IP address so the website cannot track you.
Types of Securities.
Firewall is a program that protects against intrusions and it helps ensure privacy.
Anti-virus protects against computer viruses. A computer virus is a program that can multiply itself and infect a computer without the owner of the computer knowing or permissions.
Anti-whatever else, malware, adware, spyware, Trojans etc.
Why do you need it?
People should have security programs to protect their computer from viruses or hackers. If you don't have any type of protection for your computer for your computer, your valuable information maybe stolen by hackers or erased by viruses. If you get viruses on your computer, you may need to take it to shops to repair it and need to pay for it.
When do I need to use security programs?
It depends on the activities that you do on your computer.
How can I get viruses?
There are several ways that you can get viruses. Opening attachments from anonymous emails, downloading torrents, movies, pictures, music and porn can give you viruses.
Where can I get the right programs for my computer?
download.com
sourceforge.net
majorgeeks.com
Computer forums
The crime map is a site that shows the amount of crimes committed in an area. The map gives specific information about what kind crime was committed, the location and time of the crime. The site also gives data of places that crimes do not happen frequently. This crime map website can be really useful for avoiding crime scenes and being aware of crimes that are happening in your neighborhood. If you want to move to a new place you can look at the crime map to see if your new neighborhood is safe and crime free. This site is still on beta and only have information on few states in America. I think a lot of people would use this site if it have data for all the countries in the world. However keeping up with new information everyday would be very hard because there are so many crimes happening all over the world and the site would need to be updated every few minutes.
To stop secure certificates means to temporarily stop issuing authentication certificates to secure websites because the certificates have been compromised meaning that people's personal confidential information has been stolen. It was done to investigate the claims of a hacker that he had issued false certificates. It was suggested that personal emails in Iran and government emails in Holland had been compromised, probably for political reasons.