Why might some people want to use tablets?
They are lighter and easier to carry around than PCs and easier to control because it is touch screen so you don't need a mouse to control the cursor, and just touch the screen. It may not be good for typing up documents, but they are easy for online searches as you don't need to sit down, open the laptop and search, but just do it on the spot.
Describe the following terms and explain possible solutions:
drive-by downloads
clickjacking
targeted brand attacks on social networks
MitB (Man-in-the-Browser)
MitMo (Man-in-the-Mobile)
advanced on-the-fly SSL hacking
may 23
soo
drive-by downloads
Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing.
Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on.
http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledgehttp://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html
Clickjacking
Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users.
A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content.
https://www.owasp.org/index.php/Clickjacking
Targeted brand attacks on social networks
Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
What kinds of passwords do people use?
Check Slate.com, which has created a handy tool to search the database for your username or e-mail address.
What is Farhad Manjoo's advice on creating a superstrong password?
1. Identify the area of impact the scenario relates to.
Business and Employment
2. Identify the main stakeholders to the IT system.
Amazon and companies using Amazon's cloud service
3. Identify one ITGS social/ethical concern in the article
Reliability
4. Describe ITGS terminology and systems.
The hardware used in this situation is the servers used to host information for companies. Amazon's cloud model is used by the connecting to the internet network. The Availability Zones are the zones that according to Amazon, are distinct locations that are engineered to prevent failures in other Availability Zones.
Amazon Web Services (AWS) - Amazon's web service that provides companies with infrastructure web service platforms in the cloud.
Amazon's Elastic Computer Cloud (EC2) - A web service that provides resizable compute capacity in the cloud, designed to make web-scale computer easier for company developers.
Amazon's Elastic Block Store (EBS) service - this service provides block level storage volumes for use with Amazon's EC2 instances. The EBS volumes are off-instance storage that is independent from the life of an instance.
http://aws.amazon.com/
5. If possible, describe a solution to the concern (issue).
A solution to the reliability concern is for businesses and companies to filter out what they plan to put on Amazon's cloud services, and what to keep in their private network within their control. Balancing the two would beneficial and can prevent a lot of damage that a failure of a server may do the company as well as its files and data stored in the cloud. Amazon explaining how their cloud service actually works and have it backs up everything should be able to calm down businesses, and regain their trust again once everything is back up and running again.
"To deliver data analytics at the speed of thought – faster than you can type
– you have to change the interface because it moves so fast," Ellison bragged.
"Before you finish asking a question, it can guess and give you the answer."
1. Building Quality Back Links to Your Website - the way to a better ranking is to have quality websites link to yours. Such as websites in you niche or social media websites. If your site has these types of links search engines are more likely to give you website a higher ranking.
2. Anchor Text in Back Links - using anchor text also gets you a higher ranking, for example: if you use the URL www.sourcelinemedia.com - then the search engine only sees the site domain as part of its rankings. If you use anchor text such as Website Marketing and Design then search engines will rank you higher for anyone that searches for website marketing or website design.
3. On Page Optimization - Using key words helps to optimize your websites hits during a search. For example a site that has many key words relating to the information in its articles is more likely to get a hit on a search because the words relate to what they are searching. For example if you search Social Networking sites like Facebook, Twitter, and Tumblr would come up as the top few hits.
Google operated a crisis response page and a "Speak to Tweet" service that
allowed Egyptians to communicate online via voice telephone in the face of the
internet blackout.
Others, like net activist group Telecomix, were monitoring
amateur radio channels and provided virtual private networks and proxies to
Egyptian activists who required online anonymity.
The people used voice telephone to communicate with each other while the net was down.
Amateur radio channels and virtual private networks and proxies were provided and used by Egyptian activists in order to communicate with each other.
What is DR?
- Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions
What is problem with Laissez-Faire DR?
- The problem with Laissez-Faire DR is data loss Laissez-Faire DR can't do anything when you data are hacked
What are the advantages and disadvantages using cloud on DR?
- One of the advantages of using cloud on DR is it is easy to access. You just need a computer to access your data.
- Disadvantage for using cloud on DR is lack of back up. When you lose your data, your data can be lost.
Who is Julian?
- Julian Paul Assange is an Australian publisher, journalist, software developer and internet activist. He is the founder, spokesperson, and editor in chief of WikiLeaks, a whistleblower website and conduit for worldwide news leaks, with the stated purpose of creating open government.
What is WikiLeaks?
- WikiLeaks is an international non-profit organization that publishes submission of private, secret and classified media from anonymous news sources and news leaks.
Describe cyber attacks
- A cyber attack is an attempt to undermine or compromise the function of a computer based system or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks.
How did politics impact WikiLeaks?
- Protect citizens from knowing the secrets about politics
- They keep find track on information
-
How did WikiLeaks fight back?
- Protesting way back Julian being treated (Letting attacks to each other)
Selected Article
Tablet is becoming more and more popular so it is important for us to know the advantages of this device that a Laptop doesn't have and why is is so popular among users.
1. Identify the area of impact the scenario relates to.
Business and Employment- Online business
2. Identify all ITGS terminology and phrases (IT and social/ethical).
Applications, Internet, UID, network, web, software developers, policy, analytics services, 3rd parties' applications.
3. Describe one ITGS social/ethical concern in the article.
Privacy is the concern in this article because some software developers behind outside applications popular in the online community were "inadvertently" sharing user identification numbers.
4. Describe the relationship of the main stakeholders to the IT system.
The main stakeholder which is the Ad networks is sharing identifying information about users with advertising and Internet tracking companies.
5. Explain the relationship between the IT system and the social/ethical issue identified in question 3.
Facebook (IT system) modified its policy to forbid user identification data from leaving third-party applications and for such information to remain confidential if used by analytics services connected to programs (privacy).
6. Discuss at least one problem that relates to the impacts of the social/ethical issue.
The problem here is that all of the 10 most popular applications on Facebook were transmitting unique user ID numbers to outside companies which violates Facebook's policy: data received from Facebook, including UIDs, cannot be shared with data brokers and ad networks.
7. Evaluate one solution that addresses the problem identified.
Facebook user should have a choice on whether or not to allow applications to get their UID. Facebook should also tighten their policy and make it harder for Ad networks to share UID with third party applications.
What evidence does Google present for Chinese government censorship?
How does this impact the Jasmine revolution?
Describe LinkedIn.
Why was LinkedIn disrupted?
What are the 7 International Safe Harbor Privacy Principles?
Explain the major criticism of this system (International...)?
Explain "self-censorship is a non-negotiable legal requirement".
Explain "China's political elite have a love hate relationship with the internet".
march 25
woo
1. What evidence does Google present for Chinese government censorship?
Google says that Chinese customers and advertisers have increasingly been complaining about their Gmail service in the past month. Attempts by users to send messages, mark messages as unread and use other services have generated problems for Gmail customers. Google shows potential signs that the Chinese government is increasing their censorship by revealing that Gmail's e-mailing system features have been disrupted for Gmail users as well as other Gmail interfaces such as sending e-mails. Google also reveals that the users who filed in these complaints are mostly potential threats to the Chinese government such as the activist accounts also with financial, technology, media and chemical companies users' accounts. Thus, even though there is no concrete evidence, there are signs that are most likely to be linked to the Chinese government.
2. How does this impact the Jasmine revolution?
The move follows extensive attempts by the Chinese authorities to crack down on the Jasmine revolution, an online dissident movement inspired by events in the Middle East. The censorship was supposed to prevent people from getting too much information but instead, this can provoke people to go against the government since people are aware that they have been treated unfairly.
3. Describe LinkedIn.
LinkedIn is a business-oriented social networking site. LinkedIn operates the world's largest professional network on the Internet with more than 100 million members in over 200 countries and territories. The purpose of the site is to allow registered users to maintain a list of contact details of people they know and trust in business. The people in the list are called Connections. Users can invite anyone to become a connection.
4. Why was LinkedIn disrupted?
LinkedIn is business-social networking and Chinese can use this site as the means of evoking opposition against the government. China's president Hu Jint
What does it mean to leverage social networks?
To leverage social networks, is to use social networks in order to promote their product, such as using it as a tool for advertising.
Define digimarketing.
Digimarketing basically is marketing, but based and interacted with the social media. Businesses would do advertising, selling products, etc. online for customers that are online.
Explain the mistakes marketers make with social networking.
Marketers are not using the 'social' side of the social networking sites as an advantage, and just promoting, instead of interacting with their customers.
Like for example via Twitter, some marketers try to take advantage of the 'Twitter trend', and promote their product using the words that are trending, so that more people will see, even though their product has nothing to do with the trending word. This may lead to negative comments from users.
Identify the area of impact the scenario relates to.
Business
Identify the main stakeholders to the IT system.
Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google
3. Identify one ITGS social/ethical concern in the article.
Privacy and anonymity
4. Describe ITGS terminology and systems.
IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
Sources : http://en.wikipedia.org/wiki/IP_address
iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV.
Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers.
5. If possible, describe a solution to the concern (issue).
There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot's websites and videos. Moreover, the US justice system shouldn't give rights to companies to access personal information, because it is basically invading peoples' privacy.