Skip to main content

Home/ M2017 ITGS HL section B/ Group items tagged Security

Rss Feed Group items tagged

Varjavand Contractor

Why electronic voting isn't secure, but may be safe enough | The Guardian - 1 views

  •  
    Situation: With countries such as the UK and India already implementing e-voting as their main method of voting for their desired candidates, it is hard not to see that e-Voting is slowly taking the concept of voting for elections, to a new front. Social and Ethical Significance: The article brings to us the example of the 2003 elections in the UK and how e-Voting "failed to make an impact to the people." That was moreover, because there were many people who didn't own a smart device/laptop, and a few didn't even know what the internet was, yet. The Issue with e-Voting then was that it hadn't made the impact because it wasn't the primary method of communication yet. Online voting has been trialled all over the world now, in hopes that it may be implemented in the future. However, developers have claimed that they see major amounts of issues with the softwares and networks/servers that are online. They claim that the reliability and security standards are very hard to meet, when it comes to e-voting systems. Furthermore, they have stated that th requirements are very tough and too high to be met, unlike other transactions. "Online banking suffers problems but refunds are possible after checking your bank statement. You can't 'refund' a vote and 'vote statements' can't be provided to check your vote was correctly recorded as that would enable vote selling and coercion." Stakeholders: Candidates - If the servers are mendled with by a virus or hacker, the results of the ballot could potentially be rigged and the candidate would lose his/her chances of winning the elections. Voters - If the servers are mendled with by a virus or hacker, the voter's vote can potentially be changed, and as a result, the voter feels a loss of security.
willmichael

Hackers into US government websites - 0 views

  •  
    Scenario : At least 22.1 million people that are current or former US government workers since 2001's information was hacked and possibly breached into by hackers who stole the Office of Personal Management (OPM) data. It is believed that China stole this information to increase their collection of data of intelligence on US government employees, according to the article. Social / Ethical Issues : China and hackers now have personal information about millions of Americans which is a big ethical issue because no one knows how they are going to use that information and no one knows how much information they actually got. Also, China could use their newly-gained information against government workers unless the workers release personal government information about the US. This could possibly be a huge problem for the US if China basically uses espionage against US government employees and for their own personal gain. IT systems and things the hackers were able to breach: fingerprints databases social security numbers job assignments performance evaluations records on family members and close friends who were listed on job applications for security purposes financial and health records computer user names and passwords Stakeholders: China - Given that they stole information from the United States government intelligence, their relationship between the US and China will weaken. United States government and citizens- US gov't will now have less trust in China and also have a weakened relationship with China. The United States will most likely also take new security measures to make sure their information is more secure, and United States government workers will now be very hesitant to give out their information.
Emma Wenger

Paper-Based vs. Electronic Voting: States Move in Different Directions - 0 views

  •  
    Scenario: Different US states are taking different approaches to voting. Maryland is enforces paper voting, with some digital use by scanning a copy of each vote to have on record. On the other extreme, Utah Republicans are embracing technology by having everyone vote over the Internet. Social Ethical Issues: Security: James Evans, Utah GOP Chairman, thinks "the risks associated with Internet voting aren't worse than the current system". Learning Curve: Maryland bought new machines for voting and there was some concern about people being confused when using them. IT Systems: Optical scanner for a digital record of votes Electronic Voting Machines Internet Stakeholders: Voters - Do they care about the convenience of online voting or the more reliable security of paper voting? State - Depending on what method of voting, time and money will be used more or saved. Applications to Specified Scenario: The article questions why there is so much concern with voting electronically when we already do so many important things online. We do our banking and buying online, giving out personal information, so why not elections? The article answers, "e-commerce expects and is comfortable with a certain level of fraud. Our electoral process, however, has zero tolerance for fraud". With banking and e-commerce, the costs aren't as high as with elections. Any risks also outweigh the benefits. Elections have also historically never been electronic until now. So there is a certain security and assurance that comes from the traditional paper ballot votes.
Yee Lee Chen

NZ government scraps e-voting trial * The Register - 0 views

  •  
    In New Zealand, numerous security and privacy issues of their e-voting system couldn't be addressed in time for the elections so they scrapped the plan. 2 stakeholders: The people running for elections and the people voting. The turnout of the elections would decide which person running would end up as the local president/prime minister which would also affect the people who voted during the elections. 2 social/ethical issues: If the issues with the e-voting systems weren't fixed by the time of the election, there could have been risks of hacking into the system and purposely altering the votes to go the way of one of the people running in the election. If it wasn't purposeful, there may have been accidents occurring with the system which would cause some votes to be miscounted or counted as invalid which would make it unfair. Possible solution: To help with the security risks, they can implement firewalls and password protection to prevent hackers from accessing the voting system.
Emma Wenger

Meet Wall-Ye: The French grape-picking robot which can work day and night - and may wel... - 1 views

  •  
    Situation: Robots are now being invented to aid in farming. This particular farm built a robot to prune and de-sucker grapes. Social and Ethical Significance: People and Machines - People being replaced by technology is a reality that we must face as it is a reality that we are beginning to see. Obviously when machines replace people, jobs are lost which is never a good thing. But that's not all we should be worrying about. When machines start to perform human tasks, we lose the skill and knowledge that comes with completing those tasks. So technology taking over tasks could either lead to depletion of common knowledge that humans have but it could also go be good because it will leave room for humans to focus on more important issues and knowledge, while machines take care of the mundane chores. IT Systems: GPS Gyroscope - Part of security. The robot knows when it has been lifted off the ground Artificial Intelligence - grape recognition Plant recognition Hard drive Synchronization of cameras Built in security - The robot won't start if it is an unknown area and can self-destruct Stakeholders: Farm Owners - The way their business is conducted could change Farm workers - They could lose jobs or have to learn new ones Robotic Engineers - They are interested in the new technology being used Applications to Specified Scenario: Changing how companies function is only one piece of what technology is changing. Technologies like this robot in the article could be applied to many different areas in the world. One example is security and surveillance. The robot in the article watches plants all day. It wouldn't be hard to alter the cameras to recognize people too. These robots also have tools that they are able to use. Wouldn't it then be possible to give the robots weapons and have them enforce the law? Or go to war? What would that mean for us humans? The upbringing of Artificial Intelligence will induce lots of change and raise various ethical considerati
Omer Shaikh

E-Voting: Big Risks for Small Gains - 1 views

  •  
    Scenario: The article I am analyzing focuses upon the disadvantages brought about by electronic voting. The article attempts to convince the reader that there are absolutely no advantages to e-voting when compared to traditional voting, and the chance of fraud is much higher in e-voting than it is in traditional voting. The article does give credit to the fact that traditional voting, especially in the US, can also be prone to acts of fraud and corruption, however, he seems to be inclined towards this being less likely than the possibility presented by e-voting. Social/ethical issues: The social and ethical issues that show up in this article are primarily security and reliability. The writer clearly does not seem to believe that the e-voting system is too secure, as he often states that there are many ways in which the e-voting system can be cheated and violated. He believes that e-voting often generates results that do not match up with the predicted results from the votes cast. He also does not seem to comfortable with the idea of fully trusting a machine to measure and calculate the result of the votes, as he seems to favor the idea of votes being manually counted and recorded by poll workers. IT systems: E-voting often takes place on a particular website or on a private network which specific voting computers are connected to. Here, voters can verify their identification before proceeding to cast a vote. After the vote is cast, the information is sent to a central server where it is stored and constantly recalculated by the system for an updated vote count. Stakeholders: Regionally, everyone is a stakeholder in electronic voting. All individuals in the particular area are effected by the results of a large-scale electronic vote, as these are usually to decide governmental leaders/officials. Local businesses might be the most impacted stakeholders, because they are heavily effected by the policies and laws that could be passed by the new official,
Omer Shaikh

The societal costs of digital piracy - 1 views

  •  
    Situation: The article focuses on the extent of losses on industries which have been affected by digital piracy, such as major film and music industries. The article states that these industries have taken tremendous hits because their content is simply copied and illegally distributed, resulting in major losses of profit. It says that in our time, it is far too easy to get a hold of pirated content, and as a result, it is virtually impossible to punish every single violation. Social and ethical: The article relates to several social and ethical concerns. It links to security because it states that pirated content can often contain viruses and other forms of malware, and attempting to pirate content means that you are putting the information within your system at risk. Intellectual property is the main focus of the article, which is obvious because it focuses upon the control content creators should have over their works and how this control is violated by individuals who pirate content online. It also links to the issue of digital citizenship in that it seems to set an expectation for users of the online world to be just and reasonable with their activities online. It discusses why it is wrong to pirate content online, which further displays that the writer is trying to indicate the privileges of the digital world and why they should not be misused. It systems: The article does not discuss the IT system behind online piracy. However, it is rather simple. Firstly, original content is published on a domain which is approved of by the author. Often, the author will require money in return for his or her work, and this will be handled by the administrators of that domain. The content is then either bought or hacked by an outsider, and given away for free or cheaper on another domain which has not been approved of by the original author. Outside users may then access this domain and take part in the piracy chain. Application to applied
annaosborne

Cyber Attacks on U.S. Companies in 2014 - 1 views

  • The spate of recent data breaches at big-name companies such as JPMorgan Chase, Home Depot, and Target raises questions about the effectiveness of the private sector’s information security. According to FBI Director James Comey, “There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.”[1]
  • more than 1,000 U.S. businesses have been affected by the Backoff malware, which targets point-of-sale (POS) systems used by most retail industries.[4] These attacks targeted administrative and customer data and, in some cases, financial data.
  • As cyber attacks on retail, technology, and industrial companies increase so does the importance of cybersecurity. From brute-force attacks on networks to malware compromising credit card information to disgruntled employees sabotaging their companies’ networks from the inside, companies and their customers need to secure their data. To improve the private sector’s ability to defend itself, Congress should: Create a safe legal environment for sharing information
  • ...3 more annotations...
  • Work with international partners.
  • Encourage cyber insurance
  • nstituting the right policies is critical to harnessing the power of the private sector. In a cyber environment with ever-changing risks and threats, the government needs to do more to support the private sector in establishing sound cybersecurity while not creating regulations that hinder businesses more than help them.
  •  
    One of the articles for network threats
Yee Lee Chen

Hackers Demand Ransom from British Telecom - 1 views

  •  
    A British Telcom, TalkTalk, was hacked and demanded for ransom. 2 stakeholders: The company TalkTalk and subscribers to the company. The company was hacked for ransom and the data that was hacked were the personal information of the customers of TalkTalk. Issue #1: The hackers have gained very sensitive information such as credit card numbers and dates of birth. Negative: The hackers can use other people's money using the credit card information they received. They can also use the hacked information to do identity theft. Positive: There is no positive side to this. Issue #2: Some users and security experts criticized the company for going public about the hacking before knowing all the details. Positive: The company can use the criticism to help improve their company. Negative: The criticism can also reduce customers and statistics of their shares ratings.
  •  
    Hi, Your post provides good insight to a negative side of the effects technology has on businesses. Both company owners, and customers must be aware of unfortunate possibilities like being hacked. I like how the two issues you addressed deals with both the technological side of things, hackers and what information can be leaked, and the business side, what the occurrence of this event means for the company itself.
ashtonclark

Chinese hackers arrested after US request - BBC News - 1 views

  •  
    Chinese police have arrested hackers after the US government supplied them with a list of cybercrime suspects, the Washington Post reports. The hackers are believed to have stolen research and development information from several US firms. The arrests came shortly before Chinese President Xi Jinping visited the US for talks - partly about cyber security.
willmichael

Electronic Voting Fraud: A Real Threat to Any Democrat Running for President - 0 views

  •  
    Situation : In the United States right now, we are in the process of choosing a new president. For those who do not know, the election process in the US consists of two conflicting opinions of two different parties (Democrats and Republicans.) The Republicans basically believe in lower taxes and less government intervention, while the Democrats believe in raising taxes and more government action. Based on the article, the current state of the US electoral process shows that electronic voting machines guarantee a Republican victory in 2016. Social / Ethical Concerns : Influence on Politiicans - The article claims (this article is VERY pro democratic and VERY pro Hilary Clinton) that the candidate who has the most votes won't in fact win. Rather, the article claims that unless Hilary wins each major swing state by 10% more than the Republican or the corruption of politics with online voting does not end, she will not win. Security issues - The machines may be easy to hack into with the right knowledge and tools, and a hacker could easily sway the country's votes. Influence on People - The best candidate with the most votes from the electoral college should win, so this is a major social and ethical concern because of the idea that America is all about the people deciding the future of the country, and if the right candidate isn't chosen, it could affect our future for generations to come. IT systems flaws: -sometimes the voters don't click on the right candidate and they are mad because the computer won't let them click on the candidate they actually want -machines can malfunction and freeze -some of the voting places are in major favor of one candidate and they may sway the votes after the tallied online -electronic voting machine may not even be present and paper ballots may be used (it's not fair to have some people with paper ballots and some with online voting ballots) -electricity dependency may cause a computer to shut down if there is a loss of power
Emma Wenger

On Instagram and Other Social Media, Redefining 'User Engagement' - 0 views

  •  
    Scenario: Some companies are using people's photos that they have posted on social media sights as advertisements without their consent. Social and Ethical Significance: Privacy - With multitudes of social media sights, individual's privacy is being degraded Intellectual Property - Experts have said, "The person featured in a photo may own the publicity rights, which may give the individual control over the commercial use of his or her likeness" (Ember, Abrams). This goes to mean that companies must have consent from whoever is in the picture before using it in advertising. Policies - Companies like Crocs must have rules in place before exposing people who may not want to be featured in ads. Digital Citizenship - While companies do need to ask for permission to use others photos, people need to understand that by using social media sites, they are putting themselves out there. If they don't realize their privacy is at risk to being disregarded, they shouldn't be using the technology. Possible Solutions are to continue educating people on what can happen online and to create standard policies regarding the need for consent that all companies should follow. IT Systems: Networks Firewalls Servers Web Softwares Stakeholders: People are getting advertised without consent - Their privacy and rights to their pictures are being violated Companies who are using pictures of social media - Who may be blamed for loss of privacy, and gain bad publicity Social Media Sites - Who is the communication between companies trying to find pictures and the people who post pictures Applications to Specified Scenario: People's rights - In the world of technology, we are becoming less and less secure that we have rights to privacy. Everything we do on the Internet is tracked and we don't know who sees it. This article pinpointed how people can be found and unwillingly advertised. As technology continues to grow, more policies and regulations wil
annaosborne

Common Types of Network Attacks - 1 views

  • ome attacks are passive, meaning information is monitored; others are active, meaning the information is altered with intent to corrupt or destroy the data or the network itself.
  • majority of network communications occur in an unsecured or "cleartext" format, which allows an attacker who has gained access to data paths in your network to "listen in" or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise.
  •  
    Article about Network Threats
Noah Weingarden

That ad blocker you love? It's costing publishers a pretty penny | ITworld - 0 views

  •  
    Situation: Ad blockers are becoming increasingly common, and as a result, businesses are rapidly losing revenue each year. Social and ethical significance: As is ubiquitous in the corporate world, businesses and consumers have differing needs and interests regarding their usage of the internet. Consumers want to avoid paying subscription fees and other charges for every single task they partake in on the web, while businesses still need to profit somehow. The response to this over the decades has largely been the rise of web advertisements, which come in many different forms. For a large portion of the internet's history, the vast majority of its users have grudgingly accepted the need for advertisements, seeing how they generally benefit consumers as well as businesses when it allows consumers to avoid paying extra. However, in recent years, ad blockers have become increasingly popular, which provide web users with the ability to hide every ad they see, which of course deprives the owners of the websites they browse from attaining the revenues they would otherwise receive. Naturally, this is a conundrum. Web activities need to be affordable for the average consumer, and businesses need to profit, which is the entire purpose of corporations in mixed economies. Solving this problem will force businesses to devise ways of making advertisements more palatable and less intrusive, and it may eventually result in an outright of ban of ad blockers. The latter possibility would nevertheless cause a huge uproar due to a perceived assault on freedom and individual liberties. It is therefore a solution which would be preferably avoided--ideally, the solution will simply make consumers less apt to even use an ad blocker in the first place without eliminating the presence of advertisements altogether. IT Systems: Advertisements in the forms of videos, pictures, animations, etc. as well as ad blockers in the form of browser extensions and software applications--including mobil
Sagarika Bala Prakash

Billboards That Look Back - NYTimes.com - 0 views

  •  
    An article relating to targeted advertising through the use of installed cameras within billboards. These tiny cameras gather details about passer-by - their gender, approximate age and how long they looked at the billboard. Social and ethical significance: 1)Privacy and anonymity - although Quividi claims that the process is completely anonymous, the details of the camera's recordings must be stored in a central database which, if not protected properly, could be susceptible to hackers and other perpetrators of crime. 2) Security - the safety of the data stored in the central database will be in danger if not properly protected. The data will most likely contain details of a person's identity. 3) Surveillance - the cameras must be connected to a network in order to to function to its full capacity. Once again, these cameras could be hacked into and used for surveillance purposes, which leads back to the issue of privacy and anonymity on the street. The general public, who are one of the stakeholders, are deeply involved in this matter as it is their identity that is being scrutinized by a small camera - in most cases the public are unaware that the billboard is identifying who they are and their presumed interests. The company, Quividi, is another stakeholder in this issue as they are responsible for this new technology. The advantages of this kind of "ultra-targeted advertising" is that companies can now know for sure what kind of advertisements to place and where, without the need of analysing the kinds of people that live in the particular area of interest etc; the camera installed in the billboards have the ability to do it themselves. Also, as the billboard is digital, there is no manpower involved in constantly changing the large billboard every other week or so. The main disadvantages to this is of course the invasion of privacy for the public but also the maintenance that would be required to keep the camera clean as well as updated
1 - 15 of 15
Showing 20 items per page