Skip to main content

Home/ M2017 ITGS HL section B/ Group items tagged malware

Rss Feed Group items tagged

Yee Lee Chen

Apple's App Store infected with XcodeGhost malware in China - BBC News - 0 views

  •  
    Apple says it is taking steps to remove a malicious software added to dozens of apps commonly used by owners of iPhones and iPads in China. Stakeholders: Apple and people who use Apple products in China. There was a malicious code on Apple products which affected the company and many people in China who use (among many others) the app WeChat: A very popular chatting app in Asia. Social/Ethical issues: When people start getting messages that makes them reveal their personal information, they would either believe it's important or be suspicious about it. If a friend "asks" for information and you reply to them, to have them later ask you why you told them that, then you are most likely being played and that would cause a lot of panic. I suppose a positive thing that could come from this is that people would be forced to close down the apps and actually talk face to face. This malware would also destroy Apple's reputation somewhat since they were so careless that the app store was infected. But this would have taught them to be more careful, which is a positive thing as it helps them improve. A solution for one negative impact - easily being played into giving out personal information - would be to make sure the person is real or the website or company is authentic. A list of IT systems: iOS Transaction Processing Systems Customer Relationship Management Systems Business Intelligence Systems Knowledge Management Systems [http://smallbusiness.chron.com/types-information-systems-organization-43097.html]
  •  
    Great article choice! What social or ethical impact do you think that this might have towards the people? Other than the obvious impacts of destroying devices, what else could arise from such an issue? Also, how would developers of applications be affected by these issues?
Omer Shaikh

The societal costs of digital piracy - 1 views

  •  
    Situation: The article focuses on the extent of losses on industries which have been affected by digital piracy, such as major film and music industries. The article states that these industries have taken tremendous hits because their content is simply copied and illegally distributed, resulting in major losses of profit. It says that in our time, it is far too easy to get a hold of pirated content, and as a result, it is virtually impossible to punish every single violation. Social and ethical: The article relates to several social and ethical concerns. It links to security because it states that pirated content can often contain viruses and other forms of malware, and attempting to pirate content means that you are putting the information within your system at risk. Intellectual property is the main focus of the article, which is obvious because it focuses upon the control content creators should have over their works and how this control is violated by individuals who pirate content online. It also links to the issue of digital citizenship in that it seems to set an expectation for users of the online world to be just and reasonable with their activities online. It discusses why it is wrong to pirate content online, which further displays that the writer is trying to indicate the privileges of the digital world and why they should not be misused. It systems: The article does not discuss the IT system behind online piracy. However, it is rather simple. Firstly, original content is published on a domain which is approved of by the author. Often, the author will require money in return for his or her work, and this will be handled by the administrators of that domain. The content is then either bought or hacked by an outsider, and given away for free or cheaper on another domain which has not been approved of by the original author. Outside users may then access this domain and take part in the piracy chain. Application to applied
annaosborne

Cyber Attacks on U.S. Companies in 2014 - 1 views

  • The spate of recent data breaches at big-name companies such as JPMorgan Chase, Home Depot, and Target raises questions about the effectiveness of the private sector’s information security. According to FBI Director James Comey, “There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.”[1]
  • more than 1,000 U.S. businesses have been affected by the Backoff malware, which targets point-of-sale (POS) systems used by most retail industries.[4] These attacks targeted administrative and customer data and, in some cases, financial data.
  • As cyber attacks on retail, technology, and industrial companies increase so does the importance of cybersecurity. From brute-force attacks on networks to malware compromising credit card information to disgruntled employees sabotaging their companies’ networks from the inside, companies and their customers need to secure their data. To improve the private sector’s ability to defend itself, Congress should: Create a safe legal environment for sharing information
  • ...3 more annotations...
  • Work with international partners.
  • Encourage cyber insurance
  • nstituting the right policies is critical to harnessing the power of the private sector. In a cyber environment with ever-changing risks and threats, the government needs to do more to support the private sector in establishing sound cybersecurity while not creating regulations that hinder businesses more than help them.
  •  
    One of the articles for network threats
1 - 3 of 3
Showing 20 items per page