Wednesday, April 24, 2013

Article 3


Global internet slows after 'biggest attack in history'
Brief description of the situation
The internet around the world has been slowed down in what security experts are describing as the biggest cyber-attack of its kind in history.
Key stakeholders and IT system involved
Five national cyber-police-forces, Spamhaus, Cyberbunker, Sven Olaf Kamphuis.
Related issues of social and ethical significance
Globalization and cultural diversity because all the people are affected by the decreasing of the internet last years. There is a row between a spam-fighting group and hosting firm has sparked retaliation attacks affecting the wider internet.
Areas of social Impacts
Economic because attacks can break down the wall street and other economic business. Political because can cause confusion between governments to know who is attacking.
Evaluating the impacts and conclusion 
The impact is serious because this problem can continue because like you know the technology is improving every single day and the people start to improve their knowledge about anything. My conclusion is that all the companies of security need too improve their software to avoid the spam or some other impacts.

Article 2


Brief description of situation
With mind control, a monkey fed itself marshmallows with a robotic arm. The Lancet describes how a 52-year-old woman a quadriplegic for nine years. Has spent the past 10 months learning to maneuver the robotic arm with her thoughts, allowing her to pick up objects of various shapes, shake hands, and even grasping a chocolate bar and taking a bite. Researchers made technological advances in the past 10 months
Key stakeholders and IT system involve
A monkey that fed itself marshmallows with a robotic arm, The Pitt professor of neurobiology described how the mind-controlled arm works. Jan Scheuermann used the arm and hand to consume the entire chocolate bar.
Related issues of social and ethical significance
People and machines. Because the people creates a computer microchip brain that can control all your body. Also create a robotic arm that you control about your mind.
Areas of social impact
Health. Because you put a bet on a human brain to control, so it is also a robotic arm that can be controlled by the brain, the chip can do damage as this in a very important part of the body.
Evaluating the impacts and conclusion
this is serious because they can manage you in any way. my conclusion is that the responsible from this is the university of pitsburg , the consequences are that they know every state of emotion that you could have just by the chip, is a really bad thing because you are person and you are free in anything you want to do and you dont need to be controlled that a legal problem you can demand the person that insert you taht chip.

Article 1


How hackers can switch on your webcam and control your computer
Brief Description
There was a malicious virus known as Remote Administration tools that it used by hackers to switch on your webcam and start to control any machine without your knowledge. You cannot see what they are doing with your machine.
Key stakeholders and IT system involved
The people involved in this article are the hackers the ones that control the computers, Alex, the security manager from the software company.
Related issues of social and ethical significance
Privacy and anonymity because the hackers can control your computer, and also they can explore all your documents that you don’t want anyone to know about it.
Areas of social impact
Legal because once the hackers enter to your computer they can know all your private things that you don’t one anyone to know it and that makes you to investigate who did that, so you need to follow some rules.
Evaluating the impacts and conclusion
I think that is a serious impact because a lot of they can pass until you know who hack your computer. My conclusion it could be to improve the anti-virus for the computers, so that generate a better security to it. 

Case 1


1.The items of hardware that will need to be purchased are a router or depends on the connection you want to have, you buy something faster than a router, an internet connection via mobile.
2. The items of software that will need to be purchased are: you will need an antivirus if you want to have internet acces beacuse you never know if theres gonna be a virus in the page you are going to navigate or search for information, a good firewall, a navigator like google chrome or firefox.

3.
4.
ANTIVIRUS A ROUTERAN INTERNET CONNECTIONA NAVIGATORA GOOD FIREWALL
IT CAN BEIT CAN COSTVIA MOBILE, IT CAN COSTIT CAN BE FREEIT CAN COST FROM
FREE.FROM 1000Q TOFROM 400Q TO 700Q MONTHLYOR COST LIKE50$ TO 200$ DEPENDING
(PANDA3000Q.DEPENDING ON NAVIGATION.20$.WHICH YOU GET.
CLOUD)(SPEED TOUCH)(CLARO INTERNET ACCESS)(GOOGLE CHROME)AVAST FIREWALL.
5. Its a peer-to-peer connection the one we are going to use for this type of connection and we can use a type of topology that is called a star formation that i can use the 6 or 5 spaces to connect the mobiles, desktop computer and the cellphones.

Types of Networks

Network
Diagram (image)
Brief Description
Main components
Main difference with the rest
Benefits (at least 2)
Local Area Network
http://maribeta.galeon.com/imagen.jpg
Is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.
Network adapter, Network medium, cable connectors, power supply, Hub/switch/router, network software
Is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.
1. Centralized IT administration
2. Reduced operating costs
Wireless LANs
http://t2.gstatic.com/images?q=tbn:ANd9GcQZdFVNXOK1gf4ru08pwSdUWmnUYaCuN2qj_t0OyI0HjAfbMQtA
Links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider Internet.
The mix of location based services and wireless LAN is creating many possibilities for improving security and enabling location aware advertising because of easier installation and mobility.
Links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider Internet.
1.Installation Speed and Simplicity
2. Reduced Cost-of-Ownership
Personal Area Networks
http://www.techfuels.com/attachments/general-internet-terms/1086d1206444362-personal-area-network-personal-area-network.jpg
Is a computer network used for communication among computerized devices, including telephones and personal digital assistants.
PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink).
Is a computer network used for communication among computerized devices, including telephones and personal digital assistants.
1. Benefits from extremely short range.
2. Replacing the cables between a computer and its peripherals, so minimal range is desired to avoid interference with other nearby computers.
Metropolitan Area Network
http://t1.gstatic.com/images?q=tbn:ANd9GcSai7iYOgavscyatLzPnsDwzt2mRxtPSJcHeaPu2wVwyXWpOHpoVQ
Is a computer network that usually spans a city or a large campus.
Usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to wide area networks (or WAN) and the Internet.
Is a computer network that usually spans a city or a large campus.
1. The bandwidth (potential speed) of the connecting links.
2. Some installations allow multiple users to share the same high-speed Internet connection
Wide Area Network
LAN WAN scheme.svg
Is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports.
Relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location.
Is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports.
1. used by corporations or organizations to facilitate the exchange of data between their computers in dispersed offices.
2. All the computers on the network are connected to central database on the server.
Storage Area Network
http://ticostyle.files.wordpress.com/2010/03/san.jpg
Is a dedicated network that provides access to consolidated, block level data storage.
used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices.
Is a dedicated network that provides access to consolidated, block level data storage.
1. Can be easier to manage than other storage systems. By consolidating information into one easily accessible place
2. Increased efficiency.
Virtual Private Network
http://upload.wikimedia.org/wikipedia/commons/thumb/0/00/Virtual_Private_Network_overview.svg/330px-Virtual_Private_Network_overview.svg.png
Extends a private network across public networks like the Internet.
It enables a host computer to send and receive data across shared or public networks as if they were an integral part of the private network with all the functionality, security and management policies of the private network.
Extends a private network across public networks like the Internet.
1.Is a private network
2.All the information keeps in your documents, just for you.
Virtual LAN