Monday, March 11, 2013

Cybercrime

http://news.cnet.com/8301-1009_3-10235083-83.html

4 comments:

Jonathan said...

Criterion A
Describe one social/ethical concern to the IT system
- Security is the social/ethical concern because it creates issues about search engines’ security dangers, and how secure is out computer from the spreading of malware from search engines.

Describe the relationship of one primary stakeholder to the IT system
- Users will receive malware from the fake search engines through the internet when they search through the fake search engines using internet and network the malware will be transferred to their computer and it can damage their computer.

Criterion B
Describe, step by step, how the IT system works
- Creator of the search engines embed the malware on the search engines
- Internet users use the search engines
- Internet user receive the malware
- Malware break through the anti virus
- Malware damage the computer system
- Files will be corrupted
- User will have to rely on their back up storage system



Explain the relationship between the IT system and the social/ethical concern described in Criterion A
- The search engines have spread malware through the search engines by users using the internet and network to search through the fake search engines and computers that do not have a good anti virus software will receive the malware and it will damage the computer’s system.



Criterion C
Evaluate the impact of the social/ethical issues on the relevant stakeholders
- This fake search engines consist of malware that can damage the computer system. This brings disadvantages to the internet users because they must have an good anti virus software, also they also must be aware of the fake search engines system and not using the fake one. Moreover, internet users that uses the search engines can have their computer system being damaged and losing all their files. The advantages for the internet users is that now they learn to be more aware of fake websites and softwares on the internet and that they need to use antivirus to keep their computer safe.
Creator of the fake search engines will have advantages through this fake search engines is that their goal will be accomplished by making other people fall into their trap and receive the malware. They might be able to control the users computer and went through the files. The disadvantages of the creator of the fake engines is that, they can be caught and bring through prison, moreover, get sued.

Criterion D
Evaluate one solution that addresses at least one problem identified in Criterion C
- One solution that could be used is that the domain host must check the website first before people posting their website online. The domain host should also have a monthly check that the websites do not consist any viruses. This will bring advantages to the internet users, so they will not receive any malware when searching through website on the internet. It will prevent from crime to happen and internet users will have more security provided from the domain host. However, this has a disadvantages to the domain host because now they will have more work and might cost them more to have people checking on every website that could be a threat.

Darian Hartanto said...

Criterion A:

a. Describe one social/ethical concern related to the IT system in the article

There are security issues involved in this article. If people managed to use search engines and hackers manipulated it somehow, where it leads to pornographic sites instead. That means that it’s either whoever is taking care of these search engines does not put in enough effort or that hackers are getting smart throughout the century and can overwhelm the security websites.

b. Describe the relationship of one primary stakeholder to the IT system in the article.

The one who controls these search engines are affected heavily. Because hackers that managed to take over their search engines will cause the end – users to spark complaints about the reliability of using these engines as well as questioning the security effectiveness of their search engines.

Criterion B:

a. Describe, step-by-step, how the IT system works.

Hackers went into the search engine and analyze its components. They then use certain illegal software and programmed computers to break down these search engines embedded code. They then messed the code and website links, and what to do next is that they have to replace the original search engines with the ‘messed up’ one.

b. Explain the relationship between the IT system and the social/ethical concern described in Criterion A.

If the hackers managed to break through the company’s search engine, and replace the original one engine with the modified one. That means that it’s either that the security system to protect search engine is not effective enough or that hackers are smart to be able to break through a company’s search engine, thus there are issues involved in the security system of the search engine.

Criterion C:

a. Evaluate the impact of the social/ethical issues on the relevant stakeholders.

With the security system breached by hackers, companies will start experience liabilities. Because end – users are not satisfied with the outcome, links to the websites are always wrong, anything that went wrong with the search engines.

But with this company can reflect upon their security system to protect their search engines, they can come up with a much more effective and complicated security system that hackers will have a hard time to break through.

But it seems that there will be much more trouble within the disadvantages and the issues involved in this article, as hackers are extremely smart and managed to get around somehow.

Criterion D:

a. Evaluate at least one possible solution that addresses at least one problem identified in Criterion C.

It’s possible that hackers have an inside man that allowed them to take the folders and mess the whole search engine up. To reduce that chance employers needed to be questioned from time to time, and their bosses have to notice if something is suspicious.

This solution can be classified as ‘stupid’ because it’s immensely difficult to find out how to recognize the culprit behind the curtains. And that question employees from time to time also looks stupid enough.

Yohan Hur said...

1. 4 Marks
a. Describe one social/ethical concern related to the IT system in the article.
b. Describe the relationship of one primary stakeholder to the IT system in the article.

One social/ethical concern that is related to the IT system in the article would be security. Why? Because now, when we’re trying to find some information that we want to find out, like the example flu statistics, the search engine will show some links to a problematic websites which will take some of our information. Because, they ask us to download some new application but in the application, there’s a thing that’ll take important information that’s contained in our computer. One relationship between the primary stakeholder and the IT system would be that they’re now opened to the hacker’s computer. Which means that the hacker can now open the primary stakeholder, Which in this case is us the users and take our important data that we save in our computer/ other IT system.

2. 6 Marks
a. Describe, step-by-step, how the IT system works.
b. Explain the relationship between the IT system and the social/ethical concern described in Criterion A.

First, the hackers would create unimportant link which has a interesting article title and a good description, like how it’s shown on google. Next, they’ll make us download some file ( usually like flash player or so ). But, instead of actually downloading the file, we also download virus together with the file which later, the virus, would go around our computer and start digging out more and more information that’s saved in our computer. Such as in our browser or anywhere else. The relationship between the IT system and the social/ethical concern in Criterion A is that with these virus, the hackers can get in our computer and achieve datas that they wanted.

3. 8 Marks
Evaluate the impact of the social/ethical issues on the relevant stakeholders.

People and machines : The hackers are using machines to help them obtaining our important datas. Using viruses to find our data and send it back to them without us knowing it.

4. 8 Marks
Evaluate at least one possible solution that addresses at least one problem identified in Criterion C.

+ Google should filter out each website that they want to show on their search engine.
+ Google should be more protective, protecting their users from these viruses

Nadia Hudiana said...

a)

Describe one social/ethical concern related to the IT system.

Security. How reliable is the internet in providing security for its users?

Describe the relationship of one primary stakeholder to the IT system.

The users are attacked by viruses from fake internet sites that are built to spread virus to user's systems.

b)

Describe step by step about how the IT system works

1. Hackers upload these viruses from through the internet.
2. Hackers build a system on the site that are ready to attack anyone's system whenever they open up the site. It is connected with the hacker's PC to transfer the viruses every time they have a visitor
3. The site will directly detect the IP address of the visitor.
4. Next they will transfer the virus through the network to the user's system.
6.If the user does not use norton or other anti virus softwares than the virus would directly damage the system.

Explain the relationship between the IT system and the social/ethical concern described in Criterion A.

The viruses spread through these sites are going to damage the system and although its aim is the users' system however the presence of these websites on the internet could also damage the internet itself. By this it means that it does not only damage the security of the users' system but also the internet as another impacted stakeholder in this case.

c) The impact of social/ethical issues on stakeholders.

Security is the major social issue in this. It does not only damage the system of the stakeholders, but these viruses also lead users into the lost of trust upon the internet and also the platform they are using, whether it is too vulnerable or not. For example Windows tend to be more attackable by viruses such as Trojan Horse, etc. where areas mac book are known to be more virus free. However to what extent can we trust this statement? With the excalating number of the hackers spreading more and more viruses around, it means that more and more people have knowledge about all this which doesn't limit the fact that they would as well be able to develop worse viruses over and over again. Especially if this becomes a trend, then there would be more and more website which are set up like this. Then how can the user know which are safe and which aren't? This leads to the social and ethical issue human and machine. IT devices were purposely invented to make our lives easier, however we as humans tend to take advantage of people's positive inventions and misuse them for their silly acts. I think it also refers to protocols where I see the internet as not meeting the standard of being able to always update itself to avoid internet issues like this that would bring negative impacts to the users.

d)

A solution to a problem arising from the article:

The internet should definitely make strict policies and regulations for all internet users to use it for positive purposes. They should definitely start to treat hackers seriously by bringing their acts to court for it has violated the positive purpose of the internet. This would hopefully reduce the amount of hackers each day. Another thing is that the internet itself should always update and be aware of these viruses and other problems that occurs in its system and those which could as well be transferred to other IP addresses and the system connected to it (The users' pc). One last thing is that as the primary stakeholder of this, users should be more concious about how serious the works of hackers are getting and that the number of these hackers are increasing. This means that there are greater chances to meet cases which could harm the IT system of their personal devices.It is also their responsibiity to do as much as they can from their side in protecting their systems through always updating anti virus softwares.