This is when people make a
website become unavailable. It all starts when the person trying to destroy the
website sends a fake email to a computer user asking for approval by asking
questions and then the computer user sends something back it allows the person
trying to make the website unavailable access to the server to disable the
website. There are several reasons why these types of attack might be made.
This includes an example like; a criminal might attempt to blackmail an online
retail company by threatening to attack the site unless given a large sum of
money. I personally think this is cruel and greedy over money. Sometimes
political sites are attacked in this way by people who don’t agree with the
political views expressed on the sites.
Impacts of ICT
Wednesday, 14 November 2012
Threats:
like cyber bullying, spam and phishing often are
received by people through their email accounts to access through their id or
bank accounts. Phishing for example is a fake ad or webpage created by hackers;
it could be a fake Halifax bank saying you need a new username or something to
do with personal information others so the hacker can easily obtain the persons
information, and with the information the hacker can easily access personal
stuffs like bank number, bank pin and take all the money or in other ways harm
their businesses. Cyber bullying which often happens to youngsters who spend a
lot of time on social networking. People they might not know can easily offend
or change their thoughts or opinion and without being aware it could harm them
as well. Few ways to be protect from threats are browsing safely, spyware and
be aware.
Abuse:
The term
abuse describes unauthorized activity that affects the integrity of computer
resources and email or other electronic accounts. Not all but often some people
are abused or cyber bullied on social networking sites by others who maybe
people they don’t know and could affect their feelings or opinions. Recently
tom Daley was abused in twitter by an unknown teenager on suspicion of
malicious communications about his father. Things like this often happens in
such situation but some sites provide a report button where they can report
apparent abuse and also provides a few answers to questions about these
situations and describes ways you can protect yourself from abuse.
Unequal access:
like I mentioned earlier, a rich or developed
country can afford to buy and use internet to quickly share data as some
countries can only afford on basic survival. Many people who live in rural
areas of UK do not have broadband internet access this could be due to less
population around the area; because of this it’s more expensive for the
government to give a strong access of internet to the community. Whereas cities
where there is more population seems to have stronger network as many people
would be using it and the government can make easy money. The one laptop per
child project is a global implication as it is a project of non-profit
association to create educational opportunities for the world’s poorest
children by providing each child with a low-cost laptop. Their goal is to
provide children around the world with different opportunities to experiment
and express themselves.
Monday, 12 November 2012
Ethical:
online privacy is probably what most people are
concerned about nowadays as computer store our data and because of what it
stores it many of consumer worry. They fear that an unidentified hacker will
access their online information or intercept their credit card numbers and make
unauthorised purchases. Companies doing business or marketing research have a
fear that others will use the internet to invade their computer systems for the
information or even sabotage. In that case internet security like northern
security was programmed in order to stop the hackers and viruses from getting
in to the file, but it seems that there is an ingoing competition between the
technology of internet security systems and the hackers those seeking to break
them.
Friday, 9 November 2012
Legal Impacts:
Business’s
organisations also the government started using computers to store their
information about the customers, clients and staff in databases some for
example: name, addresses, contact information and credit history. The problems
with computers are that they can easily be assessed and databases are a part of
that and can be looked, searched and edited. Due to this it was way easier for
everyone to share information and access it around the world. Copy right for
example recently Samsung was fined £1m because they made a similar phone
as apple’s iPhone which was then looked
at because things did match like applications and internal system due to this
Samsung was charged for having no copyright permission to build a similar
phone. Same with ownership because in another word it’s the person who owns
something for example just like a song, music, video and other works they would
need to know who and when or maybe in some cases asked questions or could end
up as illegal right.
Economic Impacts:
The impact that IT has brought to the world for example;
online shopping, internet shopping is very quick and allows people to shop from
their favourite designer stores without even having to leave the house and due
to this there is a reduction of customers in the actual street and because of
this there is no economic reason for them to stay open. This could have a
negative effect on the local community because there is a less range of shops
for local people to enjoy. Therefore internet shopping will eventually put away
the need for high street stores. Another impact is most products consist of
large number of different components for example: microchips, semiconductors,
printed writing boards and batteries. The manufacture of many of these
components has important environmental effects .the production of
semiconductors for example; causes significant amounts of air pollution, water
emissions and wasters. The productions of other components has an equally a
matter of environmental concern.
Subscribe to:
Posts (Atom)