IoT Leads to Security Threat

The ‘Internet Of Things’ (IoT) is becoming an increasingly growing topic of conversation as It’s a concept that not only has the potential to impact how we live but also how we work. The concept looks at connecting any device and the “ability to transfer data over a network without requiring human-to-human or human-to-computer interaction”. (Rouse, 2016)

IoT allows for virtually endless opportunities and connections to take place, many of which we can’t even think of or fully understand the impact of today. It’s not hard to see how and why the IoT is such a hot topic today; it certainly opens the door to a lot of opportunities but also to many challenges. Security is a big issue that is oftentimes brought up. With billions of devices being connected together, making sure our information stays secure is very important. The IoT also opens up companies all over the world to more security threats. Then we have the issue of privacy and data sharing. This an important topic even today, as we could only imagine how the conversation and concerns will escalate when we are talking about many billions of devices being connected.

Ultimately IoT has a huge impact on our lives. We are also trying to understand what the many opportunities and challenges are going to be as more and more devices start to join the IoT. It’s definitely important to educate ourselves about what the IoT is and the potential impacts that can be seen on how we work and live.

download-2

References:

  • “What Is Internet Of Things (Iot) – Definition From Whatis.Com”. IoT Agenda. N.p., 2016. Web. 19 Oct. 2016.
Advertisements

Anonymous and Cyberwar

Cyber attacks look at socially or politically motivated attacks carried out primarily through the Internet. Attacks target the general public or national and corporate organizations and are carried out through the spread of malicious programs viruses, unauthorized web access, fake websites, and other means of stealing personal or institutional information from targets of attacks, causing far-reaching damage. As these attacked become more prevalent, even discovering the identity of these members are hard to due to a dark fibre referred to as the unused or ‘dark’ network infrastructure. which looks at the a movement involving hackers, botnets and cyberwar.

An example of this refers the organization known as “Anonymous” is perhaps the most prolific and well-known hacktivist group worldwide. It reportedly has been prominent and prevalent in many major online hacks over the past decade. In 2008, they reportedly attacked the Church of Scientology in a massive distributed denial-of-service (DDoS) attack, in which they brought the Church of Scientology’s website to a halt by flooding it with traffic.

“Anonymous” has been linked to attacks on government websites (and specific government departments) as well as the websites of politicians they’ve singled out and targeted. Their work has also been linked to online attacks against PayPal, MasterCard, Visa Card and even the Twitter accounts of ISIS.

In 2010, “Anonymous” activists were behind “Operation Payback,” an all-out attack by piracy proponents against organizations that were opposed to (and tired of) copyright infringement and Internet piracy. And actually, it was an entertainment alliance that struck first, hiring their own hackers to attack piracy culprits and their supporters. Not long afterward, “Anonymous” joined the fray. The full-blown cyberwar turned into a wave of attacks by Anonymous on pro-copyright and anti-piracy organizations, law firms and individuals.

1clnu4.jpg

References:

  • “What Constitutes A Cyber Attack? : Information Management : Public Safety | NEC”. Nec.com. N.p., 2016. Web. 19 Oct. 2016.

 

The Threat of Hacktivism

The rise of the Internet and related technologies brought with it new methods and practices in all areas of human activity, including activism. Activism in particular was affected in two ways. First, new technologies gave protesters a convenient and powerful means to spread their messages and mobilise action globally. And second, the topic of this article, technological innovations gave protesters the ability to employ hacking tools to conduct cyber operations analogous to street protests and sit-ins. This blending of hacking with activism, known as “hacktivism,” has become increasingly prevalent and is now commonplace. Hacktivism is challenging international affairs, not only because it transcends borders, but also because it has become an instrument of national power.

Learning from past incidents is a good way to prepare for possible hacktivist attacks. Over time, hacktivism has evolved into a powerful virtual weapon that can cause massive disturbances that can disrupt day-to-day operations. Examples of this look at companies and organizations constantly updating all IT systems, operating systems, applications, and websites regularly.

Fortunately In 2013, governments were able to clamp down on many hacktivist attacks, which reduced politically-motivated hacks around the globe. However, Hacktivism is still considered a disrupting, if not downright dangerous and harmful, means of sending a message. Regardless of motivation, hacktivists remain as one of the biggest threats to security, shown through the Sony hack last December 2014.

download-1

The Influence of The Hashtag Movement

Since the dawn of social media, sites like Facebook and Twitter have always provided a forum for users to air their opinions and send messages to the world. With Twitter having more than 300 million active users, Twitter has offered no shortage of important things to tweet about — whether it’s a huge win for equal rights in the United States or a tragic attack on freedom in Paris. Through the ups and the downs, the most Twitter influential hashtags show just how important social media has become to modern-day activism. Every second users are sharing messages of support for marginalized groups like racial minorities, and same-sex couples such as #lovewins. Social media platforms like Twitter and the idea of the hashtag have given these groups and their allies a way to network, organise, and express themselves publicly, as well as allowing international populations to come together in support of each other and in protest of radical ideologies. Now, perhaps more than ever, these are the conversations we need to be having — on Twitter and in life.

Examples of this movement can look at the recent success of the #IceBucketChallenge. Over 6,200,000 uses of #IceBucketChallenge on Twitter helped make this awareness campaign so incredibly popular that folks were looking for ways to avoid it entirely. In the summer of 2014, you couldn’t log on to Twitter, and even Facebook or Instagram, without seeing a friend or colleague being doused with cold water in the name of amyotrophic lateral sclerosis (ALS, or Lou Gehrig’s disease) and hoping you weren’t called upon to complete the challenge next, leading the ALS Association raising millions thanks to the campaign.

tumblr_ncxq16qh3i1tp42tfo1_540

References:

  • Sichynsky, Tanya. “These 10 Twitter Hashtags Changed The Way We Talk About Social Issues”. Washington Post. N.p., 2016. Web. 19 Oct. 2016.

Social Media and The Transformation Of Journalism

Citizen Journalism looks at an approach which is defined as “playing an active role in the process of collecting, reporting, analysing, and disseminating news and information.” Through the ongoing advancements in technology and social platforms, a rise in new journalistic approaches have become news culture, giving all individuals opportunities to broadcast real time opinions and information on situations facing the world today. In the simplest of terms “Bridges made of pebbles” refers to the ways in which aggregated social media messages, from sites such as Twitter, when put together can create a story. The pebbles being each of the tweets, coming together to form a suspension bridge to a full story.

As becoming actively involved in content sharing and producing, with social media platforms like Twitter, Facebook and Snapchat reports, it begs the question on the importance of traditional media outlets to feed us news and information when we have access to these social platforms.

Examples of gate watching include the selection and filtering of relevant online and social media information sources and providing direct access to original sources referenced in the journalist’s stories. However, in addition to professional social media search and filtering of available sources, traditional journalistic skills are still necessary in order to glue the curated pieces of information to a story.

The general public has played a fast and important role in breaking the news as social platforms like Twitter are capturing and sharing new events daily. Examples of this can refer to the coverage and breaking on the ‘Boston Bombing’ tragedy. As these events occurred, individuals running and supporting the marathon immediately snapped into action, live-tweeting the action around them as a way to report from on the ground.

 

Screen Shot 2016-05-10 at 7.14.27 pmScreen Shot 2016-05-10 at 7.14.55 pm

Check out this prezi for more information:

http://prezi.com/wszs82dvit77/?utm_campaign=share&utm_medium=copy

 

The Great System Debate

The Great System Debate

Another year, another iPhone. Following new release of the iPhone 7 this week, the classic great debate of IOS vs Android is back. One of the major differences between Android and Apple is the openness of its operating systems. It is very well-known that Apple is very restrictive with customisation and general content, whilst Android is generally more open, to an extent. Personally, having an iPhone myself I could never see me switching over to android. Take one look at Android users snapchats and you’ll probably say the same.  However there are many features that Android offer that I do wish i could get on my iPhone. Although I don’t think going means of jailbreaking is ever a good idea. There is no denying that iPhone has revolutionised way we communicate and use our phones forever. Take the introduction of the new AirPods for example. With the new 7 model, all headphones and earphones are eliminated which forces users to use Apple products over other brands as they are not compatible. This has boomed  Apple to make great profit success leading other companies without option to target iPhone users, making monitoring to obtain their new headphones if wanted to own the newest iPhone model.  

Take  a look at this prezi and we compare the pros and cons of Apple (IOS) vs Android:

http://prezi.com/unz4j871ssjt/?utm_campaign=share&utm_medium=copy&rc=ex0share

 

Protection and The Walled Garden

The term ’Walled Garden’ On the Internet, refers to a browsing environment that “controls the information and websites the user is able to access. This is a popular method used by ISPs in order to keep the user navigating only specific areas of the Web, whether for the purpose of shielding users from information -such as restricting children’s access to pornography -or directing users to paid content that the ISP supports”. It still happening today as schools all around the world have created walled environments for students to do their online learning in a ‘safe’ environment. Although they are trying to create controlled spaces, personally I don’t believe it’s as necessary for particular sites. Remembering back to my days in primary school, even harmless computer games were not approved and blocked for access. Like c’mon I’m sure a harmless miniclip game isn’t going to harm us. However in many ways it makes sense, and gives the institution charged with the child’s welfare, a measure of control. The problem is that where there’s a slightest chance, someone will dive through a loophole to escape those controls, which is what most of us did.

Jimmy Leach of the ‘Daily Genius’ goes on discuss unreality of the ‘walled garden’ approach to digital media in schools. He states that “as they leave the school gates, the filters are off, on their own devices at least, and the internet is there to be explored. They will find some horrors, for sure, and ISPs can do more to protect” . I believe that as students, without having these types of ‘Walled Gardens’ we in term learn to make their own judgements on whether certain content is appropriate – and also whether it’s true, balanced, useful and applicable, which is the same challenge we face at home without these filters. Personally I believe by putting filters between children and content, they don’t learn how to judge the quality of what is in front of them since everything put to them is ‘good’, and without the knowledge of this ‘bad’ content, how will they know it exists.

download

References:

  • Leach, Jimmy et al. “Schools’ Walled Garden Approach To Content Means Pupils Don’T Learn Necessary Skills – Daily Genius”. Daily Genius. N.p., 2014. Web. 19 Oct. 2016.