Friday, January 28, 2011

Cyber Security

Cyber security refers to the hardware, software and data protection. As I know, there are four types of security attacks: interruption, interception, modification and forgery. Interruption: attacks the availability of the system, it destroys the system and data to make the network stop working. Interception: attacks the confidentiality of the system, non-authorized users access the system through some means. Modification: attacks the integrity of the system, non-authorized users can not only access but also modify the data in system. Forgery: attack the integrity of system, non-authorized users can use the fake data to change data from system.
The book covered wireless security with reference to WEP (Wired Equivalent Privacy) and WPA. It states that WEP was first used in 1999 and by 2001 it was found to have security flaws. Then WPA came out, but because hardware hadn’t been updated yet with WPA security most networks were using WEP, which was insecure and caused major security issues. Nowadays, WEP is still unsecure. It can be hacked in about three minutes. WPA is also unsecure as there are instructions all over the Internet as to what hardware to purchase and what software to download in order to hack WPA but it is still more secure than WEP. So, what is the most secure now? The answer is WPA2. As with all types of encryption and security people are going to try to hack whatever level that is used. WPA2 is the best option in a wireless network as it is more secure than WEP and WPA and less likely to be attacked.

First I will talk about the threat landscape change through years. At first, threats were visible to any one and it was noisy , indiscriminate , disruptive , impact readily visible and it had a small range of threats . However , things have been changed with the pace of the outside network world. Threats are silent and unnoticed , highly targeted and regionalized. Data is stolen and brands are impact unclear . Remediation is more complex and that may need to investigate data leak. There is overwhelming amount of nameless threats and variants. There are several trends which are concerned on the top :Insider threats, industrialized hacking, advanced persistent threats, protecting virtualized environments, enabling the consumerization of IT, leveraging cloud technology, regulatory compliance, ROSI and ROI balance. For example , advanced persistent threat means to access and steal information to achieve competitive advantage on an ongoing and undetected basis . The targets are government , commercial and private sector entities. However, it is still hard to do threats on the network because of the inforensics. It conducts a repeatable and verifiable examination of “the computer”using practices and procedures that are already established . Besides , it can successfully communicate results of the examination to the “trier of fact”,maturing from “black art” to “science”. However, people have different opinions on cyberspace such as “different” from the real world . Because boundaries are invisible , jurisdictions are difficult to ascertain and all crimes can have a cyber dimension . Finally, with the technology continuing to rapidly develop , new technologies will emerge all the time .

Friday, January 21, 2011

Social Networking and Privacy, or lack thereof.

To delve into the discussion about social networking and then gain an understand of both why privacy is so important and why privacy matters to everyone, we need to establish a background for both the definition of a social network and the history of online social networks.
What is a social networking.
Social Networking includes hardware, software, services and applications. It was evolved from the e-mail. Social network site are “web-based” services that allow individuals to…

1: Contact friends and learn about their latest.

2: Record life through photos, and shows this to your friends.

3: Share photos, music and movies with your friends.

4: You can control privacy by yourself.

5: Find old friends, make new friends.

Besides that, social networking is also used for business and education purpose.

History of social networking

SixDegree.com was launched in 1997 as the first social network site and it allowed users to create profiles , create and surf the friends lists . But somehow it failed to sustain its business and closed in 2000 because at that time most people did not have extended networks of friends on line and there were nothing interesting to do after accepting friends’ requests and most people were not fond of meeting strangers .

Friendster was launched in 2002 to help friends-of-friends meet . When its popularity surged , it encountered technical and some serious social difficulties . For example , rapid growth of users was hard to handle and the servers and databases were ill-equipped ; A collapse in social contexts which means users had to face their bosses and former classmates alongside their close friends; a lot of activities were restricted .

From 2003 , many new SNSs were launched . Because most of them were socially organized and took the form of profile-centric sites , some sites which focus on specific audience are beginning to emerge out of the market . Sites were divided into professional ,”Passion-centric” and ”Media-sharing”.LinkedIn , Visible Path , Xing were professional sites.
Dogster , Care2 , Couchsurfing, MyChurch and so on were “Passion-centric” sites which helped people connect based on shared interests . Finally , Flickr , Last.FM , YouTube were “Media-sharing” sites .

My Space was launched in August 2003 when eUniverse employees decided to mimic popular social networking features of Friendster . The number of current users are over 130 million . It ranks 12 in Alexa Traffic and 5 in US traffic .

Facebook is the second most-trafficked PHP site in the world , and one of the largest MySQL installations anywhere which runs thousands of databases . “Thefacebook” were launched in February 4,2004 by Zuckerberg and at thefacebook.com. Then Facebook expanded to Stanford, Yale and Columbia in March 2004 . Facebook also launched a high school version in September 2005 and now it has over 350 million active users .

Twitter began in a “daylong brainstorming session” that was held by board members of the podcasting company Odeo in order to break out of a creative slump .Full-scale version of Twitter was launched in July 2006 .

Whats the big deal about social networks and privacy? There are massive potential dangers in posting to a social network online. People never really realize that what they put out there on the Internet can be permanent and for everyone to see. Employers are perusing the social networks such as Facebook, MySpace, and Twitter to see what current employees are saying, if anything, about their jobs and bosses. Employers also check to see if potential employees belong to a social network and if so, what kind of posts do they have and photos as well.

It also turns out that two-thirds of divorce attorneys are looking online at posts and photos that have been submitted as well. These items can be used in a court of law against someone trying to gain custody of their children or other things.

What is out there stays out there. The Library of Congress archives tweets from twitter. So, the government has a copy of all tweets that are on twitter.

When posting on a Social Network be mindful that others are looking and reading what you say or do or even what people are posting on your page or wall.

It’s not about a popularity contest either to see who has the most friends or the most photos on the net. These things could cause problems with potential employers and schools.

If you accidentally posted something on Facebook that really shouldn't be there you can delete that post. Just go to your wall on Facebook and look for the posting and go to it. Once there on the right there will be an X. Click on this X to remove the posting and then confirm removal. You can also remove other posts by other people on your wall and if necessary mark them as Spam.

It is also a good idea to check the privacy settings in Facebook or any social networking site but especially Facebook. One of the things to be mindful about in Facebook is that applications that your “friends” use can also access your information. So, there is a check-box to disable this feature. It would be nice if Facebook set the privacy settings to the strictest possibility and then allow the user to customize. However, this is not a possibility at this time so it is best to check your privacy settings and adjust accordingly.

The main idea is to be mindful of what is posted on social networks and that there could be potential negative side effects of what is out there. It is a good idea to keep your walls ‘G’ rated and delete potentially negative information. It is also a good idea to never post when you are upset. People often write or say things that they really don’t mean when they are upset. If you really need to write something. Write it on a piece of paper and throw it away when you are done. It’s then over and done with and not publicly available.

Having stated what a social network is, the history of social networking, and the hazards associated with social networking itself, the question now turns to how can we improve online privacy. One idea is to turn the complex list of individual privacy settings into a simpler meter type system (Figure 1 on the right) that Internet Explorer uses to determine the security level(or amount of effort for a hacker...) for securing the browser. There are 4 tiers; high, medium, low, and off.
A similar system for privacy settings on Facebook instead of Recommended and Custom would allow people to quickly and easily configure their privacy to a higher than default settings, without forcing the user to sit down and go through a large list as they currently do (Figure 1 on the left). One of the biggest hurdles to privacy seems to be a combination of Facebook making vague privacy options thus to maximize its advertising profits, and the user being either unwilling or unable to take the time to customize their privacy settings to protect themselves. While this solution may lead to less data for Facebook to monetize, it would help users keep their private lives private, and therefore is an essential step in the evolution of online privacy. Its either that or there will be a rude awakening amongst Internet users when they find out that the services they use are provided by companies that are out there to make money, and that their profiles, pictures, and content is the cash cow and enabler for them to do so.