Name Brittany Murphy Class
time: 11 am
Author: Sara Baase
Date of Publication:2013
Book: A Gift of Fire
Sections read: 5.1-5.3
1. (Questioning) After reading this chapter/article
what relevant question do I have?
I remember once reading of the Google Wallet, how safe is that?
2. (Knowledge)Tell three interesting elements of
this chapter:
a. The Average loss from a computer fraud is more than $100,000
b. People have been hired by companies that they have hacked into the systems off.
c. There are actual websites referred to as 'honeypots" where governments study hackers habits.
3. (Comprehension) Summarize what is being
discussed within this chapter?
With the beginning of the Information Age came a new age of crime. Instead of directly stealing from people or establishments, there is now the capability to do it remotely without ever seeing the people that you are stealing from. Along with that, moving all of our confidential information online has posed the issue of hackers being able to reach it. Lastly, what should the punishment be for those who illegally access information? What if it was for entertainment or to aid the company? By a minor?
4. (Connections) How does one element in this
article specifically relate to Postman (or at times I will ask you to compare
to a different article read in class- edit as appropriate)?
Postman had said that technological change is ecological in that once it is implemented it will effect everything, even the unexpected. Nobody ever expected that the internet would pose such problems when it was implemented, yet we are seeing more and more risks associated with our use of technology. With those risks though, there are benefits. For example hackers can actually have the best interest of the people in mind. For example, anonymous is a loosely organized group of hackers who have defended victims of suicide and made the American people aware of their governments action, as the latter is demonstrated in the video below.
5. (Application)
Name a specific example or NEW solution for this type of problem/similar
situation in society or that you have experienced – be specific and explain?
Google Wallet, although has not taken off as expected is a technology of the future that poses many questions. Google Wallet is a technology that allows the user to store their credit cards, gift cards and other information digitally within its program for use at physical stores. According to this article anybody can hack into a Google Wallet account by simply clearing the users pins. If it is this easy for the average person to do, imagine the field day that an established hacker could have with this technology? It could be dangerous, and as with any new piece of technology there are many unknowns to contend with.
6. (Analysis) Compare one of the situations in this
chapter/reading to something that does not relate to computers, technology, or
the Internet? Be sure to reference the chapter and your solution. What ideas
NEW can you add to the issue that is being presented within the reading?
There have been bank robberies since there have been banks. The banks have learned to keep less money on hand, making theft less attractive to thieves. Unfortunately, this did not just stop crime, crime has just moved locations. Now, with a credit card number you can wreak havoc on a persons life, with a host of numbers you are able to damage the lives of many. According to Baase that has brought upon the use of more sophisticated authentication practices, just as the banks learn to better protect their assets, the technology giants are going to have to continue to evolve and do the same.
7. (Synthesis) Address all that apply. Do you agree
with what is being said within the article (Why/Why not? Back up with FACTS,
reference)?
Baase laid out a great base argument for hackers and also the inherent risks with that behavior. It can be incredibly beneficial to have young adults with the knowledge to hack into systems, figure out the flaws in security and inform the company. These young adults could be priceless to a companies security in the future, which is likely why they are occasionally offered a job. Yet as with anything, there are people who will take advantage of a system. Which is why there is a need for increased security and increased punishments for those committing crimes, yet the issue arises when you think of punishing those who hack for a hobby, as you do not want to put a bad taste in their mouth regarding the system.
8. (Evaluation) Address all that apply. Judge
whether or not this topic is relevant in today’s society? Are there any ethical
considerations (see Chap1-1.4 for exp of Ethics)? What new
ideas will you make after reading this chapter/article?
With increasing use of the internet and technology in day to day life, the topic of hackers and fraud will continue to become more pressing in society. When questioning ethics there are many things to consider, for example is it unethical for a person to hack into a site in which the security of that site is imperative to users? Is it ethical to sentence children who hack into systems as a hobby? Of course, you do not want to overcorrect those children and stop their creativity, as that will pose problems for our future safety. If there is no one looking out for our safety on the internet, than we are posed to lose everything, financially and perhaps even socially. In the instances of identity theft, that can even prevent a person from being hired.
9. (Conclusion) After completing this assignment,
based on new thoughts and evidence
a. What new
conclusions have you come to about this topic ?
10. Below restate your question from #1 and include
the answer based on your new
conclusions.
I remember once reading of the Google Wallet, how safe is that? As stated above, Google Wallet is not safe at all. It in fact can be hacked by the average person who knows how to clear a pin number, the majority of the developed nations.
References:
Below, include any additional web reference that you include on your blog, including any websites or video.
Below, include any additional web reference that you include on your blog, including any websites or video.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.