List of references
https://www.internet society.org Google search
Wikipedia (online)
National discovery available at https://www.google.com/humo-naledi/porofessor-Berger
Google search available at https://www.independant.co.uk/steve-connor
Digital citizenship, Auburn University. SA
BBC news
Africa news today- Africa's newsletter available at https://www.google.com/sa's-top5-cybersecurity/
digital citizenship
Monday, 30 May 2016
POE Q6
Impact of digital technology on society
Poster available at https://www.thinglink.com/sinonzulu/impact-of-technology-on-society.
Poster available at https://www.thinglink.com/sinonzulu/impact-of-technology-on-society.
POE Q7
2015's top 5 cyber security risks in South Africa
As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker.
Significant Trends and Cyber Security Threats from the Perspective of a Black Hat Hacker in 2015 Include:
1. Blastware to Destroy Systems, Erase Data and Cover Hacker Tracks
This destructive new trend of malware, following Scareware and Ransomware could lead to the ability for hackers to infiltrate systems, gather data and then wipe out the information to on systems and hard drives to cover tracks and thwart forensics. FortiGuard Labs observed the first indications of Blastware in 2014, Dorkbot/NGRbot, where the hackers had code routines built in, that if altered, would self-destruct and wipe out all information on the hard drive. well as a Threat Intelligence solutions
2. Hackers Look to Evade Law Enforcement, Frame the InnocentAs cyber crime increases, law enforcement practices to catch and penalize perpetrators increase with it. Thus, hackers must be more careful and calculated to evade arrest. In 2015, advanced evasion techniques will evolve in order for attackers to cover their tracks. To date, evasion has been currently focused on counter antivirus and intrusion prevention.
3. Internet of Things Becomes Internet of Threats (IoT)
In 2014, we saw an interesting shift – namely Heartbleed and Shellshock – focused on server side vulnerability and exploitation. Looking forward to 2015, we fully expect this trend to continue in an alarming way as black hat hackers pry open the Internet of Things. Hackers will continue to follow the path of least resistance as more and more devices are connected to the network. Vulnerabilities that Black Hat hackers will look to exploit will include Consumer home automation and security systems, as well as webcams, which
4. Denial of Revenue/Data Breaches Continue and Expand2014 is becoming known as the “year of the data breach,” with significant thefts from stores like Target, Michaels, P.F. Changs and Home Depot. FortiGuard predicts this trend will continue in 2015 as hackers become more sophisticated and find new loopholes for infiltrating retail and financial systems. In the New Year, damages will also extend to denial of service on assembly line, factory, ERP/SAP systems, as well as healthcare and building management, creating even more challenges in the way of critical consumer data compromises, revenue losses and reputation damages for organizations globally.we are already beginning to see.
5. Rise in Counter Threat IntelligenceCrime services and solutions have already supported QA for malware, including sample scanning. Fortinet predicts this to extend to support QA for threat intelligence and undetected coverage for indicator of compromise (IOC) in 2015. As crime services extend their research and coverage, hackers will utilize the same type of processes for determining the best ways to bypass security systems. For example, current crime services scan malware against vendors’ capabilities to stop it, and give them a score result. As vendors expand from malware detection to threat intelligence correlation, criminals will work to counter this movement with the same type of approaches to find out if their botnet infrastructure is flagged in other intelligence systems as well, and work to hide their tracks.(IT News Africa-Africa technological newsletter).
What can be done to avoid it
1. Protect your data, not just the perimeter.
2. Know your data
3. Wake up to the insider threat
4. Increase vigilance
5. Get to grips with mobile
6. Spend more money and time on cybersecurity.(BBC News).
As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker.
Significant Trends and Cyber Security Threats from the Perspective of a Black Hat Hacker in 2015 Include:
1. Blastware to Destroy Systems, Erase Data and Cover Hacker Tracks
This destructive new trend of malware, following Scareware and Ransomware could lead to the ability for hackers to infiltrate systems, gather data and then wipe out the information to on systems and hard drives to cover tracks and thwart forensics. FortiGuard Labs observed the first indications of Blastware in 2014, Dorkbot/NGRbot, where the hackers had code routines built in, that if altered, would self-destruct and wipe out all information on the hard drive. well as a Threat Intelligence solutions
2. Hackers Look to Evade Law Enforcement, Frame the InnocentAs cyber crime increases, law enforcement practices to catch and penalize perpetrators increase with it. Thus, hackers must be more careful and calculated to evade arrest. In 2015, advanced evasion techniques will evolve in order for attackers to cover their tracks. To date, evasion has been currently focused on counter antivirus and intrusion prevention.
3. Internet of Things Becomes Internet of Threats (IoT)
In 2014, we saw an interesting shift – namely Heartbleed and Shellshock – focused on server side vulnerability and exploitation. Looking forward to 2015, we fully expect this trend to continue in an alarming way as black hat hackers pry open the Internet of Things. Hackers will continue to follow the path of least resistance as more and more devices are connected to the network. Vulnerabilities that Black Hat hackers will look to exploit will include Consumer home automation and security systems, as well as webcams, which
4. Denial of Revenue/Data Breaches Continue and Expand2014 is becoming known as the “year of the data breach,” with significant thefts from stores like Target, Michaels, P.F. Changs and Home Depot. FortiGuard predicts this trend will continue in 2015 as hackers become more sophisticated and find new loopholes for infiltrating retail and financial systems. In the New Year, damages will also extend to denial of service on assembly line, factory, ERP/SAP systems, as well as healthcare and building management, creating even more challenges in the way of critical consumer data compromises, revenue losses and reputation damages for organizations globally.we are already beginning to see.
5. Rise in Counter Threat IntelligenceCrime services and solutions have already supported QA for malware, including sample scanning. Fortinet predicts this to extend to support QA for threat intelligence and undetected coverage for indicator of compromise (IOC) in 2015. As crime services extend their research and coverage, hackers will utilize the same type of processes for determining the best ways to bypass security systems. For example, current crime services scan malware against vendors’ capabilities to stop it, and give them a score result. As vendors expand from malware detection to threat intelligence correlation, criminals will work to counter this movement with the same type of approaches to find out if their botnet infrastructure is flagged in other intelligence systems as well, and work to hide their tracks.(IT News Africa-Africa technological newsletter).
What can be done to avoid it
1. Protect your data, not just the perimeter.
2. Know your data
3. Wake up to the insider threat
4. Increase vigilance
5. Get to grips with mobile
6. Spend more money and time on cybersecurity.(BBC News).
POE Q6
The Development of Technology in modern times of their impact on human life Technology and society or technology and culture refers to cyclical co-dependence, co-influence, and co-production of technology and society upon the other (technology upon culture, and vice versa). This synergistic relationship occurred from the dawn of humankind, with the invention of simple tools and continues into modern technologies such as the printing press and computers. The academic discipline studying the impacts of science, technology, and society, and vice versa is called science and technology studies and society.(Wikipedia- technology and society).
The Internet is the decisive technology of the Information Age, and with the explosion of wireless communication in the early twenty-first century, we can say that humankind is now almost entirely connected, albeit with great levels of inequality in bandwidth, efficiency, and price.
People, companies, and institutions feel the depth of this technological change, but the speed and scope of the transformation has triggered all manner of utopian and dystopian perceptions that, when examined closely through methodologically rigorous empirical research, turn out not to be accurate. For instance, media often report that intense use of the Internet increases the risk of isolation, alienation, and withdrawal from society, but available evidence shows that the Internet neither isolates people nor reduces their sociability; it actually increases sociability, civic engagement, and the intensity of family and friendship relationships, in all cultures.
Our current “network society” is a product of the digital revolution and some major sociocultural changes. One of these is the rise of the “Me-centered society,” marked by an increased focus on individual growth and a decline in community understood in terms of space, work, family, and ascription in general. But individuation does not mean isolation, or the end of community. Instead, social relationships are being reconstructed on the basis of individual interests, values, and projects. Community is formed through individuals’ quests for like-minded people in a process that combines online interaction with offline interaction, cyberspace, and the local space.
The Internet is the decisive technology of the Information Age, and with the explosion of wireless communication in the early twenty-first century, we can say that humankind is now almost entirely connected, albeit with great levels of inequality in bandwidth, efficiency.(The impact of technology on society-a global perspective).
Society has always been impacted by technology. Each invention has affected how people relate to one another and how cultures have expanded or ended. Technology impacts how cities grow, where people live, and who owns what. Technologies are the reason a few people are very rich, that people are more social, and that teaching and learning is changing. We are at a crucial time in history where we as educators can make a difference in how our students interact with one another and make a place for themselves in society. (Barbara bay,2007).
|
POE Q4
Digital code of conduct for education institutes
10 points of netiquette
Netiquette is a basic set of rules pertaining to behavior that needs to be followed to ensure the internet is better for all users. (Digital citizenship, Auburn University. S.A).
(Melin,2013) Don't type in CAPS
Don't spam
Don't use offensive language
Don't steal other people's identity
Don't distribute illegal material
Don't flood
Don't expect a response straight away
Engage, don't broadcast only
Don't reply-all for a personal conversation
Don't ask questions that can be found on Google.
Penalties
A lack of netiquette can cause substantial problems in the workplace and schooling. Any disregard for netiquette can break a relationship between business associates, a single mail, post or comment can impact negatively or positively on a business. An institution's brand image could be ruined by a lack of netiquette.
if we disregard all rules and values, our society will eventually fall into anarchy, contributing to the downfall of a society.
We communicate daily be it social, business or academic content. Without any form of guidelines or rules our interactions will degenerate and result in negative consequences. Without the rules and policies associated with them, our communication will have no censure, no consequences and no legal responsibilities. Roles and policies are important for maintaining a sense of decorum and self-worth.
How would it be implemented in a business
Business is about building a relationships, creating rapport is important in establishing trust,authenticity and credibility. Any disregard for netiquette can break the relationship down. A brand's reputation is everything and a positive brand can sway buying decisions. According to (Patel,N.2014), the stats from a survey conducted in 2013, showed that73% of consumers say positive reviews make them trust a business more.
References
Auburn University.(s.a). digital citizenship: netiquette(online) available at https://www.auburn.edu/citizenship/netiquette.html (accessed 22 April 2016)
Melin,E. Mar.2013. 11 examples of bad digital etiquette (online) available at https://www.spiral16.com/blog/2013/03/11
Google search available at www.google .com/digital-code-of-conduct/Wikipedia.
10 points of netiquette
Netiquette is a basic set of rules pertaining to behavior that needs to be followed to ensure the internet is better for all users. (Digital citizenship, Auburn University. S.A).
(Melin,2013) Don't type in CAPS
Don't spam
Don't use offensive language
Don't steal other people's identity
Don't distribute illegal material
Don't flood
Don't expect a response straight away
Engage, don't broadcast only
Don't reply-all for a personal conversation
Don't ask questions that can be found on Google.
Penalties
A lack of netiquette can cause substantial problems in the workplace and schooling. Any disregard for netiquette can break a relationship between business associates, a single mail, post or comment can impact negatively or positively on a business. An institution's brand image could be ruined by a lack of netiquette.
if we disregard all rules and values, our society will eventually fall into anarchy, contributing to the downfall of a society.
We communicate daily be it social, business or academic content. Without any form of guidelines or rules our interactions will degenerate and result in negative consequences. Without the rules and policies associated with them, our communication will have no censure, no consequences and no legal responsibilities. Roles and policies are important for maintaining a sense of decorum and self-worth.
How would it be implemented in a business
Business is about building a relationships, creating rapport is important in establishing trust,authenticity and credibility. Any disregard for netiquette can break the relationship down. A brand's reputation is everything and a positive brand can sway buying decisions. According to (Patel,N.2014), the stats from a survey conducted in 2013, showed that73% of consumers say positive reviews make them trust a business more.
References
Auburn University.(s.a). digital citizenship: netiquette(online) available at https://www.auburn.edu/citizenship/netiquette.html (accessed 22 April 2016)
Melin,E. Mar.2013. 11 examples of bad digital etiquette (online) available at https://www.spiral16.com/blog/2013/03/11
Google search available at www.google .com/digital-code-of-conduct/Wikipedia.
POE Q1
Issues surrounding access to the internet, their roles to social capital, knowledge capital and human capital.
Internet society
As the internet expands, so do the issues that surround its stability and ability to evolve.
Social issues
The internet is the most useful technological advance today but the quick growth of the internet presents many benefits and drawbacks with respect to society.
Positive social issues
More people around the world are technologically literate
The internet offers a vast amount of information and service
The internet provides teaching and learning processes.
Negative social issues
The internet erases the identity of the person during the connection
High rate of illegal issues involving the internet
Plagiarism, false information.
According to G.Chabrol digital technology is not static. It is constantly evolving, changing and expanding. One of the most controversial and contentious issues surrounding the use of new information and communication technology especially in schools and libraries, is whether or not authorities should block students' access to the internet.
Internet blocking keep out bad content and allows good content to pass through.
There are ways to do this: computers in the lab or class could be blocked by teachers at certain sites. A computer could only be loaded with materials of the Curriculum. Screening methods can be used.
1.2 Techno-economic paradigm is a fundamental change in the basic concepts and experimental practices of a scientific discipline (Wikipedia)
Internet society
As the internet expands, so do the issues that surround its stability and ability to evolve.
Social issues
The internet is the most useful technological advance today but the quick growth of the internet presents many benefits and drawbacks with respect to society.
Positive social issues
More people around the world are technologically literate
The internet offers a vast amount of information and service
The internet provides teaching and learning processes.
Negative social issues
The internet erases the identity of the person during the connection
High rate of illegal issues involving the internet
Plagiarism, false information.
According to G.Chabrol digital technology is not static. It is constantly evolving, changing and expanding. One of the most controversial and contentious issues surrounding the use of new information and communication technology especially in schools and libraries, is whether or not authorities should block students' access to the internet.
Internet blocking keep out bad content and allows good content to pass through.
There are ways to do this: computers in the lab or class could be blocked by teachers at certain sites. A computer could only be loaded with materials of the Curriculum. Screening methods can be used.
1.2 Techno-economic paradigm is a fundamental change in the basic concepts and experimental practices of a scientific discipline (Wikipedia)
Subscribe to:
Posts (Atom)