Recent Changes

Monday, December 1

Monday, August 12

  1. page home edited ... Welcome to Inside ITGS Information Technology in a Global Society We are archiving pages U…
    ...
    Welcome to Inside ITGS
    Information Technology in a Global Society
    We are archiving pagesUPDATE - This wiki contains material used to teach ITGS in a flattened learning mode from previous years2010-2012. It has been written about in the book by Julie Lindsay and will makeVicki Davis, 'Flattening Classrooms, Engaging Minds: Move to Global Collaboration One Step at a start on insideITGS for 2012-14 students.Time', Pearson 2012, available from Amazon.
    This wikispace is part of the InsideITGS cyber-classroom set up by two ITGS teachers in Beijing, China: Julie Lindsay at BISS and Madeleine Brookes at WAB.
    What is InsideITGS?
    (view changes)
    10:49 pm

Monday, February 25

Sunday, January 20

  1. msg Feedback message posted Feedback skf slf ldsfjls fl sdjfl sdflksjf lksdjf lskj jf sdfjldk jfldskjfl jsld
    Feedback
    skf slf ldsfjls fl sdjfl sdflksjf lksdjf lskj jf sdfjldk jfldskjfl jsld

Thursday, December 13

  1. page 3.4 Spam (Aslak) edited Step 1: Example of a Spam Threat (Aslak) Find recent news items (within the last 2 years) &quo…

    Step 1: Example of a Spam Threat (Aslak)
    Find recent news items (within the last 2 years)"SPAM: The use of your internet threat (Olly & Colin needelectronic messaging systems to look at different examples as do Zacharysend unsolicited bulk messages, especially advertising, indiscriminately."
    http://www.bbc.co.uk/news/technology-20528301
    "Spam text message pair are fined £440,000 "
    Who?
    Christopher Niebel
    and Stephen - so you need to talk). Make sure thatGary McNeish were the news item has some ofones who sent out the techinical background however be preparedbulk messages to do further research for step 2.
    Here are
    the links:
    Summary
    people of the internet threat:
    who did it happen to?
    what happened?
    where (this is important and I suggest you get a map of the world and shade
    UK
    What?
    They sent out promotions/advertisements
    in the areas that are affected)
    when did this happen?
    form of spam-messages to random mobile-phones.
    Where?
    In Greater Manchester, UK

    Step 2: IT Background - how does
    "How dos
    it work?
    Try
    work?"
    The way they used
    to givesend out the spam messages is.
    1: Niebel and McNeishmade
    a step-by-step IT explanation of howcomputer-based software, that could read sim-card details, and then send out messages as the internet threat was carried out. Diagrams are good! Ask Muhammad to help younumber on the simcard.
    2: Then thy bought several sim-cards (+70 simcards)
    and connected them one by one to check understanding. Thisthe computer
    3: When they were connected, the computer
    is NOTsending out text messages, to numbers on a computer science report but you should give enough detail so that someone who has some technical knowledge understands your explanation.list bought on the black-market, until the sim-card reaches its daily message-limit
    4: then they swapped the sim-card with a new one, and ether way continued down the list, or did the whole list again from top.

    Step 3: Explain the Impact
    Find

    "impact"
    The main stakeholders in this is:
    The people sending
    out about the impact ofspam
    They will occasionally receive text messages that they don't want, which is filling up their phone-memory
    people receiving
    the internet threat. You may answer questions such as:
    Who
    spam
    They
    are the stakeholders?
    How were they affected?
    What were
    one who is behind the shortspam, and thus will be the one who'll have to pay the fine
    the people/companies paying for spam to be sent out
    They are the ones who have been financing the spam messages, they have payed so Niebel and McNeish could send out spam/advertisements for their companies
    Short
    term problems/consequences?
    Are there any longer
    consequences:
    - anger (receiving messages you don't want)
    - The phone memory is being used
    Long
    term impacts?
    Overall, how bad
    consequences:
    - mostly the same as the short-term consequences, but to an greater extent
    Overall:
    The threat by it self
    is not that big of a deal, it's mostly just annoying, but if they found a way to bring codes, that may cause harm to the phone, into the spam, this threat?could lead to loss of personal information etc.
    Step 4: Possible Solutions
    Please describe ONE technicalTechnical:
    Given that you own a smartphone; you could install a filtering app, that blocks all unwanted text messages,
    and ONE non-technical solutionthus will reduce the amount of spam.
    Non-technical:
    What you could do, is
    to either way is to get a sim-card from outside the internet threat.
    Evaluate each solution
    Compare
    country, or easier, turn off the solutions
    Which one
    phone, in this way you wouldn't receive any of the spam messages
    Evaluation:
    Since turning off the phone basically goes away from the main reason why you got the phone in the first place, to be accessible all the time, this
    is betternot the best solution. So what would be the most applicable solution for spam messages, would be to install I filtering app, which filtering out and why?
    Please acknowledge your sources by linking throughout
    blocks the documentunwanted messages.
    (view changes)
    5:27 am

Wednesday, December 12

  1. page 3.4 Global Virus (Olly) edited Step 1: Example of a Global Virus (Olly) Find recent news items (within the last 2 years) of yo…

    Step 1: Example of a Global Virus (Olly)
    Find recent news items (within the last 2 years) of your internet threat (Olly & Colin needGauss Virus
    The gauss virus is a computer-oriented virus that is able
    to look at different examplesmonitor, track and record banking transactions as do Zacharywell as stealing login information from browsers, cookies and Stephen - so you neednetwork information. The gauss virus, like any computer virus, is able to talk). Make surereplicate itself and spread from computer to computer.
    It was discovered by Kaspersky Lab in Moscow. Kaspersky Lab is a computer security firm
    that tracked the news item has somevirus and found that it is stealing the data from the citizens of the techinical background however be preparedMiddle East. The virus has so far targeted Blombank, Byblos Bank and Credit Libansis, all banks based in Lebanon, spying on the transfers between the bank and their customer. The Lab has confirmed that the Gauss Virus is related to do further research for step 2.
    Here are
    a previous United Nations created to reduce the links:
    Summary
    global impact of cyber weapons.
    The Trojan sits quietly inside
    the internet threat:
    who did
    computer recording keystrokes and scanning software for any username and password details. This data is then recorded back to the person/persons/organization that sent the Trojan. It is not known how the gauss virus was internally sent to the Middle East. However, Trojans can be sent in almost any file type.
    The virus is able to infect more than just computer systems;
    it happen to?
    what happened?
    where (this
    is importantable to find information from hard drives and I suggest you get a map of the worldUSB drives, record and shadestore data temporarily in hidden files until the areas that are affected)
    when did this happen?
    data is needed or available again.
    "Virus Seeking Bank Data Is Tied to Attack on Iran." Bits Virus Seeking Bank Data Is Tied to Attack on Iran Comments. N.p., n.d. Web. 12 Dec. 2012.

    Step 2: IT Background - how does it work?
    Try to give a step-by-step IT explanation of howThe creator imbeds the internet threat was carried out. Diagrams are good! Ask Muhammadcode for the Trojan inside a file such as a .jpeg
    The hacker must scan computers looking for security ports
    to help youexploit and infiltrate.
    The file is then sent
    to check understanding. Thismany hosts, possibly via a list server or randomly messaging people on an instant messaging server.
    When the instant message has arrived and if the victim clicks, it downloads but an error message appears. (The person sending the file
    is NOTable to resend a computer science reportfile with the exact same title and size, but you should give enough detail so that someone whowithout the virus attached reducing suspicion of the user)
    Subsequently, the user does not realize the Trojan
    has some technical knowledge understands your explanation.
    Step 3: Explain
    just been downloaded into their computer because it is a silent virus.
    The Trojan sits on
    the Impact
    Find out about
    host computer logging keystrokes, scanning cookies in browsers, searching software and hardware for any data bytes affiliated with usernames and passwords.
    A Trojan also allows a hacker complete control over
    the impact ofhost computer. E.g. the internet threat.hacker is able to watch the users screen, modify or delete files, crash the computer, and even control the input and output devices.
    "Gauss Malware: What
    You may answer questions such as:
    Who
    Need to Know." PCWorld. N.p., n.d. Web. 12 Dec. 2012.
    Who
    are the stakeholders?
    How were
    How are they affected?
    Blombank, Byblos Bank and Credit Libansis. The banks who are targeted by the Gauss Virus. The banks lose credibility for being able to secure their customers banking data as well as their banking records, and therefore people may wish to stop using those particular banks.
    The banking credentials of the users who are targeted by the Gauss virus. Their money has the potential to be redirected during transfers as well as accounts to be drained.
    The peoples whose login and passwords are being recorded. Their private data is now to be accessed by the person/people who now have their emails and passwords, without their knowledge of someone even having their details.
    The United States Government. The Lebanese government believes that the US government created the virus because of the banking secrecy laws in Lebanon. Also because the US treasury has been trying to freeze the money of Hezbollah.

    What were the short termshort-term problems/consequences?
    As far as the banks affected know, there have been no loss of funds in anyone’s account that would depict cyber theft. However, it has only been 4 months since the attack and with the amount of information gauss found it may be data mining to find the best accounts to attack. Blom Bank believes that it was impossible for any of its customers to have lost any money because they have a double authentication login where a one time use only four digit code is sent to the customers mobile phone.
    As a result of the attack, the “US government”, is now able to view any transactions between the banks infected and any person/organization/government. They are also able to control any transaction they would like to.

    Are there any longer term impacts?
    Overall, how badThe Lebanese and US government relations are definitely going to be affected by the gauss virus. This is this threat?a consequence of speculation by the Lebanese government believing that it was the US government that infected the banks computers, not only because of their secrecy laws, but also because they had a similar cyber attack on Iran in June.
    "Gauss Virus Can Spy on Bank Transactions, Steal Social Networking and Email Passwords." Http:ibnlive.in.com///. N.p., n.d. Web. 12 Dec. 2012.

    Step 4: Possible Solutions
    Please describe ONEone technical and ONEone non-technical solution to the internetInternet threat.
    Evaluate
    Evaluate each. Compare each solution
    Compare
    and then decide which is better.
    A way to prevent
    the solutions
    Which one
    Gauss Virus from infecting a computer is to install an amazing antivirus program that runs against the gauss virus. By doing this the user can be ensured that their computer is protected and therefore they are able to perform tasks like social networking, email and internet banking without the risk of identity theft or theft in general.
    Another way to prevent the gauss virus from infecting a server or computer is to remove all ports in general and only have a network connection that connects the server to controller in another location. The gauss virus can be brought into a network via USB, even without the USB owner knowing about the virus. The virus can sit on the USB and infect any node it is plugged into. Then put the server in a bunker that is physically secure. This makes sure that the gauss virus is unable to be put directly into the servers.
    In terms of practicality and time the antivirus software may be a
    better option because it is faster to put together. It can also be done at home on a person’s computer and why?would be much more affordable to an individual. However developing antivirus software that fights against a virus as feared as the gauss virus is very hard. Another problem with the antivirus software is that virus’s are ever changing and it needs to be updated over and over again, where as the bunker with no ports is extremely secure and much harder to break into. But when referring to individual nodes the bunker is not a better option because it is impossible to work a home computer without any ports.
    In an overall comparison, the antivirus software would be a much more effective solution because it can help the greater population as well as big banks fight against the gauss virus.

    Please acknowledge your sources by linking throughout the document
    (view changes)
    7:22 pm
  2. page 3.4 Global Virus (Colin) edited ... If the Siemens software is found, indicating the PC is attached to a programmable logic contro…
    ...
    If the Siemens software is found, indicating the PC is attached to a programmable logic controller that operates ICS's, Stuxnet then sends modified PLC code designed to sabotage the ICS, such as by disabling safety mechanisms that shut off machinery in the event of overheating. This then can cause physical damage to the machinery controlled by the ICS itself.
    Step 3: Explain the Impact
    Find out about the impact of the internet threat. You may answer questions such as:
    Who are the stakeholders?
    How were they affected?
    What were the short term problems/consequences?
    Are there any longer term impacts?
    Overall, how bad is this threat?

    The primary stakeholders here are the nations and companies whose infrastructure are afflicted by the Stuxnet worm and the propagators of the virus (allegedly the US government). The afflicted parties are seriously affected by the virus -- if it propagates as designed, Stuxnet can cause serious physical damage to expensive and dangerous equipment. In the case of Iran's systems, which appear to be the primary target of the virus, the worm could destroy power generation systems, which are a critical part of the national infrastructure. An immediate impact of an attack would be the loss of power access to those served by affected power generation facilities. In the longer term, the damage or destruction of such systems represents a significant loss of investment and requires additional capital to replace or repair. There may also be health and safety effects, given that the virus is designed to cripple early warning systems for critical metrics of the systems controlled by infected ICS's. If a nuclear reactor was let to overheat because of suppressed ICS warnings, for example, works could be exposed to radiation. The propagators of the virus also face ramifications in the long run. Any solid confirmation or proof that governments sanctioned the development of the virus would be disastrous diplomatically in terms of their relations with affected nations. Overall, this internet threat has significant consequences and is potentially damaging to all major stakeholders involved.
    Step 4: Possible Solutions
    Please describe ONE technicalNon-technical:
    Limit
    and ONEmonitor/audit personnel access to critical infrastructure. Limiting access to only essential personnel for verified, essential purposes decreases the risk of introducing or spreading the virus in the secure environment in the first place by persons with malicious intent. Monitoring and regularly auditing access to the computer systems can also help to catch malicious actions after the fact and determine the source of an infection. Such safeguards also act as a deterrence against any would-be attacker. However, this solution does not do anything to prevent the actual introduction of the virus into the secure environment if the carrier manages to get past the safeguards. For example, a worker whose USB thumb drive was unknowingly infected with the virus prior to accessing the secured infrastructure could unintentionally introduce the virus by simply plugging the device in as a normal part of his/her work.
    Technical:
    Physically block all nonessential ports, such as USB and serial, and disable access to such ports in the software. This would effectively remove any possible entry point for infection, even if someone manages to infiltrate the secured environment physically. This is very effective in preventing the introduction of the virus, but can also hamper real work by hindering access to tools needed. Completely blocking all ports also blocks legitimate access.
    While the
    non-technical solution primarily concerns preventing intentional malicious access leading to an initial infection occurring, it does not actual prevent such an infection from taking place. Meanwhile, the internet threat.
    Evaluate each
    technical solution
    Compare
    completely prevents all external information from entering the solutions
    Which one
    system, blocking the virus from infecting the infrastructure but also blocking some legitimate work. Overall, however, it is still the better and why?solution if the primary objective is to prevent any attack from happening as it virtually guarantees that the virus will never make it into the computer environment.
    Sources
    http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
    (view changes)
    9:25 am
  3. page 3.4 Global Virus (Colin) edited ... Are there any longer term impacts? Overall, how bad is this threat? ... US government). T…
    ...
    Are there any longer term impacts?
    Overall, how bad is this threat?
    ...
    US government). The afflicted parties are seriously affected by the virus -- if it propagates as designed, Stuxnet can cause serious physical damage to expensive and dangerous equipment. In the case of Iran's systems, which appear to be the primary target of the virus, the worm could destroy power generation systems, which are a critical part of the national infrastructure. An immediate impact of an attack would be the loss of power access to those served by affected power generation facilities. In the longer term, the damage or destruction of such systems represents a significant loss of investment and requires additional capital to replace or repair. There may also be health and safety effects, given that the virus is designed to cripple early warning systems for critical metrics of the systems controlled by infected ICS's. If a nuclear reactor was let to overheat because of suppressed ICS warnings, for example, works could be exposed to radiation. The propagators of the virus also face ramifications in the long run. Any solid confirmation or proof that governments sanctioned the development of the virus would be disastrous diplomatically in terms of their relations with affected nations. Overall, this internet threat has significant consequences and is potentially damaging to all major stakeholders involved.
    Step 4: Possible Solutions
    Please describe ONE technical and ONE non-technical solution to the internet threat.
    (view changes)
    7:49 am

Monday, December 10

  1. page 3.4 Global Virus (Colin) edited Step 1: Example of Global Virus (Colin) Find recent news items (within the last 2 years) of you…

    Step 1: Example of Global Virus (Colin)
    Find recent news items (within the last 2 years) of your internet threat (Olly & Colin need to look at different examples as do Zachary and Stephen - so you need to talk). Make sure that the news item has some of the techinical background however be prepared to do further research for step 2.
    What: The Stuxnet worm is a virus specifically targeted towards Windows PCs controlling Siemens industrial control systems. It was allegedly developed by the US in collaboration with Israel to attack and cripple Iranian nuclear power facilities. The virus ended up spreading to other intended targets, including energy companies in the US itself.[2]
    Who did it happen to? Iranian power facilities and other countries' facilities with Siemens Step 7 control software installed
    ...
    When? Discovered in June 2010 but confirmed to have propagated up to a year before
    Step 2: IT Background - how does it work?
    Try to give a step-by-step IT explanation of how the internet threat was carried out. Diagrams are good! Ask Muhammad to help you and to check understanding. This is NOT a computer science report but you should give enough detail so that someone who has some technical knowledge understands your explanation.
    During development of the virus, some reconnaissance would need to have taken place for the developers to find out the structure of the Iranian ICS LAN, which was not connected to the internet. This information, along with forged security certificates generated with stolen CA certificates, was used to develop Stuxnet to behave as desired.
    The virus was introduced to the LAN through some kind of removable drive either willingly or unwillingly by someone with access to the internal systems. The virus then spread itself within the LAN through zero-day OS vulnerabilities.
    ...
    Are there any longer term impacts?
    Overall, how bad is this threat?
    The primary stakeholders here are the nations and companies whose infrastructure are afflicted by the Stuxnet worm and the propagators of the virus (allegedly the US government).
    Step 4: Possible Solutions
    Please describe ONE technical and ONE non-technical solution to the internet threat.
    (view changes)
    7:40 pm
  2. page 3.4 Pharming (Stephen) edited ... In the case of the study, this attack was from Russia where an online banking site was targete…
    ...
    In the case of the study, this attack was from Russia where an online banking site was targeted and the DNS servers from the Estonia, UK and Germany were hacked into affecting users from the US, Asia-Pacific and most parts of Europe.
    {http://palizine.plynt.com/images/pharming-diagram.png}
    Attacker accesses the DNS server changing the address of the domain name to one of the fake site.
    The user tries to access nicebank.com through typing the domain name, the user's computer will simultaneously make a request to the DNS server.
    DNS server will send back information which redirects the user to the modified address.
    The user is then sent to the fake site.

    http://palizine.plynt.com/images/pharming-diagram.png
    Step 3: Explain the Impact
    (view changes)
    7:15 pm

More