User:Lleon06

I am currently taking a CIS2 course as a requirement towards my Major. Not only am I a student but I am also a mother of 5 year old boy. Coffee is the greatest thing that ever happened to me and everyday I try to be a better version of myself than I was the previous day.

My midterm was on cyber security and how important it is that we protect ourselves whenever we login to the internet. The DHS(Dept. Of Homeland Security) depends on information technology systems and computer networks for day to day operations. And they face large cyber threats from small town hackers to intruders using state of the art intrusion techniques. Cyber security has to be the greatest challenge to face and secure.

FINAL

Introduction

http://www.theguardian.com/society/2011/may/21/children-weaker-computers-replace-activity This link I liked because it explained how all hand held gadgets have replaced physical activity for kids.

http://computerandthesociety.blogspot.com/2009/08/how-does-computer-affect-society.html This linked explained the negative and positive affects on society and how we use computers on our day to day lives.

http://www.butterats.org/computers-how-they-have-changed-our-lives/ This link was informational, it explains how computers have changed our lives and how it has evolved. It marked the 21st century with dynamic trends.

Privacy and Freedom of Speech

http://www.computerworld.com/article/2950658/data-security/thanks-for-all-the-phish.html It briefly informed you of what phishing is and the threats online to extort money from you. It also states how education and testing is important and how critical it is to protect yourself online.

http://www.computerweekly.com/news/1280096976/Identity-and-privacy-at-risk-on-new-internet This link definitely goes into detail how easily it takes a person to take over anyone's information and assume their identity, every internet site you sign into is at risk. Like I've mentioned before, there is no such thing as privacy when it comes to the web. Which is crazy when computers/internet have such a big impact in the world today.

http://smallbusiness.chron.com/internet-businesses-rules-regulations-2642.html This link explains that easy Business has rules and regulations on how customer information is being used. And that the Federal Trade Commission( FTC) oversees or audits these businesses, but that the regulations don't state what the information can be used for, just has to be clearly stated.

Intellectual Property

http://opensource.com/resources/what-open-source Open source software allows others to alter a code so they can copy it, alter it and share it but as long as they don't alter the Licensing. And it not only benefits a computer programmer but anyone who uses the internet.

http://www.sfwa.org/2013/03/the-dmca-takedown-notice-demystified/ The link that I posted above is very interesting because it explains how an OSP( Online Service Provider) can be exempt from being liable from the DMCA(Digital Millennium Copyright Act). They called it the DMCA takedown which was added to the DMCA which frees the OSP from opposing liability by its users. It gives them more power to protect their rights. For example, when an OSP is given a notice of infringing material being posted on its website, the are to remove it right away. Apparently, there are always ways around certain laws.

http://www.hg.org/intell.html This is a brief description of what intellectual property is and it gives example of the laws that were passed to protect it.

Crime

http://www.makeuseof.com/tag/top-five-computer-crimes-protect/ Anyone who uses a computer put themselves at risk of all sorts of computer crime making them vulnerable. An example of that is malware, which is a virus that gets onto your computer without you knowing. They simply put themselves into your computer in order to get use of it. They recommend anti-malware protection and whatever you do DONT download software from sites you're not sure you can trust. Identity theft is another example, which is someone gaining access to your personal information. To avoid identity theft they suggest never to share bank account and social security number through email or text message. I recommend everyone take a look at this site because it's very informational.

http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime Cybercrime is one of the fastest growing areas of crime. They give two main types of internet related crimes. One being advanced cyber crime which are attacks against computer hardware and software. Then there is cyber-enabled crime which is crimes against children or financial crimes. Interpol's role is to stop cyber crime and provide cyber intelligence.

Employment, Education and Entertainment

http://www.scholastic.com/browse/article.jsp?id=3754742 This article explains how new electronic devices are being used in schools and how teachers agree that students seem to be more prepared because of it. They even stated that students with different learning levels benefit from it greatly because you can adjust it to the students learning needs. It gets students more motivated to learn

http://www.fastcodesign.com/1669896/10-ways-that-mobile-learning-will-revolutionize-education This article explains how mobile learning has made such an impact in our education and list’s 10 ways of how it is doing so. It goes on to say these mobile devices are easily accessible no matter your age. It’s crazy to think that our children know more about this technology and how to use these devices more than myself our even the older generation. They state that mlearning with eventually revolutionize education and will be beneficial to everyone.

https://www.changemakers.com/stemeducation/entries/adopting-morris-elementary This program was designed to introduce engineering to students, with hands on activities. It's flexible in grade level and strength. Its a way to build there confidence with there success.

Midterm Project-Grand Challenge

http://www.dhs.gov/topic/cybersecurity The main function of Homeland Security is to protect its people from outside threats. Cybersecurity is just one of the many threats that a nation faces on a daily basis. The DHS(Dept. Of Homeland Security) depends on information technology systems and computer networks for day to day operations. And they face large cyber threats from small town hackers to intruders using state of the art intrusion techniques. Trying to steal information and or disrupt /destroy critical information systems. As we become more dependable on modern technology, we also become more vulnerable to cyber attacks. The DHS works with different agencies to promote common policies and best practices that are effective to ever-changing threats.

http://www.cyberinnovationcenter.org/ Located in North Louisiana, the cyber corridor which is zoned for cyber research and development activities in the National Cyber Research Park (NCRP) is home to CSC, CenturyLink, Louisiana Tech University and Bossier Parish Community College. What they do is teach students the latest technology in cyber security. These are not just schools, it also collaborates with the national security. This facility is big on STEM as well as a develop state of the art technologies.

https://www.fireeye.com/ This bay area network security company provides automated threat forensics and malware protection against cyber threats such as sphere phishing and on going threats. They have been involved with investigating attacks on major company such as Target, Sony Pictures and JP Morgan Chase. They created a switch board network access control appliance, that looks like a cable box, which acts as a distribution hub for malware security intelligence. There appliance is being used all over the world, even today its being used in Russia and the Netherlands. Looks as though there system is very effective in the stop against cyber threats.

Evaluating and Controlling Technology

http://cs.stanford.edu/people/eroberts/cs201/projects/digital-divide/start.html

http://www.nytimes.com/2011/12/04/opinion/sunday/internet-access-and-the-new-divide.html?_r=0 Everything now is online such as jobs, banking, shopping and even online schooling. So many people who aren't accessible to the internet don't get those luxuries. They even talk about telecommunications and how the Cable companies are only available in certain areas. Making it harder for certain people to even get internet access creating a digital divide.

http://www.huffingtonpost.com/elisha-goldstein-phd/technology-vs-humans-whos_b_812305.html This link briefly explains how we have become so attached to our gadgets and the more we really think we need them.

Risk, Failures and Responsibilities

http://www.benmeadowcroft.com/reports/systemfailure/ The link lists the major causes of system failure and also provides examples for each one. For example, poor development practices which is caused by complex nature of modern software. Another example is inadequate user training / user errors, If a user is improperly trained then the likelihood of them making serious errors is increased due to their lack of knowledge of the system. Which is an important factor to contributing to system failure.

http://www.bbc.co.uk/education/guides/z9tf9j6/revision Reliability is a major concern for companies, because it can be have serious consequences. For instance loss of revenue and fines for breaking the law. One prevention they recommend is to backup your data onto a separate storage. We rely on software everyday to work properly, like traffic lights. If those were to work incorrectly it would cause major accidents everywhere.

Anytime, Anywhere

http://smallbusiness.chron.com/paypal-work-sellers-10761.html This link shows how PayPal is beneficial and easy to use for merchants. Its very reliable and saves the merchant money buy using PayPal instead of a credit card machine. Customers could pay by credit card, e-check or if they have a PayPal account themselves they can use their balance. I like how simple they made it for you to easily setup an account and it explains how shipping works. The only thing that was bad about the link was that it was very brief on each section. And you can actually access PayPal through your smartphone which makes it convenient.

https://news.usc.edu/54256/the-benefits-and-drawbacks-of-online-technology/ This link gives you the benefits and drawbacks of being able to access technology anywhere at anytime.

http://www.educause.edu/library/massive-open-online-course-mooc This link explains the purpose of MOOC, and how these online courses are available for free to anyone who is interested in learning something. It provides a video to watch as well so you get a better understanding of it. The link provides key notes for more resources.

Technology advances, Social Trends

http://www.theglobeandmail.com/life/parenting/meet-jibo-the-family-robot/article19756485/ This link introduces the very first family robot, called Jibo. When connected to wireless internet it performs curtain tasks and acts like a companion. The purpose of this robot is to potentially restore family connections as well as provide help for the elderly. With the high demand for humanized services, they designed Jibo around the principal of partnership so it is more than a tool you use. Some have said that this robot is trying to replace humans but that is not the case, Jibo is more for support for those busy moms or people who are on the go. It can remind you to do things or even make calls for you, letting you know when that person is available. It can cater to anyone, for example, the elderly. It will remind them to take medication.

http://www.hoverboard360.com/?gclid=CITf8q6rtskCFRRlfgodIDgJEA I am not sure it would be considered an important new gadget but it is an exciting new toy. It could possible replace Razor scoters and skateboards, and I am not sure if this is a good thing or a bad thing. Because it does all the moving for you, which will then make people more lazy.

http://mashable.com/2014/12/22/tech-trends-2015/#amBn_sYThqq1 This link lists 6 tech trends that will change the future. I choose this one because it was very informational and gave brief summaries for all six items.