Category: Uncategorized


EQUILIBRIUM and SURROGATES

The movie Equilibrium is all about the situation in which it is necessary that every individual shall obtain an emotion-restraining medicine. Although time they make use of it for their own utilization. I had observed is that they became so brutal which they need people must acquire those drugs. They have devastated the people who obtained drugs. It is very violent for the reason of they just made use the technology for an unethical matters. I do reflect on that definite behavior as illegal. On my own opinion, there is no such thing as an abuse on technology bearing in mind that comprehension shall be used for a vital matters which can assist all the people.

The movie Surrogates is all about a precise group of people who uses robotics that prepared their lives undertaking. There is a type of identical of a human to the robots or so called the surrogates. They had been supposing that in that exact creation they can exist conveniently yet the operators will be killed when that precise matter could be devastated. There are lots of people who are very frightened of that circumstances it is because one of a expert concerning robotics, Miles Strickland by name, make use a viruses which could occur. we think that it is very not possible to visualize how a human battles with an android as a matter of fact that is wholly metal. On the other hand, Tom Greer distinguishes that the virus was being commended into validation for the reason of it is legally signatured by the company who made the surrogates.

COMPARISON

Both two movies give us an idea about the people who had the power by abusing the technology. The two movies express the penalty by means of technology which is developed. I could tell that the distinction is that the Equilibrium movie has an effect on the living of the people for the reason of drugs provided by those powerful people while the Surrogates movie has a robotics which was certainly restricted by human machinists.

1. Authentication
Lab computers connected to the VCU Network must have an authentication mechanism that uniquely identifies the user of the computer for each session.

2. Tracking
Not enter their personal information on semi-public or public computers.

3. Prevention of the Installation of Malware
Each PC Lab must implement steps to prevent malicious code from being installed and executed on the lab computers.

4. Restriction of Privilege
The principal of least privilege must be followed on lab computers, and the local logon account should not have administrator privilege.

5. Current Security Software
The latest desktop security software available from Technology Services must be installed on all lab computers and kept up-to-date.

6. Physical Security
All PC Labs should be physically checked for unauthorized hardware devices (such as hardware key loggers) on a periodic basis.

7. Signage
There should be visible signage warning the users that the computers will be reset and that they should practice safe computer.

8. Antivirus or anti-virus software
Is used to prevent, detect, and remove computer viruses, worms, and trojan horses. It may also prevent and remove adware, spyware, and other forms of malware.

9. Encryption software
Executes an algorithm that is designed to encrypt computer data in such a way that it cannot be recovered without access to the key.

10. Firewall
Is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.

Based on this circumstances, I do treat my mentality to predicament. There is such thing as misunderstanding involving making good things that can praise the God and the difference which is bad that can really affect a friend. What should I prefer to? Will I prioritize my friend or the means of ethics? However, one way or another in this trouble, I must choose the one which I think is right, wherein I should make use my reward of knowledge, in order to be acquainted with what is right from wrong and principally my friend is not right. His purpose is to attack the administration system of our institution. Although it is just a program which is harmless, it can be a result to interruption in our school for it is a wicked program.
There is a vast chance that my friend will build up a bitterness and hatred for me but my principles would certainly state that I must be supposed to throw away such apprehension. I will inform what he made to the administration. Yet, I will first have a grave conversation with him. I will really give details to him the difficulties of his doings. More importantly he will automatically be expelled if he will be caught. In addition, I will support him to use his capacity for the help to others. He will make a program that can help out the school concerning the administration system. Thus, he will be acknowledged and as well as the associations which are planned to develop.

For being hired as an IT Security Consultant, I shall have a practical preparation on the huge trouble at ACME united Global Manufacturing. This preparation must engage precise procedure that will deal with their security problem for the reason that a hacker who devastated the production over the last six months in the business. This is a severe dilemma since the authority of the company was bothered by the hacker in which the clients built a negative collision on them through the business headlines in the newspapers. The major result of the difficulty will be more sufficient by new hacker I will come across. However, I shall first examine on the extraction of the security problem of the company. I will properly plan based on a problem solving technique that I should put first my objectives. First, the goal is to identify the capacity and reasons of the problem. Secondly, there is a requirement for me to identify the plans of the hacker concerning the whole story. Thirdly, goal is to differentiate the beat of the employees in the direction of the problem since they are fundamentally engaged. Lastly, I will create methods on the probable protection on the way to the hacker according on the examination I made to propose to the hacker. The most probable technique is to develop software which will forge the system the hacker did to devastate the security of the industrialized company.

1. What was the case about?

The case was all about t the computer systems were hacked by Raphael Gray for just six weeks and the multi-million pound credit card mission was putted up. He insulted the police in which they would never found him for the reason that they never caught everyone. In his task he was irritating to prove the fragile safety of credit cards in the increasing quantity of consumer websites. Unfortunately, because of his overconfidence and evil desire, he was chased down by hacker Chris Davis and sent to FBI.

2. Who were the protagonist and parties involved?

There were no protagonists involved. He was just relying on his 800 computer he brought in his home. He broke the security systems of credit cards and published. The parties involved were the law enforcers which he insulted and then arrested him and his tracker Chris Davis.

3. Did any prosecutions results? If so what were the outcome?

There were no results done by prosecutors. Raphael Gray was arrested by FBI agents and the officers from the local Dyfed Powys Police. I think there would be a possibility that after he was arrested, he was sent to Chris Davis and talked.

Technology in Business

1. Review the graphs in figure 1.7 through 1.10 and explain why it is critical that the businesses understand and embrace the internet.

The business should hold internet to enhance the production and it will also provide a united observation of the whole procedure. This will also confer an modernization and cooperation of thoughts not only from the workers of the company nevertheless also from the customers. According from the figures in the diagram, there is efficiency which is happening each year there is also a modification of data. The prominence of accepting the internet is to broader the opportunity of improving the development of the business.

2. Explain the correlation between the online retail sales graph (Figure1.7) and the online advertising revenue graph( figure 1.9)?

The two graphs both affect the estimated income of the business that they are associated. The online advertising revenue upholds the product where it will assist the purchaser to choose concerning the product and the online sales revenue is tasked to accept the transaction of the customers.

3. The number of internet users worldwide is two years ahead of its forecast. What are the potential impact that underestimating the number of global internet users might have on a business?

In not giving importance the number of global internet users may have vast collision into the business for the reason that investigators expect the quantity of the users of the internet. When they simply rely on advertising through internet, it may also cause a end of the business.

Hello world!

Welcome to WordPress.com. This is your first post. Edit or delete it and start blogging!