Computer Science

Wednesday, January 15, 2014

Social Media

Social media:

           Social media refers to interaction among people where they create, share, and exchange information/personal messages through digital means or networks. Social media plays a large role in communication today, as news and information travel faster through social media than any other media type. Social media can relay financial news, political developments, personal messages, and opinions instantly to a large group of people.

                   Some social media requires the creation of a profile or secure account, like Facebook or twitter. These media types tend to be more secure and less vulnerable to corruption online. However, open chat-rooms and other similar social sites are much more likely to cause individual or large scale harm due to lack of control and mediation within the site.



Works Referenced:

Wireless Networking Precautions

Wireless networking precautions:

            By accessing a wireless network, you immediately expose yourself and your computer to many dangers. These dangers can range from hackers who may try to steal personal/financial information, spyware or malware that can harm your computer severely, or malicious third parties who can harm your personal data. Risk factors especially increase when you connect to a public or unprotected network.

            There are a few ways to secure your safety online. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Both are password protection systems, WPA being much more secure than the outdated WEP. Other precautions include anti-virus software, firewall software, and password protection. 






Works Referenced: 

Cloud Computing

Cloud computing:
           Cloud computing is a phrase used to describe a method of computing involves a large number of computers connected through the Internet. In other words, cloud computing is a way to say a computer work load that is  distributed over a network. It means that any computer, as long as it is connected to the internet, has the ability to run a program or application along with many other computer that are also connected to the same network.

             Today, cloud computing is in it's early stages, with only a few companies providing a limited range of online services. In essence, the "cloud" refers simply to the Internet as a vessel for storage and computing as opposed to local software on a single computer. Examples include online music storage, word processing applications, business computing applications, and PC or Mac backups.






Works Referenced:





Internet Filters and Parental Control Software

Internet filters and parental control  software:

          Content control software is software specifically designed to allow (or not allow) users to access certain pages depending on their designated "privileges." The administrator, or manager of the software, can choose what websites and other data certain parties can access. This can include websites, photographs/files/ games, etc. 

           Content control can be on a local/personal level, such as parental control software that enables parents to restrict inappropriate websites from their children. Or, content control can go as far as national web censorship, where entire countries are restricted in what computer activities they can access while using a network monitored by the government. 




Works referenced: 

Radio Frequency IDentification (RFID)

Radio Frequency IDentification  (RFID):

            Radio-frequency identification (RFID) is a wireless way of using of radio-frequency electromagnetic fields to send and receive data. Usually, RIFD technology is used for the purposes of automatically identifying and tracking "tags", which are attached to designated objects. Unlike the common bar-code, RIFD technology does not require contact with the reader of the information. This means that the tag may be a few feet away or as many as 100 meters away from the device that is receiving information from the tag. 

             Uses for RIFD tagging can vary and continue to grow as the technology becomes more accessible. Once used strictly for corporate and high profile tracking, RIFD technology can now be found in companies who want to keep track of their merchandise patterns, tracking of vehicles, pets, and even people, as well as use in the financial world during the exchange of merchandise from vendor to customer. 




Works Referenced:

Steganography

Steganography:

Steganography is the “art” of relaying hidden digital messages through supposedly innocuous “surface” messages. The hidden message can only be decoded by the sender and the receiver, so sensitive information can be sent through seemingly unimportant data. Examples include hidden pictures within pictures, text with a code or alternate meaning, or something as complicated as slight delay in packet delivery which will result in a decodable message. The word steganography actually of Greek origin and means "concealed writing"
Steganography has been used by underground poltical and religious associations to relay secret messages through networks and websites. Another use for steganography can be “digital watermarking”, or encoded data that indicates from where a file came and who owns the rights to it.  





Works Referenced:

Computer Forensics

Computer Forensics:

Computer forensics is the practice of searching for, preserving, and utilizing computer based evidence for a trial. Just like a normal criminal investigation, computer forensics investigations have strict rules and regulations that dictate how the investigation is run. But, unlike a normal criminal investigation, computer forensics is often seen as unreliable and non-permissible in the courtroom. Computer files are easily changed manipulated- so often people have a negative view on computer forensics being used as evidence in the courtroom.


Computer files are easily corruptible, such as the date/time that the file was last accessed. In the courtroom, lawyers can easily contest the validity of computer based evidence for this reason. Computer forensics is constantly growing and evolving as computers become more sophisticated. Digital evidence is becoming harder and harder to label as reliable, so digital investigators are always trying to keep up with the newest technology available to combat digital crime. 






Works Referenced: