Friday, 28 October 2016

QUESTION 8 digital health and well-being
pinterest.com


task 7- internet security
According to Holly Ellyatt of CNBC, the top 5 cyber-security risks in 2015 in South Africa are:

  • Ransomware- "a type of malware which restricts access to the computer system that it infects" (Ellyatt, 2015). This targets storage sites like Dropbox and google drive and prevents users from being able to log into these sites and access their saved information (pictures, documents and videos). the users of these storage facilities make themselves vulnerable by uploading their material as a 'safe' form of storage. Ransomware attackers will try and get ransom payments from victims in exchange for their data. Fortinet is a company in South Africa that has been a victim of Ransomware which came in via an email that seemed legitimate, The only way of knowing that it is a form of malware is by looking at the senders address, therefore this is how users enable hackers to obtain information. 
  • The Internet of Things (IoT)- "the connection of physical devices such as home appliances and cars to the internet" (Ellyatt, 2015) This makes all the information stored on any device very vulnerable because if hackers are able to access one connected device, they are most likely able to access all the devices that are connected to it. Although the IoT makes everything a lot more efficient, we are sacrificing our security. "A Samsung “smart fridge,” designed to synch over Wi-Fi with the user’s Google Calendar, failed to validate SSL certificates, leaving users’ Gmail credentials open to theft" (WIRED, 2016)
  • Cyber Espionage- this is the use of computer networks by hackers to access information usually related to government. This form of malware is strongly linked to terror groups who are plotting against governments. An example: "Detected as Win32/Prikormka, the malware has eluded the attention of antimalware researchers since at least 2008. It has been carrying out cyber-espionage activities primarily targeting anti-government separatists in the self-declared Donetsk and Luhansk People's Republics." (ComputerWeekly, 2016)
  • Cyber theft- Linked to the stealing of financial information from credit and debit cards, now made easier by a lot of foreigners using mobile payments as an 'easier' payment method.  this is not usually involve businesses but more individuals who have their card stolen, however there are ways of minimizing the chance of a lot of money being stolen. e.d. putting a limited amount of drawings available per day ( R 3000), freezing the card by calling the bank as soon as it has been stolen, security keys, etc.  an example, Regarding Mandarian Oriental "The hotel group confirmed credit card data was stolen from an “isolated number” of payment card systems at hotels in Europe and the US, after the company’s network was hacked." (Computer.weekly, 2016)
  • Insecure passwords- This is possibly the easiest form of malware for hackers. There are many people who are on social media sites like Facebook and Twitter who have got very simple passwords like their birth date or nickname. this information is easy for hackers to access. The best way to have a secure password is to include Capital letters, punctuation and numbers  into your password to make it more difficult for hackers to guess. Also it is important not to tell anyone your password to these sites. 
In 2012, LinkedIn suffered a massive data breach in which more than 6 Million users accounts login details, including encrypted passwords, were posted online by a Russian hacker.

How can individuals, businesses and companies avoid being hacked? The best and most obvious ways to prevent hackers from accessing any information is to:

  1. Ensure that all the devices use antivirus software that is constantly updated. 
  2. Always back up the data on both physical devices and cloud services e.g. Dropbox so that if the information is always in two different places.
  3. Use secure and unique passwords that include capital letters, numbers and punctuation. Download KeePass to ensure a safe password.
  4. keep your internet communication between individuals private so that nobody else can access your conversations.
  5. Do not publish personal information like banking details and phone numbers on social media.






QUESTION 6
Create an online poster for your institute of study to warn students of the potential impacts of Digital Technology on Society. Use ThingLink and post the link to your blog.   (7)
QUESTION 3
Create a blog post titled: The social economy: Unlocking value through social technologies, in this post outline the benefits and risks of social technologies for individuals, corporate and communities. Focus on South Africa. (10)
Advantages and disadvantages of social technologies with an everyday person:
Advantages
 Disadvantages
Allows people to stay connected
End up wasting time on social network
Use password to insure you’re safely.
It can be dangerous if you used wrongfully.
You can say what’s on your mind.
It can ruin your reputation if you say the wrong thing or post something inappropriate.
You can find out new information online using your phone.
 
It can make lazy to read books because everything is online
 
                                                 Corporates
Advantages
 Disadvantages
Create a name for your company
Bad information could be mentioned about your company
People can follow your online website
Private life maybe information can be found out about you.
More people might want to invest in your company because of people passing on the word using social networks.
People can hack into your  phone or computer
                                           Communities
Advantages
 Disadvantages
It can create a job employment
People start depending to much on social network and net
are about what going on around
It can also bring out negative things about the community 

Thursday, 27 October 2016

POE DIGITAL CITIZENSHIP QUESTION TWO





The Information Fluency Process


1.       Ask: This step involves asking important questions about what knowledge or data is being sought. In order to receive good answers, one must ask good questions.

2.      Acquire: This step involves accessing and collecting relevant information from various appropriate resources.

3.      Analyse: This step involves sorting through the information collected in order to authenticate, organize, and arrange it all. This step also involves deciding whether or not the collected information is valuable or not.

4.      Apply: This step involves the application of the knowledge acquired. This is done once the data has been collected and verified, and a solution has been created.

5.      Assess: This step involves assessing the product and the process, which can be done by discussing how the process could have been carried out more efficiently.

 

The information fluency process may be used to analyze the Homo Naledi finding:

1.    Ask: Relevant questions must be asked in order to receive valid information. One must ask what species the fossil belongs to, Who is Homo Naledi. Relevant questions must be asked about the fossil: How old is the fossil? Why was it found at this particular site? Is the fossil male or female? Can this fossil contribute more information to add to the theory of evolution?

2.    Acquire: Information is acquired by scientists leading the expedition. This is done by studying the fossil remains in a professional manner in order to acquire information such as how old the fossil is, does the fossil display human-like characteristics or not.

3.    Analyse: One must analyze the information which has been acquired in order to authenticate, organize, and arrange it all. One must decide whether the information acquired about the fossil is trustworthy and if it can be used to make assumptions about the theory of evolution.

4.    Apply: One must apply the information acquired, and assess whether or not the fossil found by Professor Lee Berger is in fact invaluable to the theory of evolution and if scientists can use the information gathered as leverage to further their studies on the human species.

5.    Assess: One must assess whether the process of analyzing the groundbreaking archaeological findings could have been carried out more efficiently.