Wednesday, June 5, 2013

My topic: iOS

-->
iOS is the operating system developed by Apple Inc. for their line of mobile phones and device and was derived from the OS X operating system used in Apple computers. iOS was originally released in 2007 for the Apple iPhone but is now used to support other Apple devices like the iPod touch, iPad, and Apple TV. iOS is not licensed for installation on non-Apple devices.


iOS is currently on version 6.0 and is routinely updated through iTunes. Since iOS version 5.0 iOS can be updated and synced automatically “over-the-air” without having to plug in to your computer’s iTunes through USB. The user interface involves multi-touch gestures, like swipe, tap, pinch, and reverse-pinch, to allow the user to directly manipulate and interact with their device. A few of the current features include a lockable homescreen with application icons, default apps (like iMessage, Safari, Mail, etc.), a dock for apps that are used most often, and a status bar across the top to display data, a simple folder system for organization, and a notification center which delivers notifications over the status bar as well as through red badges over the involved apps. Many other features, such as Siri (the intelligent personal assistant, available on iPhones 4S and 5, 5th generation iPod touch, iPad Mini, and 3rd and 4th generation iPads), are also available.






Wireless Networking Precautions


Wireless internet networks, also known as Wi-Fi, provide users with the ability to access the internet from virtually anywhere using their mobile phones, tablets, or personal computers and laptops without having to be connected through cables. However, the high availability and ease of access to Wi-Fi also pose security risks because others may also be able to hack into your device, infect it with viruses, and access your personal information while you are connected. Therefore, it is wise to take some precautions when using Wi-Fi.



There are precautions one can take to protect their personal Wi-Fi at home. The first line of defense is installing an up to date antivirus program into your computer, which will check for threats and viruses. Enabling an encryption like WEP or WPA will also help hinder intruders from accessing your computer and infecting it with a virus. It is also a good idea to get a router with a firewall or install a firewall program into your current router to lessen the risk of someone hacking your computer. Also, disabling the SSID link on your Wi-Fi will block outsiders from accessing your computer. Public Wi-Fi spots greatly increase the risk of someone accessing your personal information because many people are accessing the same network at the same time. Therefore, it is important to have the proper software as well as to refrain from using any personal information such as passwords, bank account information, credit card, and social security numbers while using a public Wi-Fi.



Cloud Computing

-->

Cloud computing is a type of Internet-based computing that involves the sharing of resources over a network of many computers. This allows many users in an organization to access the same resources through the Internet without weighing down each individual computer or device with the running of those applications. This reduces the demands on each user’s hardware and software and makes the workload easier and cheaper to perform. 


 There are many advantages to using a cloud computing system. The main reasons why organizations and businesses would use a cloud computing system is because it saves money by reducing hardware and software costs and the need for IT support. It also eliminates the need for physical storage space, allows company-wide access to applications from anywhere at any time, and works faster.





Internet Filters and Parental Control Software




Internet filters and parental control software fall under the category of content control software, also called content filtering software or web filtering software. These programs are designed to block or restrict access to certain types of computer content that the reader or parents of readers wish to control accessibility to. For example, content over the Internet, such as that found in spam email or pornographic websites, may be blocked to protect the computer from viruses, worms, and malware, or to protect minors from accessing material deemed objectionable or inappropriate for those under 18 years of age.


 
There are many types of filters available, including browser based filters, email filters, and search engine filters to name a few.  Nearly all of parental control software uses passwords or other authentication in order to inhibit unauthorized users from changing or disabling the restrictions. However, content control software is not fool proof; there are ways to bypass control settings.




Radio Frequency Identification (RFID)


Radio Frequency Identification, or RFID, is a way of transferring data wirelessly through radio frequency electromagnetic fields in order to identify and track tags that are attached to or embedded in objects, animals, or even people. RFID can be used for a variety of things including tracking goods (like cars, equipment, luggage, or mobile phones), tracking animals (like pets, livestock, or wild animals that are being observed and studied), and even paying tolls (like EZ Pass).

A reader sends out an encoded radio transmitted signal to the tag. After receiving this signal the tag sends back its identification information. The tag is made up of two parts, an integrated circuit and an antenna. The integrated circuit is responsible for keeping and processing information, and modulating and demodulating radio signals, as well as other functions. The antenna is responsible for receiving and transmitting signals.




Digital Image Steganography


Staganography, a word of Greek origin that means “concealed writing,” refers to the art and practice of concealing messages. In digital steganography this message is hidden within an electronic format, such as text files, audio or video files, HTML, or graphic images. Messages are hidden in such a way that they do not cause noticeable changes to the file, thereby defying detection and allowing covert communication between the sender and receiver of the message. 


The steganography process uses three components: a carrier, a message, and a key. The message is embedded within the carrier and a key may be used to encrypt the message. The steganography process may be helpful in some ways, such as protecting copyrighted work through digital watermarking. However, steganography has caused concern in areas of national security, especially in recent years since the rise of terrorism threats. As a result digital steganalysis technology and techniques have been developed for use by the government, military, law enforcement, and intelligence agencies to detect and extract hidden messages that may pose potential threats.



http://www.wisegeek.com/what-is-digital-steganography.htm

Computer Forensics



Computer forensics pertains to obtaining legal evidence from computer systems and digital storage media. The purpose of computer forensics is identify, recover, examine, and preserve this digital information to be used in legal investigations and trials of computer crime, such as hacking, fraud, and cyberstalking, as well as in civil proceedings. Computer forensic evidence has become more widely accepted in US court proceedings, however, as computer have become more advanced it is apparent that this evidence is easily corrupted, changed, or eradicated. As such investigators have developed specialized tools and processes for obtaining evidence without altering the information. 



Computer forensic evidence is subject to specific guidelines that require the evidence to be authentic, reliably obtained, and admissible in court. For example, investigators must obtain a specific warrant to search for computer evidence in order for the information to be admissible. Investigations are performed on static data and follow the standard digital forensic process of acquisition, analysis, and reporting. Some of the techniques used in computer forensic investigations include cross-drive analysis, live analysis, and deleted files.




http://www.howstuffworks.com/computer-forensic.htm