Thursday, August 21, 2008

Activity No.3

For those who are working, interview your IT in-charge and ask him/her to describe the computer database systems used in the company. Write your answer in 1-2 paragraphs. Further, ask also the benefits and/or disadvantages derived from these database systems.

The General Santos City Hospital is using a ABSOLUTE DATABASE. This features SQL 92 support, single database file with advance cache management and buffering architecture, multi user and up to 32TB maximum size.

According to Mr. Alex Dagmil, the Head IT officer in the hospital, this is one of the most advance yet very much simplified database in the hospital operation. It manages the entire system of the hospital and can relate to the ENGAS system that the city government is basing, ENGAS is also required by the Commission on Audit for Local Government Units (LGU). The size of the system is 100% plus compare to conventional one.

The disadvantage on this kind of database is that the programmer has no features of referential integrity.

Tuesday, August 12, 2008

Research 1 company and describe how they protect their company from internet risks.Also, research for possible risks or dangers and/or impacts of internet - related crimes to a company.

One company that ensures their system that's free from internet risks is the NOKIA company.
Nokia uses encryption technology when collecting financial personal data such as credit card information. If this site supports on-line transactions, it will use an industry standard security measure, such as the one available through "Secure Sockets Layer" ("SSL"), to protect the confidentiality and security of online transactions. If used, industry standard security measures like SSL authentication ensure that credit card information, as well as other personal data submitted as part of the buying process, is reasonably safe from third party inteception.

One danger in internet in a company is the "hacking". Below is a report who was a victim of this kind of fraud over in the internet.

1. Indian Hackers " Pump and Dump " Scheme: On March 12, federal officials unsealed an indictment charging three individuals from Chennai, India, with conspiracy, securities and wire fraud, and identity theft tied to the hijacking of online brokerage accounts in what authorities call a "hack, pump, and dump" scheme. According to the indictment, last year the defendants, based primarily in Thailand and India, set up online brokerage accounts, hacked into other accounts to buy thinly traded stocks, and once the stock had risen, they sold off their own shares. Among the victims are at least 60 customers and nine brokerage firms in the United States and overseas, with over $2 million in losses.

2.Accurint Computer Fraud and ID Theft: On March 5, a federal judge sentenced five men for conspiracy to commit computer fraud and identity theft tied to intrusion of the Accurint database. Using Trojan horses, social engineering, and other techniques, the defendants obtained user login IDs and passwords and then made unauthorized entries into the Accurint database, which is widely used by law enforcement. All five men are restricted from using computers and were ordered to pay $105,750.29 in restitution to Lexis/Nexis (Accurint's owner) and the Port Orange Fla., Police Department.