Wednesday, February 22, 2012

Securityyyyyy



             Lee’s “How I learned to Stop worrying and Love the App Store” discusses the content that is prohibited on the app store and those that are forbidden. The App Store controls what software can be downloaded and used on the iPhone or other Apple devices. Apple prohibits
1)   Any duplication of existing functionality
2)   Apps can not download executable code
3)   The blockage of bandwidth-heavy apps
4)   Fiore’s work or anything that encourages excessive consumption of alcohol or illegal substances
5)   Sexual content
Many of these restrictions bring about free speech concern. This in turn brings the threat of people choosing another alternative ie: Windows phones (But who’d give up their iPhone). Although many people can resort to their PC for explicit material, individuals run the risk of malware, spyware, and viruses. However, the restrictions placed on Apple’s app stores are beneficial to the use. One does not want their phone to be a PC because the risk of malware can prevent the phone from working. The app store also opens the market to small firms because as Lee states “users have to do their due diligence.”
1)Microsoft has taken a similar strategy to that of the Apple app store. There are two main differences though
1)       2)Google is less picky about what apps it selects
2)   Users are allowed to get Android apps from outside the Android market.
This in turn has provided enormous malware of Android users where iOS users malware is non-existent.
Zittrain “Cybesecurity and the Generative Dilemma” discusses the idea of generative concepts, as does Lee.  Zittrain talks about the positive benefits of generative systems and how users can be trusted in sharing goods. He also discusses the Internets first worm, which was generated by a 23-year-old Cornell student Robert Tappan Morris Jr. Within one day, this worm infected almost 10% of all internet-connected machines. He also discusses how it was a big deal but many did little to fix this deal, and that it was not perceived as a network problem. Zittrain compares the Internet worm to the hackers of the phone line. “A group of hackers discovered the tone at a frequency of 2,600 hertz sent over a telephone line did not reach the other side, but instead was used by the phone company to indicate to itself that the line was idle (40).” A mortified AT&T quickly corrected the error.
            CompuServe applied the same approaches as AT&T did so no worm could be spread through their network which was “do not let the paths that carry data also carry code (40).” Bad code was a problem of the 90s and till this day there still exists no truly destructive malware. There now exists a business code for bad code and viruses tend to create “Botnets.”  The majority of bad code lies within PC users. This provides the question do people want a PC or an X-BOX which provides the solution for bad code. People can resort to firewall, which prevents bad code, but it may complicate the installation of good code.
            The solution to the generative dilemma will have to deal with advanced legal innovations and technical innovations, which will provide for the best generative success.
            Non-generative material is a not always exclusive, server like some information appliances can lock Linux. Neither generative or non generative is superior towards the other but both have their benefits. 

No comments:

Post a Comment