Wednesday, December 31, 2014

Netiquette IQ Blog Of The Day - Proposed Cybersecurity Norms to Reduce Global and Local Conflict

I often write in this blog about the dangerous development happening with the Internet. The posting below is significant in that it is presenting a core of Cybersecurity norms for the world. Clearly, all countries must unite with the end goal to have a basis of trust, understanding and cooperation. Let's all hope this can be realized!
==========================================


Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World
 ==============================================
December 3, 2014 December 19, 2014 - Paul Nicholas - Senior Director, Trustworthy Computing 
The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information security threats, some stemming from nation state activities in cyberspace.
Microsoft believes that there are certain acts in cyberspace that, whatever the national or strategic aim, nation states should not pursue. Because of that we are today publishing a new white paper International Cybersecurity Norms, Reducing Conflict in an Internet-dependent World”, as part of the EastWest Institute’s 2014 Global Cyberspace Cooperation Summit in Berlin, Germany. In the paper we recommend six cybersecurity norms with the intention of reducing the possibility that Information Communication Technology (ICT) products and services are used, abused, or exploited by nation states as part of military operations. We believe such actions could bring about potentially unintended and likely unacceptable consequences.
Our team developed a unique framework that evaluates various actors in cyberspace, the objectives they are seeking to advance, the corresponding actions that could to be taken, and finally the potential impacts of such action. Using this risk based approach, we believe that the norms we are putting forward today will be just as relevant tomorrow and for the years to come. This is not a new position for Microsoft, as we’ve been advocating for an international effort to develop cybersecurity norms for several years. Underscoring the difficulty, as well as the importance of establishing cybersecurity norms, Microsoft Corporate Vice President Scott Charney noted in a blog post last year, “Creating these norms will be as difficult as it sounds, but it is still both necessary and, ultimately, unavoidable. Absent such an agreement, unilateral and potentially unprincipled actions will lead to consequences that will be unacceptable and regrettable.”
 
Our goal – albeit ambitious – is to prevent the emergence of a world where cyber conflict undermines trust. The alternative is to realize too late, among the wreckage, that something should have been done long ago. Cybersecurity norms that limit potential conflict in cyberspace are likely to bring greater predictability, stability and security to the international community. The cybersecurity norms we propose can also serve as a compass for governments, as they seek to codify their own laws and regulations for government action in cyberspace. Although making meaningful progress will be a challenge, especially as demographic, political, and economic shifts test traditional models for collaboration, we are nevertheless optimistic that, through dialogue, development, and general practice, certain cybersecurity norms can evolve into customary international law over time. We believe that the consequences of inaction are unacceptable.
 =========================================
In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

If you have not already done so, please view the trailer for my book below. 
===============================================
video

Netiquette IQ Technical Term Of The Day - Honeypot

 =======================================
Honeypot is a great terminology and one which many do not know the definition. Here is your question answered once and for all!

Honeypot – source -  techterms.com
A honeypot is a security system designed to detect and counteract unauthorized access or use of a computer system. The name "honeypot" is used in reference to the way the system traps unauthorized users, such as hackers or spammers so they can be identified and prevented from causing further problems.
Honeypots are different than typical security solutions because they intentionally lure in hackers or users with malicious intent. For example, a company may purposely create a security hole in their network that hackers could exploit to gain access to a computer system. The system might contain fake data that would be of interest to hackers. By gaining access to the data, the hacker might reveal identifying information, such as an IP address, geographical location, computer platform, and other data. This information can be used to increase security against the hacker and similar users.
While honeypots are an effective way to monitor and protect information systems, they can also be expensive to maintain. Therefore, honeypots are used primarily by large companies and organizations, rather than small businesses. Government and educational institutions may also deploy research honeypots as a means of tracking unauthorized access attempts and improving security solutions.
 =========================================
In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

If you have not already done so, please view the trailer for my book below. 
===============================================
video


Netiquette IQ And Tabula Rosa Systems Each Wishes You A Healthy and Safe New Year!


To all of my readers, a wonderful, healthy, productive and safe New Year. May the world and all things upon her be a better place when we enter 2016 than when we entered 2015!

The following is a free calendar you may wish to download!
============================================================
http://www.calendarlabs.com/
------------------------------------------------------------------------------------------------------

Netiquette Quotation Of The Day - Don't Use Too Many Words



 ===============================================
"You take many words to say simple things."
LILLIAN HELLMAN, The Autumn Garden
   =========================================
In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

If you have not already done so, please view the trailer for my book below. 
===============================================
  video

Tuesday, December 30, 2014

Netiquette IQ Blog Of The Day - The Internet Is Not The Answer


Most of us have viewed the Internet as the panacea, the ultimate gift, problem solver and key to the future. In many respects this has been and continues to be true. However, as times goes by, the Internet is creating disparities and it is becoming less of what we imagined it to be.

Hacking, identity theft, cyber bullying, loss of privacy and other dynamics now are threatening even more gaps among the rich and poor.

As Netizens, we must be alert, aware and action-driven to prevent the negatives and promote the positives.

The article below shows a very pessimistic view of cyberspace. Whether we hold to similar views or not, let's not ever dismiss them!

"Good Netiquette To All!
======================================
======================================



An Internet to love and hate

Jeremy Philips  Fortune.com
December 28, 2014, 6:51 PM EST

The Internet Is Not the Answer, by Andrew Keen. Courtesy: Atlantic Monthly Press
It promised innovation, opportunity, democracy—but it has only hastened inequality, according to a new book.

The rise of the Internet promised great upside for billions of people around the world: enhanced global communication, the spread of democracy, and a new wave of innovation. A new book suggests the reality is starkly different.

The Internet Is Not the Answer (Atlantic Monthly Press; $25), by web commentator and entrepreneur Andrew Keen, argues that the “economic and cultural win for its billions of users” was a mirage. According to Keen, who founded Audiocafe.com in 1995 and turned that experience into a career on the tech-industry speaking circuit, the Internet’s benefits have accrued mostly to a “tiny group of young white men in black limousines,” leaving everyone else worse off. Sure, software may be eating the world, as investor Marc Andreessen so aptly described it in 2011, but it is also “ravenously consuming our jobs,” Keen writes, leading to a “structural unemployment crisis” that is making most people poorer and producing widening inequality.

Keen cites Amazon as a prime example of a company that makes us worse off in myriad ways. The Jeff Bezos-led retailer has destroyed bookstores and put people out of work, Keen argues. It’s a despotic monopolist. It subjugates its workers.

But his case against Amazon is weak. Amazon AMZN 0.95% surely hastened the downfall of brick-and-mortar booksellers even as it professed to embrace the culture around them. But their demise is the result of forces much larger than the company—a secular trend of bits replacing atoms, much like the shift in music distribution that annihilated the compact disc.
Keen points out that Amazon’s ruthless appetite for supply-chain efficiencies has led to the replacement of high-paying, unionized jobs with fewer, lower-paying roles. This is an important socioeconomic issue—but is it really the Internet’s fault? Are Walmart or Nike any different?

In making his argument, Keen conveniently ignores the other side of the ledger of the ascendant Internet: the proliferation of better products and services at lower costs that improve living standards. The rise of digital books allows millions of titles to see far broader distribution by offering instantaneous access and lower prices to consumers. The rise of smartphones with built-in cameras as well as photo-sharing services like Instagram may have accelerated Kodak’s demise, but it also lowered the barrier to photography for millions of people by making it free, easy, and always within reach. In every category, disruption brings massive consumer benefits.

And what of the inequality that the Internet has wrought? Keen fails to address potential ways that it might be addressed, such as through education, retraining, greater mobility, and appropriate safety nets. He does not consider the potential for technological innovation to reduce inequality, such as by lowering the costs of health care and education or by making opportunities more broadly available. Instead, he obsesses over The Battery, a San Francisco restaurant and social club frequented by successful Internet entrepreneurs, and the multibillion-dollar cash reserves of companies like Apple and Google, which Keen implausibly argues “puts the fate of the world economy in the hands of the few” rich technology companies. On-demand car services such as Uber and Lyft mostly serve the rich; never mind that they create additional opportunities for people to earn a living by massively expanding the market.

There is much of interest in The Internet Is Not the Answer, but its author too easily descends into tangential class warfare, bland assertions, and fuzzy logic.
Keen says we are all “working for Facebook and Google for free, manufacturing the very personal data that makes their companies so valuable.” He means to say that our attention and information allows those companies to better sell advertising on their free services, but the way he frames the argument is akin to saying that we are all working for the TV networks, generously donating our time to watch American Idol so that Fox can sell automobile advertising. There’s certainly a relationship there, but Keen avoids acknowledging the mutual benefits.

The rise of the Internet has not been all beer and skittles, and Keen is adept at illustrating it. Often, he’s right—and the result may be eye-opening for anyone who considers the Internet a panacea. For everyone else, though, The Internet Is Not the Answer will provide few revelations but plenty of provocation about the distribution of the bounties of the digital revolution.
 =========================================
In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

If you have not already done so, please view the trailer for my book below. 
===============================================
  video