Thursday, December 4, 2014

19. Thursday group project

(Danielle Laws 1-3)
1.
Facebook, Twitter, and Instagram.

2.
The kind of anonymity that is available on the Internet has made many students forget that they need to filter any information that they post. In fact, many colleges as well as potential employers tend to investigate the social networking profiles of an applicant before they grant any acceptance or an interview. And there are many students who are not constantly evaluating the content which they are publishing online. All this can lead to negative consequences even later on in their life.(http://www.business2community.com)

3.
Sexting- This is a form of communication by sending text messages or emails of nude pictures sometimes involving sexual conduct. In most cases the sender of the picture is the nude person in it.
Cramming-This is a method of tricking a computer into running a java code.(Margaret Rouse, 2014, Cache cramming,TechTarget)
Cookie- This is information that a Web site will put on your computer to remember you for later uses.(Margaret Rouse, 2014, cookie,TechTarget)
Trojan Horse-This is a program where a harmful code is inside what seems to be a harmless program or data and can do a form of damage to a computer.(Margaret Rouse, 2014, trojan horse,TechTarget)
Phishing- This is an email fraud method in which the hacker sends out an email that loos real but its only to gather personal and financial information from the victims.(Margaret Rouse, 2014, Phishing ,TechTarget)
Spyware- This is a technology that helps in gathering information about people without them knowing.(Margaret Rouse, 2014,Spyware ,TechTarget)
Rootkit-This is a collection of tools and allows only the administrator-level access to a computer.(Margaret Rouse, 2014, rootkit ,TechTarget)
Zombie- This is a computer that a hacker has accessed and set up to forward viruses to other computers.(Margaret Rouse, 2014, zombie,TechTarget)

(Kelsey Messemore 4-6)
4.
Actual student screen name- too much information revealed
Trashmouth- it portrays the image of someone who uses inappropriate language
IHaveOnePairPants- you only have one pair of pants? that means you wear them every day-there's no way you wash them every single day
BoogerDude- it portrays the image of a male that has boogers in his nose- not ok.
Pig- it portrays the image of a person who likes to eat a lot, or it portrays the image that you are a nasty animal who always makes messes

5.
InYoFace- what is in your face? and why is it there?
Badboy2u- people may try to test how "bad" of a boy you are by picking on you
Lookin4Luv- if you're "lookin 4 luv" and it's so important that you put it as your screen name it makes you look desperate
IMAHottie- ok first, please humble yourself. second, even if you are confident that you're a "hottie" please don't brag about it. Let others tell you that you're a "hottie"
FatMama- do I even have to explain?
suPaFlirt- NOBODY LIKES A "supa flirt"

6.
Tom_Evans34- full name and age maybe
Missy-13- name and age maybe
AndyKarateKid- name and hobby
ViolinGurl- hobby
restlinmatch- hobby

(Chere’ Diket 7, 8, and 10)
7. Good and bad choices for screen names.
                -i8sushi2-good
                -soccerstar-good
                -puppergirl1234-good
                -KeKe1995-bad
                -Bookworm-good
                -2BorNot2b-good
                -Choco-holic-bad
                -capitlOfens-bad
                -AmrcanIdol2-good
                -BellaIsabella-bad
                -DarkAngel666-bad
                -Karla-Love-1996-bad
                -SimpyMe-good
                -gUn4hiRe-good
                -babyfaceLA-bad
                -Watup?-good

8. Create three different screen names that you think will meet all of the following guidelines: unlikely to attract negative attention, free of bad language, don’t reveal too much personal information, don’t reveal a name, age, or gender.
                -basketballfan3265
                -teacherspet23
                -iloveschool436

(everyone)
9.How likely is it that a password can be cracked? A poor score is a warning to create a new password immediately. Score: 4
a) Does your password include the name of a family member or pet? (-3)
b) Does your password include the birth date of a family member? (-3)
c) Does your password contain one or more words that could be found in a dictionary (including French, Spanish, Italian, German)? (-3)
d) Does your password contain a random set of numbers? (+2)
e) Does your password have 8+ characters? (+2)
f) Does your password contain both letters and numbers? (+2)
g) Does your password have less than six characters? (-1)
h) Does your password contain one or more non-number, non-letter characters, such as ! or = ? (+3)
i) Does your password contain the date of a well-known event, such as the date a particular baseball team won the pennant? (-1)
j) Does your password contain at least three numbers in numerical  sequence, such as "123"? (-2)
k) Does your password contain any word spelled backward? (-1)
l) Is your password written on a piece of paper within 15 feet of your computer? (-2)
m) Does your password contain a word repeated more than once? (-1)
n) Does your password contain your telephone number, zip code, area code, or a portion thereof? (-2)
o) Does your password include a mixture of uppercase and lowercase letters? (+2)
p) Have you ever shared your current password with a friend? (-3)

10. From the list below select the most-common reason and least-common reason that students’ online accounts are broken into each year:
-a password-cracking program is used to crack their password
-others who know personal things about the student guess their password MOST-COMMON
-students write their password down where others are able to see it
-students give their password to their friends, who then decide to use it or give it to others who use it
-other students see the password as the student enters it on a keyboard LEAST-COMMON

(Anna Carmichael 11-13)
11. I never knew the amount of damage that malware could do, to be honest I never really knew what malware was, but now I feel like I have a better understanding. Drive by downloads are programs that automatically install on to your computer without your knowledge or consent. This causes problems with malware, which is a software that is intended to damage or disable a computer. Some of the effects of drive by downloads and malware are programs showing up that you didn't download or unusual files. The attacker can send your computer to unhealthy sites that install more malware, and they can send spam to and from your email to unauthorized recipients.

To me that sounds like a whole lot of damage happening to you and your computer without your knowledge. I know there are some softwares out there that can help protect from things like drive by downloads and malware but I need to stay more up to date on them. I have not personally dealt with all that comes along with a drive by download but I do know someone who has. I feel like there should be a little more being done about this issue since you can never be one hundred percent sure that everything you do on your computer is safe, but being more mindful is a good first step.


 12.
 a) Authentic or Counterfit?
               -medium low risk
 b)  Are You an Unwitting Accomplice in Crime?
              -low risk
 c)  Is Your Computer Protected?
             -medium risk

13.  Arrest Made in Internet Gift Card Scheme

              This article talks about a website called Otartel.com. This website was run, with help from co-conspirators, by a man named Oleksandr Verovkin. Between May and December of 2007 Verovkin stole over 155,000 dollars from unsuspecting users. Otartel.com was set up as an online seller of retail gift cards, including places like Best Buy and Barnes and Noble. Hundreds of customers complained that there cards were never delivered although they were paid for. Some received their cards the first time but never got another. Oleksandr was arrested in the JFK Airport by the United States Postal Inspection service; for this scheme Verovkin was charged with conspiracy to commit mail and wire fraud. He will spend up to thirty years in jail or could be fined up to a million dollars for his crime.

No comments:

Post a Comment