(Danielle Laws 1-3)
1.
Facebook, Twitter, and Instagram.
2.
The kind of anonymity that is available on the Internet has
made many students forget that they need to filter any information that they
post. In fact, many colleges as well as potential employers tend to investigate
the social networking profiles of an applicant before they grant any acceptance
or an interview. And there are many students who are not constantly evaluating
the content which they are publishing online. All this can lead to negative
consequences even later on in their life.(http://www.business2community.com)
3.
Sexting- This is a form of communication by sending text
messages or emails of nude pictures sometimes involving sexual conduct. In most
cases the sender of the picture is the nude person in it.
Cramming-This is a method of tricking a computer into
running a java code.(Margaret Rouse, 2014, Cache cramming,TechTarget)
Cookie- This is information that a Web site will put on your
computer to remember you for later uses.(Margaret Rouse, 2014,
cookie,TechTarget)
Trojan Horse-This is a program where a harmful code is
inside what seems to be a harmless program or data and can do a form of damage
to a computer.(Margaret Rouse, 2014, trojan horse,TechTarget)
Phishing- This is an email fraud method in which the hacker
sends out an email that loos real but its only to gather personal and financial
information from the victims.(Margaret Rouse, 2014, Phishing ,TechTarget)
Spyware- This is a technology that helps in gathering
information about people without them knowing.(Margaret Rouse, 2014,Spyware
,TechTarget)
Rootkit-This is a collection of tools and allows only the
administrator-level access to a computer.(Margaret Rouse, 2014, rootkit
,TechTarget)
Zombie- This is a computer that a hacker has accessed and
set up to forward viruses to other computers.(Margaret Rouse, 2014,
zombie,TechTarget)
(Kelsey Messemore 4-6)
4.
Actual student screen name- too much information revealed
Trashmouth- it portrays the image of someone who uses inappropriate
language
IHaveOnePairPants- you only have one pair of pants? that
means you wear them every day-there's no way you wash them every single day
BoogerDude- it portrays the image of a male that has boogers
in his nose- not ok.
Pig- it portrays the image of a person who likes to eat a
lot, or it portrays the image that you are a nasty animal who always makes
messes
5.
InYoFace- what is in your face? and why is it there?
Badboy2u- people may try to test how "bad" of a
boy you are by picking on you
Lookin4Luv- if you're "lookin 4 luv" and it's so
important that you put it as your screen name it makes you look desperate
IMAHottie- ok first, please humble yourself. second, even if
you are confident that you're a "hottie" please don't brag about it.
Let others tell you that you're a "hottie"
FatMama- do I even have to explain?
suPaFlirt- NOBODY LIKES A "supa flirt"
6.
Tom_Evans34- full name and age maybe
Missy-13- name and age maybe
AndyKarateKid- name and hobby
ViolinGurl- hobby
restlinmatch- hobby
(Chere’ Diket 7, 8, and 10)
7. Good and bad choices for screen names.
-i8sushi2-good
-soccerstar-good
-puppergirl1234-good
-KeKe1995-bad
-Bookworm-good
-2BorNot2b-good
-Choco-holic-bad
-capitlOfens-bad
-AmrcanIdol2-good
-BellaIsabella-bad
-DarkAngel666-bad
-Karla-Love-1996-bad
-SimpyMe-good
-gUn4hiRe-good
-babyfaceLA-bad
-Watup?-good
8. Create three different screen names that you think will
meet all of the following guidelines: unlikely to attract negative attention,
free of bad language, don’t reveal too much personal information, don’t reveal
a name, age, or gender.
-basketballfan3265
-teacherspet23
-iloveschool436
(everyone)
9.How likely is it that a password can be cracked? A poor
score is a warning to create a new password immediately. Score: 4
a) Does your password include the name of a family member or
pet? (-3)
b) Does your password include the birth date of a family
member? (-3)
c) Does your password contain one or more words that could
be found in a dictionary (including French, Spanish, Italian, German)? (-3)
d) Does your password contain a random set of numbers? (+2)
e) Does your password have 8+ characters? (+2)
f) Does your password contain both letters and numbers? (+2)
g) Does your password have less than six characters? (-1)
h) Does your password contain one or more non-number,
non-letter characters, such as ! or = ? (+3)
i) Does your password contain the date of a well-known
event, such as the date a particular baseball team won the pennant? (-1)
j) Does your password contain at least three numbers in
numerical sequence, such as
"123"? (-2)
k) Does your password contain any word spelled backward?
(-1)
l) Is your password written on a piece of paper within 15
feet of your computer? (-2)
m) Does your password contain a word repeated more than
once? (-1)
n) Does your password contain your telephone number, zip
code, area code, or a portion thereof? (-2)
o) Does your password include a mixture of uppercase and
lowercase letters? (+2)
p) Have you ever shared your current password with a friend?
(-3)
10. From the list below select the most-common reason and
least-common reason that students’ online accounts are broken into each year:
-a password-cracking program is used to crack their password
-others who know personal things about the student guess
their password MOST-COMMON
-students write their password down where others are able to
see it
-students give their password to their friends, who then
decide to use it or give it to others who use it
-other students see the password as the student enters it on
a keyboard LEAST-COMMON
(Anna Carmichael 11-13)
11. I never knew the amount of damage that malware could do,
to be honest I never really knew what malware was, but now I feel like I have a
better understanding. Drive by downloads are programs that automatically
install on to your computer without your knowledge or consent. This causes
problems with malware, which is a software that is intended to damage or
disable a computer. Some of the effects of drive by downloads and malware are
programs showing up that you didn't download or unusual files. The attacker can
send your computer to unhealthy sites that install more malware, and they can
send spam to and from your email to unauthorized recipients.
To me that sounds like a whole lot of damage happening to
you and your computer without your knowledge. I know there are some softwares
out there that can help protect from things like drive by downloads and malware
but I need to stay more up to date on them. I have not personally dealt with
all that comes along with a drive by download but I do know someone who has. I
feel like there should be a little more being done about this issue since you
can never be one hundred percent sure that everything you do on your computer is
safe, but being more mindful is a good first step.
12.
a) Authentic or
Counterfit?
-medium
low risk
b) Are You an Unwitting Accomplice in Crime?
-low
risk
c) Is Your Computer Protected?
-medium
risk
13. Arrest Made in
Internet Gift Card Scheme
This
article talks about a website called Otartel.com. This website was run, with
help from co-conspirators, by a man named Oleksandr Verovkin. Between May and
December of 2007 Verovkin stole over 155,000 dollars from unsuspecting users.
Otartel.com was set up as an online seller of retail gift cards, including
places like Best Buy and Barnes and Noble. Hundreds of customers complained
that there cards were never delivered although they were paid for. Some
received their cards the first time but never got another. Oleksandr was
arrested in the JFK Airport by the United States Postal Inspection service; for
this scheme Verovkin was charged with conspiracy to commit mail and wire fraud.
He will spend up to thirty years in jail or could be fined up to a million
dollars for his crime.
No comments:
Post a Comment