Sunday, September 22, 2013

9. Safe Practices for Life Online


1.Three social networking sites that are used to form xonnections online and develop relations online are Facebook, instagram, and twitter.

2.       Considering the consequences:  At my local high school these group of girls was bulling one girl with harsh comments towards her on Facebook. They had to pay consequences by attending detention.

3.       In my own words I would define the following words as:

a.       Sexting- is to send sexual messages or pictures via text messages

b.      Cramming-used as a verb is to completely fill, or used as a noun as to add fraudulent charges to one’s phone bill.

c.       Cookies- web: a message given to a web browser by a web server. Baking: a flat sweet pastry.

                                                            i.      Source: webopedia.com, 2013

d.      Trajan horse- computer hacking program

                                                             i.      Source: Wikipedia.com, September  2013

e.      Phishing- to defraud an online account holder of financial information

                                                         i.      Source: searchsecurity.techtarget.com,  2013

f.        Spyware: enables a user to obtain information of another computer’s activities.

                                                           i.      Wikipedia.com, 2013

g.       Rootkit: set of software tools that enables a computer to enter another computer’s software without being detected

                                                           i.      Source: Wikipedia, 2013

h.   Zombie: a living dead person, or a tall mixed drink

                                                           i.      Source: Wikipedia.com, 2013

4. ihaveonepairpants, boogerdude, or pig” portrays a sense of immaturity.  These names give off a sense of carelessness.

5.        People might have the tendency to harass those who have screen names such as “inyoface,badyboy2, or imahottie.” The reason I feel this may be true is because of the attitude is presents to others.

6.       Too much information given through the following screen names consist of:

a.       Tom_evans34- full name and age

b.      Missy-13- name and age

c.       AndyKarateKid- name along with interest

d.      ViolinGirl- interest

e.      Restlinmantch- interest

7.       Good or poor choices for screen names:

a.       I8sushi2- good doesn’t reveal a name

b.      Soccerstar- good doesn’t give name or age

c.     Puppygirl1234- poor has a sense of young girl

d.      Keke1995- poor gives a year of birth

e.     Bookworm- good doesn’t reveal a name and age

f.        2bornot2b- poor portrays a sense of wildness

g.      Choco-holic- good because it doesn’t reveal personal information

h.   Capitlofens- good because it confidential

i.          Amrcanidol2- good because doesn’t portray personal information

j.        Bellaisbella- poor gives a name

k.       Darkangel666- poor gives off attitude

l.         Karla-love-1996- poor gives name, age, and shows openness

m.    Simpyme- good no name

n.      Gun4hire- poor reveals negative attention

o.      Babyfacela- poor reveals a location

p.      Whatup?- poor shows the person is open to conversation

8.       2ighieb3, ghieuuh, 7yhei8baud9

9.       My score was 0.

10.   The most common reason students’ online accounts are broke into each year: students write their passwords where they can be seen

a.       Least common reason: others guess things about that student

11.   Drive-by download video:

          The video is very informational on how drive by downloads can easily hack into your computer. They are assessed through clicking on the popup sites. The malware damage can be very harmful to your computer. It is very important to keep up to date with your security.

       The video also displays how an infected computer works. It can easily load when you start up your computer. Popups are the most basic and common ways these can invade your computer. It is best to ignore these sites by closing them immediately.

12.   Test results:

a.       Are you protecting your identity? Risk was low

b.      Is your computer protected? Risk was in the low to medium range

c.       Are you at risk to be scammed through an internet auction? Risk was low

13.   Malware installed on travelers’ laptops through software updates on hotel internet connections:

Recent analysis from the FBI have found that malicious actors are targeting travelers through pop-up windows within internet connections in their hotel rooms. Recently, there has been travelers’ laptops being infected with malicious software while using hotel internet connections. The traveler was attempting to setup the hotel room internet connection and was presented with a pop-up window notifying the user to update a widely-used software product. Which was their big mistake! In my opinion pop-ups are never a good thing. When I come in contact with one I immediately close them.  So in this case if the user clicked the update, malicious software was installed on the laptop. The FBI recommends that all government, private industry, and academic personnel who travel abroad take extra caution before updating software products on their hotel internet connections. This comes as a big shock to me. My family and I never thought about these situations. However, we do know not to click pop-ups.

No comments:

Post a Comment