1.Three social networking sites that are used to
form xonnections online and develop relations online are Facebook, instagram,
and twitter.
2.
Considering the consequences: At my local high school these group of girls
was bulling one girl with harsh comments towards her on Facebook. They had to
pay consequences by attending detention.
3.
In my own words I would define the following
words as:
a.
Sexting- is to send sexual messages or pictures
via text messages
b.
Cramming-used as a verb is to completely fill,
or used as a noun as to add fraudulent charges to one’s phone bill.
c.
Cookies- web: a message given to a web browser
by a web server. Baking: a flat sweet pastry.
i.
Source: webopedia.com, 2013
d.
Trajan horse- computer hacking program
i.
Source: Wikipedia.com, September 2013
e.
Phishing- to defraud an online account holder of
financial information
i.
Source: searchsecurity.techtarget.com, 2013
f.
Spyware: enables a user to obtain information of
another computer’s activities.
i.
Wikipedia.com, 2013
g.
Rootkit: set of software tools that enables a
computer to enter another computer’s software without being detected
i.
Source: Wikipedia, 2013
h. Zombie: a living dead person, or a tall mixed
drink
i.
Source: Wikipedia.com, 2013
4. ihaveonepairpants, boogerdude, or pig” portrays a sense of immaturity. These names give off a sense of carelessness.
5.
People
might have the tendency to harass those who have screen names such as
“inyoface,badyboy2, or imahottie.” The reason I feel this may be true is
because of the attitude is presents to others.
6.
Too much information given through the following
screen names consist of:
a.
Tom_evans34- full name and age
b.
Missy-13- name and age
c.
AndyKarateKid- name along with interest
d.
ViolinGirl- interest
e.
Restlinmantch- interest
7.
Good or poor choices for screen names:
a.
I8sushi2- good doesn’t reveal a name
b.
Soccerstar- good doesn’t give name or age
c. Puppygirl1234- poor has a sense of young girl
d.
Keke1995- poor gives a year of birth
e. Bookworm- good doesn’t reveal a name and age
f.
2bornot2b- poor portrays a sense of wildness
g. Choco-holic- good because it doesn’t reveal
personal information
h. Capitlofens- good because it confidential
i.
Amrcanidol2-
good because doesn’t portray personal information
j.
Bellaisbella- poor gives a name
k.
Darkangel666- poor gives off attitude
l.
Karla-love-1996- poor gives name, age, and shows
openness
m.
Simpyme- good no name
n.
Gun4hire- poor reveals negative attention
o.
Babyfacela- poor reveals a location
p.
Whatup?- poor shows the person is open to
conversation
8.
2ighieb3, ghieuuh, 7yhei8baud9
9.
My score was 0.
10.
The most common reason students’ online accounts
are broke into each year: students write their passwords where they can be seen
a.
Least common reason: others guess things about
that student
11.
Drive-by download video:
The video is very informational on how drive by
downloads can easily hack into your computer. They are assessed through
clicking on the popup sites. The malware damage can be very harmful to your
computer. It is very important to keep up to date with your security.
The video also displays how an infected computer works. It can easily load when you start up your computer. Popups are the most basic and common ways these can invade your computer. It is best to ignore these sites by closing them immediately.
The video also displays how an infected computer works. It can easily load when you start up your computer. Popups are the most basic and common ways these can invade your computer. It is best to ignore these sites by closing them immediately.
12.
Test results:
a.
Are you protecting your identity? Risk was low
b.
Is your computer protected? Risk was in the low
to medium range
c.
Are you at risk to be scammed through an
internet auction? Risk was low
13.
Malware installed on travelers’ laptops through
software updates on hotel internet connections:
Recent
analysis from the FBI have found that malicious actors are targeting travelers
through pop-up windows within internet connections in their hotel rooms. Recently,
there has been travelers’ laptops being infected with malicious software while
using hotel internet connections. The traveler was attempting to setup the
hotel room internet connection and was presented with a pop-up window notifying
the user to update a widely-used software product. Which was their big mistake!
In my opinion pop-ups are never a good thing. When I come in contact with one I
immediately close them. So in this case
if the user clicked the update, malicious software was installed on the laptop.
The FBI recommends that all government, private industry, and academic
personnel who travel abroad take extra caution before updating software
products on their hotel internet connections. This comes as a big shock to me. My
family and I never thought about these situations. However, we do know not to
click pop-ups.
No comments:
Post a Comment