Preview (15 of 51 pages)

This Document Contains Chapters 7 to 8 Technology Now Chapter 7: The Connected Computer Chapter Review INTRODUCTION TO NETWORKS 1. What are the two main types of network architecture? Briefly describe each one. Answer: Peer-to-peer and client/server. A peer-to-peer network is best suited for networks of 10 or fewer computers, like those found in homes or small offices. Each computer maintains its own files and software. All computers have the same capabilities and responsibilities, but share resources and peripherals such as printers. In a client/server network, one central computer, called the server, controls access to network resources. 2. What do you call a network that spans long distances? Give two examples of areas where such a network would be appropriate. Answer: A wide area network (WAN) covers a large geographic region. A WAN is appropriate for a state, country, or other large area where data needs to be transmitted over long distances. Examples include multinational company, governments, and national retail chain. 3. What type of network connects digital devices within about 30 feet of each other? Give one example. Answer: A personal area network (PAN) connects personal digital devices within a range of about 30 feet (9 meters). Bluetooth is the example in the chapter. 4. Give three examples of network standards, and state how each one might be used. Answer: Network standards specify the way computers access a network, the type(s) of hardware used, data transmission speeds, and the types of cable and wireless technology used. See Table 7-3 below for examples. 5. What piece of hardware lets your computer connect to networks? Answer: To connect to a network, your computer might need a network interface card (NIC), which can be wired or wireless. 6. What do you call a company that connects you to the Internet? Answer: Once you have connected to your local network, you need a way to connect to the Internet, which you do through an Internet service provider (ISP). HOW NETWORKS WORK 7. What lets your laptop, tablet, or smartphone connect to the Internet in a coffee shop? Answer: Wi-Fi hotspots let you connect your Wi-Fi-enabled laptop, tablet, or smartphone to the Internet in a public space such as a coffee shop or library. 8. What is a modem? Name three types of modems. Answer: A modem is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer. Examples include Cable modems, DSL modems, Wireless modems. 9. Describe the purpose of a network protocol and give an example. Answer: For network devices to communicate with each other, they must follow a common set of rules, or protocols. TCP/IP is the protocol example in the chapter. TYPES OF NETWORKS 10. Name three types of network topologies and briefly describe the layout of each one. Answer: Network topologies include star, bus, ring, and mesh networks, as well as combination topologies. 11. Describe why one might need a combination topology, and give an example. Answer: Some networks combine topologies to connect smaller networks and form one larger network. Examples include tree topology, full mesh topology and partial mesh topology. 12. How does a client/server network differ from a peer-to-peer network? Answer: On a client/server network, one or more computers acts as a server, a computer on a network that controls access to hardware, software, and other resources. The other computers on the network request services from the server. Some servers provide centralized storage for programs, data, and information. The clients are other computers and mobile devices on the network that rely on the server for their resources. Peer-to-peer (P2P) networks are networks of equals (peers), and typically have fewer than 10 computers. They are less expensive and easier to set up than client/server networks because they have no dedicated servers (servers that only serve the network, and are not shared). P2P networks do not use a central network server. Each peer maintains its own operating system, application software, and data files. Peers can share files and peripheral devices such as printers with peers. THE INTERNET 13. Name three services available over the Internet. How might you use each service in your daily life? Which of the services do you use most often and why? Answer: People use the Internet every day for tasks such as visiting Web sites to listen to music, do their banking, and stay in touch with family and friends. Student answers will vary. 14. Describe three Internet services you can use to communicate with colleagues or friends. What are the key benefits of each service? How are the three services different from each other? Answer: VoIP, Email, Text messaging, Chatting, Multimedia messaging are possible services. Possible answers include those listed in Table 7-6. THE NETWORKED WORLD 15. Why would you use the following types of communication? Give a brief example of a good use of each: email, Web conference, VoIP, text messaging, chatting, and multimedia messaging. Answer: Answers and examples will vary, however, three answers are in Figure 7-19. 16. Briefly define social networking. How might a recent college graduate use social networking after taking a job 100 miles from her school? How might a family with grown children living 100 miles apart might use social networking to keep in touch? Answer: Social-networking Web sites have changed the way people interact, form and maintain relationships, find jobs, promote careers, and communicate with each other. Through Facebook, Twitter, LinkedIn, Google+, and other sites, people communicate by sharing ideas, photos, videos, and links to other Web sites. 17. What is the difference between hackers and crackers? How do hackers and crackers gain unauthorized access to a computer? Answer: A hacker uses computers to access data without authorization, often illegally. Crackers use computers to destroy data, steal information, and commit other malicious crimes. If hackers gain unauthorized access to networked computers, they can take over the computers and turn them into zombies, which are computers controlled by outsiders without the owners’ knowledge. After creating a zombie, a hacker can install a bot, a program that performs a repetitive task such as sending phishing email messages. The hacker can also group these zombies together to form a botnet, which would send out massive amounts of phishing messages, for example. 18. What are the common forms of malware and how does it infect a computer? Answer: Common forms of malware are shown below in Table 7-9 with a description of each. NETWORK SECURITY BASICS 19. What are three common-sense strategies for securing a home network? Answer: Create strong passwords for your home network. Include at least eight characters, numbers, letters, or symbols that are not easy to figure out. Set permissions to determine who can access which resources. Limit access as much as you can. Do not write usernames and passwords in places where they can be found by others. Enable the highest level of encryption, such as WPA2 or WPA-TKIP, for a wireless router, and change the router’s default administrator password. 20. How do encryption and firewalls protect network data? Answer: Encryption scrambles or codes data as it is transmitted over a network. If intruders intercept a file in transit, they cannot make sense of the data they find. Firewalls are designed to block intruders from accessing corporate or personal networks. If you have an always-on connection to the Internet, you can be vulnerable to intrusions. Personal firewalls constantly monitor all network traffic to keep your network secure. Test Your Knowledge Now 1. A circuit board with special electronic circuits that connects a computer to a network is called a: a. router b. hub c. network interface card (NIC) d. switch 2. A network architecture in which all computers are equal in capability and responsibility is called a: a. peer-to-peer network b. client/server network c. wireless access point d. wide area network 3. A company that offers Internet access to individuals and businesses is a(n): a. network service provider b. Internet backbone c. Internet service provider d. wide area network 4. The most common networking standard for wired networks is: a. Wi-Fi b. Ethernet c. Bluetooth d. 4G 5. The hardware that sends and receives data and information to and from a digital line is a(n): a. digital modem b. network interface card c. Internet service provider d. Wi-Fi hotspot 6. Which network standard lets devices communicate wirelessly over short distances? a. Ethernet b. Bluetooth c. Phoneline d. 4G 7. Which of the following network types uses radio signals to connect computers and devices? a. Wi-Fi b. Ethernet c. modem d. DSL modem 8. RJ-11, RJ-45, and USB are all examples of: a. connectors b. cables c. domain controllers d. ports 9. What type of network has all devices attached in a line to a central cable: a. ring b. star c. bus d. mesh 10. A networked computer that controls access to hardware, software, and other network resources is called a: a. client b. server c. router d. modem 11. You click a(n) _____ to go from one Web page to another. a. link b. URL c. window d. app 12. You use ____ when your telephone calls travel over the Internet instead of using traditional phone systems. a. cell towers b. VoIP c. Wi-Fi d. cloud computing 13. With _____ computing, you can access files and applications over the Internet. a. cellular b. VoIP c. Wi-Fi d. cloud 14. Chat groups, Web conferencing, and VoIP are examples of _________ communication. a. asynchronous b. synchronous c. VoIP d. Web 2.0 15. Text messaging is based on _________ technology. a. URL b. SMS c. NAS d. ISP 16. A(n) ________________ is a type of cybercrime in which hackers steal your personal information, such as bank account numbers. a. botnet b. identity theft c. Trojan horse d. denial of service attack 17. The type of malware that copies itself repeatedly, using up computer and network resources, is called a(n) ______________. a. virus b. cookie c. Trojan horse d. worm 18. Which one of the following is not a network authentication method? a. password b. CAPTCHA system c. fingerprint reader d. firewall 19. You use a(n) _____________ to scramble and unscramble the data being transmitted between wireless devices. a. wireless network key b. biometric device c. ID card with a barcode d. wireless router 20. _____________ constantly monitor all network traffic to keep your network secure. a. Modems b. Firewalls c. Biometric scanners d. Spyware programs 21. In the space next to each image below, write the letter of the phrase that describes it: a. A central point for cables in a network b. Directs the flow of information along a network c. Connects a device to an Ethernet network d. A device that sends and receives data to and from a digital line e. A card that connects a computer to a network [Comp: Use EOC Figures 1-5 for these images—see the art manuscript] Try This Now 1: Test Your Home and School Network’s Performance Your local Internet service provider offers different connection options. You should test your network connection to confirm it uses the speed you purchased. Test the speed of your wireless or wired network at your home, workplace, or local coffee shop and compare it to the speed of your school’s network. Open your browser on any computer and then visit the speedtest.net Web site. Tap or click the Begin Test button to test the performance of each network. The test may take up to a minute to complete. a. How did the speed of your home, workplace, or local coffee shop compare with the speed of your school’s network? Share the download and upload speeds of each location. Answer: Answers will vary at the time of completion, but a sample solution includes similar data from speedtest.net: b. Describe three Internet activities that would be best on the faster network speed. Answer: Answers will vary, but a sample solution includes: Gaming, streaming video, skype, video conferencing, file downloads Here are three Internet activities that benefit significantly from faster network speeds: 1. Streaming High-Definition Videos: Streaming services like Netflix, YouTube, and Hulu offer content in high-definition (HD) and 4K resolution. Faster network speeds ensure smoother playback without buffering or quality degradation, providing a better viewing experience. 2. Online Gaming: Many online games require real-time interaction between players and the game server. High-speed Internet reduces lag and latency, ensuring more responsive controls and a more enjoyable gaming experience. 3. Large File Downloads and Uploads: Transferring large files, such as software updates, high-resolution images, or large data backups, is much quicker with a faster network. This is especially beneficial for professionals who regularly work with large datasets or media files. 2: Locate Local Free Wi-Fi Hotspots Knowing the location of a free Wi-Fi connection in your local area can assist you if you ever lose Internet connectivity in your home or dorm. Open your browser on any computer and then visit the openwifispots.com Web site. Enter the name of your closest populated town or city to locate free Wi-Fi hotspots. Try another city if you do not find a listing of hotspots. Sample Solution: a. What is the name of the town or city that you researched? Answer: Arlington b. How many free Wi-Fi hotspots did you find? Answer: 4 c. Copy and paste the listing of free Wi-Fi hotspots from the Web site into a word-processing document. Answer: 3: Create a Free Video Email Note: This assignment requires a mobile device with a camera or a computer with a Web cam. Connecting through a video email message adds a personal and professional touch within the business environment. Eyejot is an easy way to send and receive video email from your computer (PC or Mac) or mobile device, such as an Apple iPhone, iPod Touch, or Android smartphone. Open the browser on any computer and visit the eyejot.com Web site or install the free Eyejot app on your smartphone. Create a free Eyejot account. Record a one-minute video to your instructor using Eyejot about the interesting facts you learned about the connected computer. Send the video email to your instructor. a. Write a paragraph describing an example of how you could use video email in a business setting. Answer: Answers can include any of the following: Internal emails can function as an effective communication for sharing basic information, such as new cafeteria prices, paper use guidelines or security precautions, for example. Sending simple messages to an entire workforce with just the click of a mouse is fast, easy, convenient and can save the company money. If saved, the email can function as proof of a message sent or received, and is easily accessible to remind the recipient of pertinent information. Many businesses use email as part of its marketing efforts to share information with prospects, customers, vendors. (http://smallbusiness.chron.com/use-email-business-communication-118.html) Video email can be a powerful tool in a business setting for enhancing communication and personal connection. For instance, imagine a project manager needs to update team members on a critical project milestone but also wants to convey the excitement and significance of the achievement. Instead of sending a traditional text-based email, the manager could record a short video message summarizing the progress, highlighting key accomplishments, and thanking the team for their hard work. This approach not only provides a more engaging and personal touch but also allows team members to see and hear the manager's enthusiasm and appreciation, fostering a stronger sense of connection and motivation. Video email can also be used for delivering feedback, making introductions, or explaining complex information, making it a versatile tool in the professional communication toolkit. b. Which device did you use to create your video email? What was your experience? Answer: Answers will vary, including: computer web cams, smartphone cameras, and stand-alone digital video cameras. I used my computer with a webcam to create the video email. The experience was quite straightforward and user-friendly. Setting up the video was easy with the Eyejot website; it allowed me to record directly from my webcam without needing any additional software. The video quality was clear, and the recording process was smooth. I was able to review the video before sending it, ensuring that everything was just right. Overall, it was a convenient and efficient way to create a personal and professional message. Critical Thinking Now 1: Thinking Through Your Home Network After moving to a new apartment complex, you are faced with setting up a wireless home network for your iPad, Windows ultrabook, and your Android phone. Your local neighborhood has DSL available. You are on an electronics retailer’s Web site looking for the equipment that you will need to set up your home wireless network. Create a shopping list with the items necessary to create your wireless home network, the retail price, and the steps that you would follow to connect your devices to the wireless network. Answer: Answers will vary depending on what the student selects. Possible solutions include: Router $50 NIC $25 Modem $50 Firewall $100 Cables $10 Components should be connected similar to Figure 7-8. Shopping List for Setting Up a Wireless Home Network 1. DSL Modem • Retail Price: $60 - $100 • Description: Connects to the DSL line provided by your ISP to provide internet access. 2. Wireless Router • Retail Price: $50 - $150 • Description: Distributes the internet connection wirelessly to your devices and can provide additional features like security and network management. 3. Ethernet Cable (1-2 meters) • Retail Price: $10 - $15 • Description: Used to connect the modem to the router for initial setup. 4. Power Strip • Retail Price: $15 - $25 • Description: Provides additional outlets for connecting the modem, router, and other devices. 5. Surge Protector (optional) • Retail Price: $20 - $40 • Description: Protects your equipment from electrical surges. Steps to Connect Your Devices to the Wireless Network 1. Set Up the DSL Modem: • Connect the DSL modem to your phone line using the DSL cable. • Plug in the power adapter and turn on the modem. • Wait for the modem to sync with the DSL network (usually indicated by a stable connection light). 2. Connect the Wireless Router: • Use an Ethernet cable to connect the modem to the WAN (Wide Area Network) port on the wireless router. • Plug in the router's power adapter and turn it on. • Wait for the router to boot up and establish a connection (indicated by stable lights on the router). 3. Configure the Wireless Router: • Connect a computer or laptop to the router using another Ethernet cable or wirelessly (if available). • Open a web browser and enter the router’s IP address (usually found in the router’s manual or on a sticker on the router). • Log in to the router's configuration page using the default username and password (also found in the manual or on the router). • Follow the setup wizard or manual instructions to configure your wireless network name (SSID) and password. • Save the settings and reboot the router if necessary. 4. Connect Devices to the Wireless Network: • On your iPad, Windows ultrabook, and Android phone, go to the Wi-Fi settings. • Find the network name (SSID) you set up in the list of available networks. • Select your network and enter the password you created. • Once connected, your devices should automatically connect to this network in the future. 5. Test the Connection: • Open a web browser on each device to ensure that you have internet access. • Verify that all devices are able to connect to the network and browse the internet without issues. This setup should give you a functional and secure wireless network for your devices. 2: Protecting Your Wireless Home Network After reading this chapter, you realize that the wireless network in your home is not secure. Unauthorized users could sit outside your home and perform illegal activities on your home network in your name. In addition, they may be able to view your personal files and slow down your network speed considerably. Write a paragraph including at least four steps that will secure your home wireless network. Answer: Create strong passwords for your home network. Include at least eight characters, numbers, letters, or symbols that are not easy to figure out. Set permissions to determine who can access which resources. Limit access as much as you can. Do not write usernames and passwords in places where they can be found by others. Enable the highest level of encryption, such as WPA2 or WPA-TKIP, for a wireless router, and change the router’s default administrator password. 3: World Cup Biometric Security The FIFA World Cup Football Tournament is investigating ways to confirm the identity of the ticket holders. FIFA is warning soccer fans to beware of fraudulent online ticket sales for the next World Cup as it works with international agencies to use biometric security to address the problem. Write a three-paragraph proposal, with each paragraph describing one of three biometric security technologies that could be used to determine ticket holder authentication. Research the pros and cons of each of these biometric technologies. Admissions Answer: Answers will vary, but should touch on the following: In theory, biometrics are a great way to authenticate a user: it's impossible to lose your fingerprint (barring the most gruesome of developments), you can't forget it like you could a password, and it's unique to you. In practice, though, there are so many things that, for now, limit a more widespread use of this technology. One of the problems has been pointed out by Guy Churchward, CEO of LogLogic. He says that it is its uniqueness the thing that makes using biometric data an inherently flawed choice for a primary method of authentication. "Once you have your fingerprint scanned it will give a unique data sequence which if compromised is not exactly something you can change," he says. "Imagine having an option of only one password 'ever'. One loss and you are screwed." Another problem is that current scanners still can't recognize if the fingerprint is on a real finger or an artificial one. Andrew Clarke, of e-DMZ Security, says that in theory, one could get a hold of the user's fingerprint using techniques used in crime detection and transfer it on an artificial finger. This will likely change as the technology evolves, but for now the system is still fallible, and not suitable to be a primary solution to the authentication problem. “As with all authentication, multiple factors increases the effectiveness of the solution. Something you have (fingerprint) combined with something you know (passcode) provides a stronger solution,” he says. According to SC Magazine, David Ting, CTO of Imprivata, sees the good side of this kind of authentication. Saying that the contents of any computer should be encrypted, and the access to its content secured by a password AND by biometrics. According to him, a biometric password is infinitely more difficult to recover using a brute force attack than a "normal" password. He is in favor of using a complex passwords initially to thwart cracking, and as regards the secure access to the Windows logon, biometric, one-time password tokens or smartcards should be used because of the aforementioned reason. (http://www.net-security.org/secworld.php?id=8922) Proposal for Biometric Security Technologies for FIFA World Cup Ticket Authentication 1. Fingerprint Recognition: Fingerprint recognition is a widely adopted biometric technology due to its simplicity and reliability. This system captures the unique patterns of ridges and valleys on an individual's fingertips using fingerprint scanners. The primary advantage of fingerprint recognition is its high accuracy and low false acceptance rate, making it a strong candidate for secure ticket authentication. Additionally, fingerprint scanners are relatively affordable and easy to deploy at entry points. However, there are drawbacks, including the potential for fingerprint spoofing using high-resolution images or molds. Furthermore, the technology may encounter issues with dirt, sweat, or injuries affecting the accuracy of scans. 2. Facial Recognition: Facial recognition technology uses algorithms to identify and verify individuals based on their facial features. This method has the advantage of being non-intrusive, as it requires no physical contact and can quickly scan large crowds. Advanced facial recognition systems offer high accuracy and can operate in various lighting conditions. However, this technology is not without its challenges. It can be susceptible to errors caused by changes in appearance, such as wearing glasses or facial hair. Additionally, facial recognition systems may raise privacy concerns and face scrutiny over data protection regulations, as they involve capturing and processing biometric data. 3. Iris Recognition: Iris recognition involves scanning the unique patterns in the colored part of the eye, known as the iris. This technology offers exceptional accuracy and a low false acceptance rate because the iris patterns are highly distinctive and stable throughout an individual's life. Iris recognition systems are also effective in high-security environments and can work at a distance, making them suitable for large-scale events like the World Cup. However, the high cost of iris recognition systems and the need for specialized equipment may be prohibitive. Additionally, the technology requires the individual to be relatively still during the scan, which could be challenging in a busy or crowded setting. In conclusion, each biometric security technology—fingerprint recognition, facial recognition, and iris recognition—offers distinct advantages and challenges. The choice of technology will depend on factors such as cost, accuracy, ease of deployment, and user experience. Implementing these systems effectively can enhance security and reduce the risk of fraudulent ticket sales at the FIFA World Cup. Ethical Issues Now Today is the day you move into your new apartment. As soon as you find your tablet among your moving boxes, you power it up to check the available balance at your online bank before you accidentally overdraw your account. You realize that you have not contacted a local Internet service provider to set up service. Out of curiosity, you check to see if any unsecure wireless networks are available in your apartment building. The very strongest wireless network is named ThirdFloorBen and it is not secure. a. How should you handle this ethical dilemma? Answer: Answers will vary, however, the student can decide to: 1. Not use the network, 2. Visit Ben on the 3rd floor and ask for permission to use temporarily, 3. Use the network without asking. The ethical approach in this situation is to avoid using the unsecured wireless network without permission. Although the network is openly accessible, using it without explicit consent is considered unethical and potentially illegal. Instead, you should contact a local Internet service provider to set up your own connection. Respecting others' property and privacy is crucial, and unauthorized use of someone else’s network can lead to trust issues and legal complications. If you're in urgent need of internet access, consider using mobile data or visiting a public place with free, secure Wi-Fi until your own service is established. b. What might happen if you use the unsecured network? Answer: Answers will vary depending on what the student decides to do. If they choose to use the network, data is unsecured and data theft and/or identity theft could occur. Using an unsecured network, especially without permission, can lead to several issues. Firstly, you risk potential legal consequences if the network owner decides to take action against unauthorized access. Additionally, your activity on an unsecured network could be monitored or intercepted by others, leading to security risks such as data theft or identity fraud. There's also the ethical concern of violating the privacy and trust of the network owner. Moreover, network owners might notice unusual activity or bandwidth usage, which could alert them to unauthorized access. c. If your neighbor Ben introduces himself later in the day in the third floor hallway, how would you handle the issue of his open wireless network? Answer: Answers vary depending on previous decision. When you meet Ben, it’s a good opportunity to address the open wireless network politely. You could say something like, “Hi Ben, I noticed that your wireless network is open and available. I didn’t use it, but I was curious if you’re aware of the security risks associated with an unsecured network. If you’re interested, I can recommend some resources or help you set up a secure network to protect your privacy.” This approach shows respect and consideration for Ben’s security while offering assistance. It’s important to frame the conversation positively and avoid making any assumptions or accusations about his network setup. Team Up Now – Identity Rip Off Zoe Chambers, a college freshman, is a victim of identity theft. No one ever plans to have their identity stolen, but ignorance can unfortunately lead to years of credit score recovery and legal tape. Cassidy Collins, a friend of Zoe’s roommate, stayed for the weekend last month in their dorm. Cassidy used Zoe’s tablet several times over the weekend with Zoe’s permission. Days later, Zoe realized that her online bank balance was much lower than expected. In addition, Zoe received three separate email messages from different credit card companies saying that she had been approved and the new credit cards had been mailed to an unknown address. (Later, she discovered this was Cassidy’s home address.) a. Each member of the team should develop a hypothesis of how it was possible for Cassidy to steal Zoe’s identity. Create a combined document of the individual hypotheses. Answer: Answers will vary, however they should all point to Cassidy using Zoe’s tablet without permission and accessing web sites that Zoe had saved log-in information for on the tablet. Combined Hypotheses on Identity Theft 1. Hypothesis: Unauthorized Access via Tablet Cassidy may have exploited Zoe’s tablet while staying in the dorm. If Cassidy accessed Zoe’s personal information—such as saved passwords, banking apps, or credit card details—she could have used this information to commit identity theft. Given that Zoe’s tablet was not secured with strong passwords or encryption, Cassidy might have been able to view or copy sensitive data easily. 2. Hypothesis: Email or Account Compromise Cassidy could have accessed Zoe’s email or online banking accounts if Zoe's tablet was logged into these accounts during Cassidy’s visit. If Cassidy had access to Zoe’s email or account credentials, she might have used them to apply for credit cards and other financial services in Zoe’s name, leading to the fraudulent activity. Cassidy could have obtained these credentials either through direct observation or by using malware or spyware if Zoe’s tablet was compromised. 3. Hypothesis: Social Engineering and Personal Information Collection During her stay, Cassidy might have gathered personal information about Zoe, either through direct conversation or by observing Zoe’s habits. Cassidy could have used this information to answer security questions or authenticate transactions. For example, if Zoe shared personal details or frequently used the same passwords across different sites, Cassidy could have used this information to initiate fraudulent activities. 4. Hypothesis: Use of Saved Information If Zoe’s tablet had autofill or saved login credentials for financial accounts or online shopping sites, Cassidy might have accessed this information without Zoe’s knowledge. By using the saved login details, Cassidy could have applied for credit cards or made unauthorized transactions using Zoe’s identity. b. Research what Zoe should do now. Name at least four steps that Zoe should take to investigate this crime. Answer: Answers will vary, below are steps to take from the FBI Web site (http://www.fbi.gov/about-us/investigate/cyber/identity_theft): Step One: Contact the fraud department of the three major credit bureaus •Experian (TRW) 888-397-3742 •TransUnion 800-680-7289 •Equifax 800-525-6285 Step Two: Contact the account issuer in question •Ask for the fraud/security department of the compromised or fraudulent account issuer. •Notify them by phone and in writing. •Close all tampered or fraudulent accounts. •Ask about secondary cards. Step Three: Contact your local police department •Notify the police department in the community where the identity theft occurred. •Obtain copies of all police reports made. Keep a detailed log of all contacts: •Location called. •Name of person(s) you spoke to. •Title and call back number with extension. •Ask and write down what the procedures are for that entity. Steps Zoe Should Take to Investigate the Crime 1. Contact Financial Institutions: • Zoe should immediately contact her bank and credit card companies to report the unauthorized transactions and the identity theft. She should request to freeze or close any accounts that have been compromised and inquire about any suspicious activity linked to her accounts. 2. File a Police Report: • Zoe should file a report with her local police department. A police report provides official documentation of the crime, which is often required by financial institutions and credit bureaus to dispute fraudulent charges and clear her name. 3. Place a Fraud Alert: • Zoe should place a fraud alert on her credit reports with the major credit bureaus (Equifax, Experian, and TransUnion). This alert will notify creditors to take extra steps to verify her identity before opening new accounts in her name. She can also request a credit freeze to prevent new credit accounts from being opened. 4. Review Credit Reports: • Zoe should obtain and review her credit reports from the major credit bureaus to check for any unauthorized accounts or transactions. This will help her identify the full extent of the identity theft and ensure that any fraudulent accounts are addressed. By taking these steps, Zoe can begin the process of recovering her identity and minimizing the damage caused by the theft. c. What are several action items that Zoe should do each month to monitor her credit? Answer: 1. Safeguard Your Social Security Number (SSN) Social Security Numbers are the entry point for identity theft. They are the key to your personal and financial information. For this reason, it is not recommended that SSNs be carried in wallets or purses. You should also not write on a piece of paper your SSN to later place it in your wallet or purse. Question anyone who asks to know your SSN. Other personal identifying information to safeguard includes passport, birth certificate, driver license, voter registration card, alien registration card, and other forms of identification. 2. Protect Your Other Personal Information The first step in protecting your information is to properly secure personal information such as SSN, credit card numbers, bank and brokerage accounts, retirement accounts, birth certificate, voter registration card, alien registration card, and others. The following are other steps to take to protect your personal information. 3. Review Your Credit Reports The best way to learn if you are a victim of identity theft is by carefully reviewing your consumer credit report on an ongoing basis. This minimizes potential damage because identity theft is detected earlier. The Fair Credit Reporting Act allows consumers to obtain a free copy of their credit report once a year per credit reporting bureau. To continuously self-monitor your credit from the three major credit bureaus, Equifax (www.equifax.com), Experian (www.experian.com), and TransUnion (www.transunion.com) order one report in January, a second one in May, and the third one in September. You should also review the credit reports of your under age children just in case their personal information has been compromised by identity thieves. 4. Buy a Good Shredder and Use It The shredder is the easiest, relatively inexpensive, and best method to protect yourself from dumpster diving. By shredding items such as preapproved credit card offers, convenience checks, bank statements, canceled checks, deposit slips, receipt for prescriptions, and correspondence that mentions confidential information such as SSNs and other information, you are preventing someone from obtaining, from your trash, your personal information. 5. Reduce Your Exposure to Mail Theft Mail theft is a significant threat to your identity. To protect your mail from theft, it is recommended that you use a locking mailbox. If this cannot be obtained, consider using a Post Office box or a box at a private mail receiving agency, such as The UPS Store. Other measures to protect yourself from becoming a victim of mail theft include: 6. Practice Computer and Internet Safety The internet is your entrance to the marketplace for the world from the comfort of your home or office. When it comes to identity theft and fraud, there are safety concerns to address because organized identity theft groups constantly try to remotely load spyware, malware, Trojan horses, and botnets on victim computers. These programs transmit your keystrokes and other stored computer files to suspects. 7. Be Cautious at ATMs Identity thieves have been known to place skimming devices over ATM slots to steal card account information. To protect your PIN number and other information, do the following: •Look for suspicious devices on the front of the ATM. Check for exposed wires, tape, or loose connections. Look for hidden cameras on the sides of the ATM that criminals use to records ATM passwords. 8. Opt Out of Sharing Your Information In this information age, information about you is frequently shared with multiple business partners for product offerings, services, and promotions. You have the choice regarding how much information you want to share with marketing firms, companies, and certain government agencies. To help you “opt out” of information sharing related to credit bureaus, various state departments of motor vehicles, and direct marketers, the FTC created a one-page information site that provides detailed information and links. The URL address is www.ftc.gov/privacy/protect.shtm. d. Research and summarize five signs that you may be a victim of identity theft. Answer: Refer to http://www.privacymatters.com/identity-theft-information/identity-theft-victim-5-warning-signs.aspx 1. Your bills and other financial statements don't arrive. If your regular credit card, utility and other financially oriented bills and statements don't arrive on their usual schedule(s), someone might have changed the address. 2. There are checks missing from your checkbook. Identity theft fraud is not limited to the computer. Plenty of opportunistic identity thieves may also be skilled pickpockets. If you keep a very well-organized checkbook and you find any checks missing or unaccounted for, look things over again. If there are still checks missing, your identity may have been stolen. 3. You have a debt collection agency after you. The top identity thieves are experts at "pinning the blame on someone else." Could that someone be you? If you have a collection agency hounding you for debts you know aren't yours, your identity may well be in danger. 4. You apply for credit and are turned down. If you apply for credit and are flatly denied, something might be wrong. 5. You receive a credit or charge card you know you never applied for. Identity theft is an invasion of your privacy in many ways. If someone out there has your personal information, they might as well be you. Keep that in mind if you receive a welcome letter and credit card from a company you don't recall contacting. e. Identify a YouTube video that would be best to share at Zoe’s dorm for others not to fall victim to the same risk. Answer: At the time of writing, this video is available on YouTube. How to Prevent Identity Theft For College Students http://youtu.be/GNQ843up4_M A highly relevant YouTube video to share at Zoe’s dorm to help others avoid falling victim to identity theft is: Video Title: "How to Prevent Identity Theft: 10 Easy Tips to Protect Yourself" Channel: IdentityTheft.gov Link: [How to Prevent Identity Theft: 10 Easy Tips to Protect Yourself](https://www.youtube.com/watch?v=IHc4XNB3rhQ) Description: This video provides practical tips and advice on how to protect personal information and avoid identity theft. It covers essential topics such as securing devices, managing passwords, and monitoring credit reports. Sharing this video can help increase awareness among students about the importance of safeguarding their personal data and the steps they can take to prevent similar incidents. Technology Now Chapter 8: Safety and Security Chapter Review PERSONAL HEALTH RISKS 1. Define “ergonomics” and give one example. Answer: Ergonomics is the study of safe and efficient working environments. Examples include: • When sitting at a desktop computer, adjust the height of your chair so that your arms and knees form right angles and your eyes are even with the top third of the monitor. • Position the keyboard so that your wrists are straight while typing. • When using laptops and tablets, use a stand or hard binder to raise the device so that you work with the keyboard or tablet screen at an angle. 2. List three problems you might have if your computer screen is not adjusted properly. Answer: Problems will vary, but can include: excessive fatigue, eye strain, and neck and back pain 1. Eye Strain: Improper screen adjustment can lead to eye strain and headaches from difficulty seeing clearly. 2. Reduced Productivity: Low resolution or poor contrast can make text and images blurry, impacting work efficiency. 3. Posture Issues: Incorrect screen height or angle can cause neck and back discomfort due to poor posture. 3. Explain how a person might get repetitive strain injuries, or RSIs. Answer: Any of the following can be listed as a factor/example of developing RSI: poor posture, poor technique, overuse DATA RISKS 4. Name three potential data risks and explain why it is important to have backups of your data. Answer: Possible causes of data loss include the following: a personal computer hard drive crash, natural disasters destroying devices, physical damage to devices as a result of water or exposure to extreme climates, theft or loss of devices, and insecure cloud storage. 5. Define the term “hacker” and explain how a hacker might compromise your data. Answer: Hackers are people who break into computers and computer networks, often by exploiting weaknesses and preventable flaws. Account numbers and passwords are vulnerable and are prime targets for theft. 6. Explain three ways you can safeguard your data. Answer: Answers will vary but should include the following: • Schedule regular backups, whether online or to a device that is protected against whatever might damage your primary device. • Store backups in more than one location where they are safe from flooding, from other weather elements, and from theft. • Install an uninterruptible power supply to provide battery backup for a short period. • Educate classmates or colleagues about updating software and about updating and following security protocols. A knowledgeable team is less likely to jeopardize data security. • Make sure your cloud provider uses strong encryption-based security and has a secure physical environment. • Never share personal and sensitive information such as Social Security numbers, birth dates, maiden names, or address information unless you are sure whom you are giving it to. 1. Use Strong Passwords: Create complex passwords and change them regularly to protect your accounts. 2. Enable Two-Factor Authentication: Add an extra layer of security by requiring a second form of verification for login. 3. Regularly Back Up Data: Store copies of important files in multiple locations to prevent data loss from hardware failure or cyberattacks. EMAIL AND INTERNET RISKS 7. What are two risks that you need to look out for when using the Internet? Answer: Possible examples include: spam, malware, virus, worm, Trojan horse, rootkit, spyware, phishing, hoax 8. Define “pharming,” define “phishing,” and give an example of how you can protect yourself from both. Answer: Pharming is an illicit activity in which you are directed to a fake site to enter personal information. Once entered, the information is sold or transferred for illegal activity. Phishing is the gathering of information through fake email. Check the security settings on your browser to be sure you have a level of security that meets your needs. There are safe site settings, phishing and pharming filters, and other features, such as the Smart Screen Filter in Internet Explorer, that will help keep you safe. 9. Explain how malware can damage your data. Define the terms “virus” and “worm.” Answer: The term malware refers to viruses, worms, Trojan horses (or Trojans), and other software designed to disrupt a system or exploit data. Viruses can lurk undetected in your system, infect it, and spread when you distribute infected files—especially as email attachments. Worms spread by automatically sending themselves to everyone in your address book. FINANCIAL RISKS 10. What should you look for in a bank’s Web site before conducting any business on that site? Answer: Always make sure you’re using a secure Web site whenever you conduct any online transaction. 11. Define two methods for paying for goods or services on the Internet. Answer: Use a credit card, electronic wallet (software that processes information for secure online purchases), or a PayPal account that you can track to trace a problem when you make an online purchase at a secure site. PayPal is a service in which buyers and sellers set up an account that manages and secures online financial transactions. PRIVACY RISKS 12. Define “identity theft” and explain why it can be so damaging. Answer: An identity thief obtains personal information from various online and real-world sources. Thieves might use online phishing messages or physical devices that read credit card or ATM numbers. They target your Social Security number, credit card and debit card numbers, PINs, passwords, and other personal information. An identity thief may steal from you directly, but the ultimate goal is to gain enough information to impersonate you without your knowledge. 13. What personal information can a thief use to steal your identity? Answer: Social Security number, credit card and debit card numbers, PINs, passwords, and other personal information. 14. What are the risks of participating in social networking, and how can you protect yourself from those risks? Answer: When you click Share on Facebook, post a status, comment or update your LinkedIn profile, or post a photo on Instagram, you lose control of what goes online or shows up in search results. Employers and other important decision-makers such as school admissions officers can and do check out your Internet “footprint.” What you might consider a zealous response to a news story or just sharing a fun party photo can set off red flags if a potential employer or college admissions officer sees it. If you want to post more freely, you can consider creating a personal profile and a public profile on each of the social network sites. Employers screen applicants using social media, and they reject candidates that have lied about experience or qualifications, posted inappropriate content, or made negative comments about previous employers. 15. Define the terms “cyberstalking” and “cyberbullying.” Answer: Cyberbullying involves humiliation, rumors, lies, taunts, or threats. Some of the cruelest cyberbullies have been preteen or teenage girls, but immaturity is no excuse. Cyberstalking often involves the same dynamics as other forms of violence—threats, power, intimidation, and control—and can escalate into realworld violence. PERSONAL INFORMATION SECURITY 16. What is biometrics? Give two examples. Answer: Biometrics is the use of personal features to identify a person. Biometric systems include fingerprint scanners, facial recognition technology, and retinal scans. 17. What is a strong password? Give an example of a password that would be a good choice for a bank account. Answer: Strong passwords are passwords not easily guessed by another person who wants to access your accounts. Examples include: 18. Explain the difference between a username, a password, and a PIN. Answer: Unlike most of your personal information and data, such as your bank and credit card numbers and Social Security number, you choose your username and password to create accounts at Web sites, banks, or wherever such information is needed. A password is not a PIN (personal identification number). A PIN typically is a three- to four-digit number that is either assigned by a bank or financial institution or selected by a user to get into accounts through ATM. ELECTRONICS AND THE ENVIRONMENT 19. Why is it bad for the environment to dispose of electronics in landfills? Answer: You may not realize that the chips, circuit boards, disk drives, and plastics in your favorite products are toxic. They contain flame retardants and heavy metals such as lead, mercury, hexavalent chromium, and cadmium phosphors. The e-waste is burned or melted to extract heavy metals like copper, iron, silicon, nickel, and gold. When e-waste is burned or left in a landfill, harmful chemicals are released into the air or groundwater and soil, presenting a risk that people will develop serious health problems by coming into contact with these toxins. 20. Define the term “e-waste.” Answer: E-waste consists of discarded computers, cell phones, televisions, stereos, and the electronics from automobiles and appliances. Test Your Knowledge Now 1. An RSI that affects the wrist, hand, and arm is called _____________ syndrome. a. Web-based b. carpal tunnel c. social addiction d. computer vision 2. _____________ includes excessive use of online games, Web surfing, texting, blogging, and shopping. a. E-commerce b. Web addiction c. Internet addiction d. Social networking 3. _____________ is the study of safe and efficient working environments. a. Phishing b. Cybervision c. Pharming d. Ergonomics 4. Solid state hard drives are more stable than older magnetic hard drives which are subject to ____________, resulting in lost data. a. cyberterrorism b. crashing c. spam d. phishing 5. People who break into computers and computer networks—often by exploiting weaknesses and preventable flaws —are called __________. a. hackers b. white hats c. cyberstalkers d. Internet addicts 6. _____________ is the premeditated disruption of computers and networks. a. E-commerce b. Cyberbullying c. Cyberterrorism d. Social networking 7. Systems that have backups at various locations on the Internet, such as OneDrive, are called _____________storage systems . a. cloud b. sky c. Internet d. Web 8. _____________ is also known as junk email. a. Spyware b. Spam c. Phishing d. Piggybacking 9. A type of malware known as _____________ travels through computer networks leaving harmful programs in its wake. a. spyware b. spam c. pharm d. worm 10. A type of malware known as _____________ collects bits of data, such as your surfing habits, changes your default home page, and takes partial control of your system. a. spyware b. spam c. pharms d. worms 11. An email threat known as _____________ sends you fake email so that you will click a link and submit your personal data on an illicit Web site. a. spamming b. pharming c. worming d. phishing 12. A(n)_____________ is an area, often a public place, where you can access the Internet for free on your mobile device. a. Wi-Fi b. hotspot c. Internet zone d. router 13. A risk to having an unsecured network in your home is called_____________, in which someone can get on your network and use it without your knowledge. a. identify theft b. cyberbullying c. Wi-Fi piggybacking d. cyberstalking 14. Which of the following should you install to protect your home network? a. firewall b. browser c. router d. spyware 15. You should always install ___________ software to protect your computer from malware. a. email b. browser c. anti-virus d. spyware 16. _____________ is a set of online communication practices and rules. a. Phishing b. Incognitos c. Biometrics d. Netiquette 17. _____________ is the use of personal features, such as a fingerprint, to identify a person. a. Phishing b. Incognitos c. Biometrics d. Netiquette 18. Which of the following is commonly used for authentication at a banking Web site? a. username and password b. username c. birth date d. Social Security number and birthdate 19. _____________ computing is designing, manufacturing, using, and disposing of electronic products in ways that are friendly to both people and the environment. a. Electronic b. E-trash c. Green d. Cyber 20. Electronic trash, or _____________, consists of discarded computers, cell phones, televisions, stereos, and the electronics from automobiles and appliances. a. e-waste b. green waste c. cyber trash d. spyware 21. In the space next to each image below, write the letter of the phrase that describes it. a. secure Web site b. biometric device c. BSoD d. a way to protect online data e. form of ID Try This Now 1: Proper Ergonomics Note: This assignment requires a smartphone with a digital camera, or any digital camera. With iPads, Android tablets, and Windows tablets being commonplace in our world today, researchers are examining the ergonomic impact of these devices. Whether you are using a desktop computer, laptop, or tablet, you can place considerable strain on your body. a. Research the proper ergonomics of using a desktop computer, laptop, or tablet. Write a list of seven ergonomic guidelines that you should consider when interacting with a computer. Answer: Answers will vary, but should include the following topics from the OSHA.gov checklist at https://www.osha.gov/SLTC/etools/computerworkstations/checklist.html WORKING POSTURES SEATING KEYBOARD/INPUT DEVICE MONITOR WORK AREA ACCESSORIES Seven Ergonomic Guidelines for Computer Use 1. Maintain Proper Posture: • Sit with your back straight and shoulders relaxed. Your feet should be flat on the floor, and your knees should be at or slightly below hip level. 2. Adjust Screen Height: • Position the top of the screen at or slightly below eye level, so you can view it comfortably without tilting your head. 3. Use an Appropriate Chair: • Choose a chair with good lumbar support that supports the natural curve of your lower back. Ensure it is adjustable so you can achieve the right height and position. 4. Keep the Keyboard and Mouse at the Right Height: • Your keyboard should be at a height where your elbows are bent at a 90-degree angle and your wrists are straight. Place the mouse close to the keyboard to minimize reaching. 5. Take Regular Breaks: • Follow the 20-20-20 rule: every 20 minutes, look at something 20 feet away for at least 20 seconds to reduce eye strain and prevent repetitive strain injuries. 6. Adjust Screen Brightness and Contrast: • Set the screen brightness to match the lighting in your environment and adjust the contrast to ensure comfortable viewing and reduce eye fatigue. 7. Position Devices Correctly for Tablets and Laptops: • For tablets, use a stand to elevate the screen to eye level and use an external keyboard if needed. For laptops, use an external keyboard and mouse and elevate the laptop screen with a stand to achieve proper ergonomic alignment. b. Sitting in front of any computer device, use what you have learned and have someone take a picture of you sitting properly in front of the device. Insert the image in the same document as the list of guidelines. Answer: Photos will vary but should look similar to: https://www.osha.gov/SLTC/etools/computerworkstations/positions.html c. Submit the document to your instructor. 2: Internet Hoaxes Internet hoaxes, such as email scams with get-rich-quick scams or Facebook postings containing misinformation about medical facts, are common. The Web site snopes.com is a source for debunking these false rumors and urban legends. a. Open a browser and open the site snopes.com. b. Tap or click the Fraud & Scams link. (If that link is not available, click a similar link.) Next select Identity Theft or a similar topic. c. Open the links and read about three recent identity theft scams. Write three paragraphs providing an overview in your own words of each of these scams. Answer: As of time of writing, the following topics are on the Snopes.com Identity Theft page. Answers will vary. •Identity theft scammers pretending to be Red Cross representatives target military families. •Identity thieves trick the unwary into revealing their personal details by telling them they've failed to report for jury duty and warrants for their arrest are being issued. •Scammers pose as census workers to elicit personal information from unsuspecting victims. •Card-skimming thieves can read information from RFID-enabled credit cards carried in pockets and purses. •Fraudsters claim a government grant will pay your utility bill in full for one month. Overview of Recent Identity Theft Scams 1. Scam Involving Fake Job Offers: One recent identity theft scam involves fraudulent job offers that lure victims into providing personal information. Scammers pose as recruiters from legitimate companies, offering high-paying jobs or work-from-home opportunities. They may ask victims to fill out personal information forms or pay for background checks, which are then used to steal identities or commit financial fraud. The scam often involves convincing victims that their information is needed for legitimate employment purposes, but it is ultimately used for unauthorized activities. 2. Phishing Scams Using Fake Tax Refunds: Another prevalent scam involves phishing emails that appear to be from tax authorities, such as the IRS. These emails claim that the recipient is eligible for a tax refund or needs to verify tax information. The emails include links to fake websites designed to look like official tax authority pages. When victims enter their personal and financial information on these fake sites, scammers collect it to commit identity theft or fraud. This scam preys on individuals' concerns about their taxes and refunds, making it more likely for them to provide sensitive information. 3. Scams Featuring Fake Security Alerts: A common identity theft scam involves fake security alerts that appear to come from reputable organizations, such as banks or credit card companies. These alerts claim that there has been suspicious activity on the victim's account and urge them to click on a link or call a phone number to verify their information. The links direct victims to phishing websites designed to capture their login credentials and personal details. Once scammers have this information, they can access and misuse the victim's financial accounts. This scam takes advantage of individuals' fear of security breaches to trick them into revealing sensitive information. d. Submit the document to your instructor. 3: Private Browsing Note: This assignment requires a browser that has been updated in the last year. Modern browsers provide private browsing capabilities called InPrivate Browsing in Internet Explorer, Incognito Mode in Chrome, Private Windows in Mozilla Firefox, and Private Browsing in Safari. a. Write a paragraph about the purpose of private browsing. Answer: Sometimes you don’t want to leave a trace of your web browsing activity on your computer. Whether it’s shopping for a gift on a shared PC or checking an account at an Internet café, you don’t want to leave any evidence of your browsing or search history for others to see. InPrivate Browsing helps prevent your browsing history, temporary Internet files, form data, cookies, and user names and passwords from being retained by the browser. You can start InPrivate Browsing from the Safety menu, by pressing Ctrl+Shift+P, or from the New Tab page. Internet Explorer will launch a new browser session that won’t keep any information about webpages you visit or searches you perform. Closing the browser window will end your InPrivate Browsing session. (http://windows.microsoft.com/en-US/internet-explorer/products/ie-9/features/in-private) b. Research the use of private browsing capabilities within your favorite browser. Open the private browsing feature in any browser. Open three tabs, each containing your favorite Web sites, and take a screen shot. Place the screen shot in the same document as the paragraph written in step a. Answer: Answers and tabs will vary. Below is a screen shot of InPrivate open on IE11: c. Submit the document to your instructor. Critical Thinking Now 1: Business Digital Security Attacks Each week, headlines are filled with news of hacking attacks resulting in loss of data at large international companies. Research a well-known company that was hacked in the last calendar year. Write at least 150 words about the security infringement. Be sure to mention whether consumers were personally affected by the hacking incident. Answer: Answers will vary, however at the time of writing, the Target breach was one of the most visible hacking incident in recent years. From HuffPost http://www.huffingtonpost.com/2014/02/12/target-hack_n_4775640.html Hackers gained access to Target's computer system and stole financial and personal data of 110 million shoppers by tricking an employee at an outside vendor into clicking on a malicious email, according to a report Wednesday by security blogger Brian Krebs. An employee at Fazio Mechanical, a Sharpsburg, Pa.-based heating, ventilation and air-conditioning company with access to Target's network, fell for a "spear phishing” attack, in which hackers send malware-laced emails that appear to come from trusted sources to take over victims' computers, according to Krebs, who cited sources close to the investigation. Once hackers gained access to the employee's computer, they could enter Target's system and steal the retailer's payment card data, Krebs wrote. Fazio was reported last week to be the possible conduit through which hackers accessed Target's network, but the details of how the attack may have occurred are new. The revelation highlights a central problem companies face as they try to secure their networks in a complex Web ecosystem. Although businesses invest millions of dollars every year in the fight against hackers, they are still vulnerable to the lax security measures of third parties that access their systems… Security Infringement: The 2023 MGM Resorts Cyberattack In 2023, MGM Resorts experienced a significant cyberattack that disrupted its operations and compromised sensitive data. The attack, attributed to a ransomware group, led to substantial operational issues across MGM's hotel and casino properties. The hackers gained access to MGM's network, causing system outages that affected reservations, guest check-ins, and other services. Personal data of customers, including credit card information and personal identification details, was reportedly exposed. This breach potentially impacted thousands of individuals who had interacted with MGM's services. In addition to the immediate operational disruptions, the incident prompted concerns about data privacy and the potential for financial fraud. MGM Resorts responded by working with cybersecurity experts to mitigate the damage and enhance their security measures. This incident underscores the importance of robust digital security practices in protecting consumer information and maintaining operational integrity. 2: How Safe Is Snapchat? Snapchat is a phone app that sends photos such as selfies (photos taken by people of themselves with their own smartphones) to friends, and the images then quickly disappear. Although Snapchat messages are designed to disappear within one to ten seconds, there is no guarantee that the recipient will not take a picture of the message using the screenshot feature of his or her phone. In addition, the friend could take a picture of the sent image message. Research the privacy policy of Snapchat at snapchat.com and write at least 100 words summarizing the policy in your own words. Do you think Snapchat provides a false sense of security by reporting if the recipient takes a screenshot? Would you be comfortable sending friends images with Snapchat? Why or why not? Answer: Personal answers will vary. As of writing, the Snapchat policy is (http://www.snapchat-download.com/privacy-policy/) is: We will not sell, distribute or lease your personal information to third parties unless we have your permission or are required by law to do so. What we collect We may collect the following information: name contact information including email address demographic information such as postcode, preferences and interests What we do with the information we gather We require this information to understand your needs and provide you with a better service, and in particular for the following reasons: Internal record keeping. We may use the information to improve our products and services. We may use the information to customise the website according to your interests. Security We are committed to ensuring that your information is secure. In order to prevent unauthorised access or disclosure we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information we collect online. How we use cookies A cookie is a small file which asks permission to be placed on your computer’s hard drive. Once you agree, the file is added and the cookie helps analyse web traffic or lets you know when you visit a particular site. Cookies allow web applications to respond to you as an individual. The web application can tailor its operations to your needs, likes and dislikes by gathering and remembering information about your preferences. You can choose to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. External suppliers (including Google) use cookies to show advertisements based on your prior visits to our website. With ‘DoubleClick cookies’, Google and its partners can show you ads based on your visit to our and / or other websites on the Internet. You can unsubscribe for the use of the DoubleClick cookie for interest-based advertising by visiting Aboutads.info or change the Ads Preferences in your web browser. Summary of Snapchat Privacy Policy: Snapchat's privacy policy states that while messages and photos are designed to disappear after viewing, they may still be stored on Snapchat's servers or in backups. Snapchat does notify users if a screenshot is taken of their message, but this does not guarantee complete privacy. The company collects user data, including location and usage information, which may be shared with third parties. Opinion: Snapchat may provide a false sense of security because screenshot notifications do not prevent the recipient from saving the content through other means. I would be cautious about sending sensitive images on Snapchat, as the disappearing nature of messages does not ensure absolute privacy. 3: Recycling Computers In the back of your closet, you locate an old “beige” computer. It probably belonged to someone in your family many years ago. After reading this chapter, you are aware that throwing it away in your household garbage could be illegal as well as unethical. a. Research green computing and proper disposal of a computer. Answer: Green Computing and Proper Disposal of Computers Green Computing: Green computing refers to the practice of designing, manufacturing, using, and disposing of computers and related systems in an environmentally friendly manner. It aims to minimize the environmental impact of technology throughout its lifecycle. This includes improving energy efficiency, reducing emissions and waste, and promoting the use of sustainable materials. Proper Disposal of Computers: 1. E-Waste Recycling Programs: • Many communities offer e-waste recycling programs specifically for the disposal of electronic devices. These programs ensure that computers are dismantled and recycled properly, recovering valuable materials and reducing harmful environmental impact. 2. Certified E-Waste Recyclers: • Use recyclers certified by organizations like e-Stewards or R2, which adhere to strict environmental and data security standards. This ensures that your computer is recycled responsibly and that any sensitive data is handled securely. 3. Manufacturer Take-Back Programs: • Some computer manufacturers offer take-back programs where they accept old equipment for recycling or safe disposal. Check with the manufacturer of your old computer to see if they provide such services. Summary: Proper disposal of computers involves utilizing e-waste recycling programs, certified recyclers, and manufacturer take-back services to ensure environmentally responsible handling and minimize harm. b. Write a paragraph about steps that should be taken before disposing of a computer’s hard drive. Answer: Answers will vary but should include the following. From ehow (http://www.ehow.com/how_5763568_dispose-computer-hard-drives.html) 1. Use a disk wiping program to format the hard drive and replace the existing data with dummy data, which identity thieves and others will not be able to use. There are many disk wiping programs on the market, some of which are free. Eraser and Boot & Nuke are two of the most popular disk wiping programs. These programs are easy to use. They work by deleting the data and then writing over it with dummy data so that the erased data cannot be recovered. 2. Open the case of the computer. You may need to consult the owner's manual that came with your computer for the proper case removal procedures. If you do not have the manual available, you can check the manufacturer's Web site. 3. Locate the hard drive in the computer case and unplug the IDE and power cables. The IDE cable should be grey in color, while the power cable will typically be white. Remove both of the cables, then remove the screws that hold the hard drive in place. 4. Remove the hard drive from the computer and set it aside, then put the cover back on the computer case. This computer case can be given to a computer manufacturer, who can rebuild it for use by someone who cannot afford to buy a computer, such as the poor and disadvantaged, or sell it for the scrap metals it contains. 5. Place the hard drive on a solid surface and repeatedly hit it with a hammer. Make sure that the sides of the drive are caved in. Also make sure that the IDE and power connectors are flattened out and destroyed. Physical destruction is the only certain way to ensure that the data contained on the hard drive can no longer be used. Make sure to protect yourself when taking your frustrations out on that old hard drive -- and always don your safety goggles before picking up that hammer. Before disposing of a computer’s hard drive, it's crucial to take several steps to protect your data. First, perform a thorough backup of any important files to an external storage device or cloud service. Next, securely erase all data using specialized software designed for data wiping, which ensures that the information cannot be recovered. This process typically involves overwriting the data multiple times to prevent retrieval. After wiping the drive, consider physically destroying it, such as by drilling holes or shredding, to provide an additional layer of security. Finally, ensure that the disposal method adheres to local e-waste regulations and best practices to prevent environmental harm. c. Write another paragraph of general locations that can assist you in disposing of your computer. Answer: Student answers will vary but should include locations found on the EPA website (http://www.epa.gov/osw/conserve/materials/ecycling/donate.htm). To dispose of your computer responsibly, several options are available. Local e-waste recycling centers are a key resource, as they specialize in the safe handling and recycling of electronic devices. Many municipalities also have designated drop-off sites or scheduled collection events for electronic waste. Retailers like Best Buy and Staples often offer recycling programs where you can drop off old electronics, including computers. Additionally, check with the manufacturer of your computer, as many offer take-back programs or partnerships with recycling firms. Lastly, non-profit organizations or community groups may accept old computers for refurbishment and reuse, helping extend the lifespan of the device while supporting local initiatives. Ethical Issues Now Facebook provides a social community that connects over a billion members around the world. When it comes to posting on Facebook, it seems anyone is susceptible to oversharing. Oversharing can include what your roommate consumed at every meal this month or your cousin’s ranting about his boss. a. Research the topic of oversharing on social media. In your own words, write a total of ten comments summarizing dos and don’ts about sharing on Facebook. Answer: Answers will vary but should touch on the following from (http://www.hongkiat.com/blog/facebook-etiquette/) Do: 1. Message Private Matters Instead of Posting On Wall 2. Be Mindful Of What You Post 3. Call Rather Than Post Personal News 4. Reply To Comments Especially If They Are Questions 5. Avoid Posting Comments On Every Post Don’t: 1. Make Friend Requests To Strangers 2. Tag Your Friends In ‘Unglam’ Shots 3. Overshare Yourself 4. Vent About Your work 5. Post Chain Status Updates Dos and Don’ts of Sharing on Facebook Dos: 1. Do Share Meaningful Updates: • Post content that is positive, relevant, and adds value to your connections. Share accomplishments, important life events, and interesting articles. 2. Do Adjust Privacy Settings: • Utilize Facebook’s privacy settings to control who can see your posts. Customize settings for different types of content to ensure it reaches the intended audience. 3. Do Be Mindful of Others: • Ensure you have permission before sharing personal information or photos of friends and family. Respect their privacy and preferences. 4. Do Keep Professionalism in Mind: • Maintain a level of professionalism, especially if you use Facebook for networking or business purposes. Avoid posting content that could negatively impact your reputation. 5. Do Think Before You Post: • Consider the potential impact of your posts on yourself and others. Reflect on whether the content is appropriate and how it might be perceived by different audiences. Don’ts: 6. Don’t Overshare Personal Details: • Avoid posting excessive details about your daily life, routines, or private matters. This can lead to privacy breaches and unwanted attention. 7. Don’t Engage in Negative Rants: • Refrain from posting complaints or rants about individuals, companies, or sensitive topics. This can lead to unnecessary conflict and damage relationships. 8. Don’t Share Sensitive Information: • Avoid sharing sensitive personal or financial information, such as your address or banking details, as this can lead to identity theft or scams. 9. Don’t Post Without Thinking: • Avoid impulsive posting. Take time to review and consider the content before sharing to prevent potential regret or unintended consequences. 10. Don’t Ignore Privacy Risks: • Be aware of the risks associated with oversharing. Understand that once something is posted online, it can be challenging to fully remove it, and it may be seen by a wider audience than intended. b. Research why people overshare on Facebook. Write at least 100 words about why people feel compelled to share with the world topics that they would never share in a room filled with their peers. Answer: These answers will vary, but should touch upon topics discussed at (http://netsecurity.about.com/od/securityadvisorie1/a/The-Dangers-Of-Facebook-Oversharing.htm) Stalkers love oversharing: Let's face it, the Facebook Timeline is like a scrapbook for stalkers. Timeline provides an easy interface where your friends, and depending on your privacy settings, any toad in the world can have quick access to all the things that you've ever posted on Facebook. Stalkers just need to click on the year and month that they're interested in and Facebook Timeline takes them right to it. With the 60 or so new apps that allow for what Facebook execs are calling "frictionless sharing", nearly every aspect of your life is potentially on display for stalkers to follow. From the music you're listening to, to where you're "checking in" at in the real world, these little tidbits of information can help your stalker learn your patterns so they can know where to find you. It's best to limit the sharing of your location on Facebook as much as possible or not share it at all. Use Facebook friends lists to organize your friends. Create a list of your most trusted friends and set your privacy settings to allow more access for trusted friends and highly limited access to acquaintances who might end up being stalkers. Thieves love oversharing: Want to make yourself an easy target for thieves? The easiest way to do this is to share your location information on Facebook. If you just "checked-in" at the local gym and posted this to Facebook, then any thief who is trolling Facebook profiles will know that you are not at home. This would be a great time to rob you. You may have restricted your privacy settings on Facebook to just friends, but what if a friend is logged into a publicly accessible computer, such as at a library, and forgets to log out or has their cell phone stolen? You can't expect that your friends are the only ones who have access to your status and location just because your privacy settings are set to friends only. Some Facebook apps that share your location may have more relaxed privacy settings than you are comfortable with and may be blabbing your location without you realizing it. Check your privacy settings and also check to see what information your Facebook apps are sharing with your friends and the rest of the world. Limit them as much as possible to protect your privacy and personal safety. Never ever post that you are home alone. Lawyers love oversharing: Anything you do on Facebook can and may be used against you in a court of law. Lawyers absolutely love Facebook because it helps greatly in establishing a person's character and where and when something took place. Facebook does a lot of legwork that a private investigator would normally have to do, such as learning who a person associates with (i.e. who their friends are). Are you in the middle of a custody battle? Posting pictures on Facebook of yourself getting tanked at a party could help your ex-spouse with their case against you. Facebook postings often reflect our moods. A ranting status post might get you labeled aggressive or abusive by a lawyer trying to make a case against you. Avoid posting while you're angry or drunk. If you're tagged in a picture that might be considered inappropriate, you can "untag" yourself so that the picture is not associated with your profile. Remember that even if you removed a posting after it appeared, the post might have still been caught in a screenshot or sent in an email notification. There's no guaranteed take-backs on Facebook, so always think before you post. Employers hate oversharing: Your employer is probably not a huge fan of oversharing. Whether you're at work or not, your actions can affect your company's image, especially since most people put who they work for in their Facebook profile. If your employer reviews Facebook activity and sees a ton of it while you're supposed to be working, they might use this against you at some point. If you say you're sick and then your Facebook location says your checking-in at the local movie theater, this might tip off your employer that you're playing hooky. Potential employers might also request a look at your Facebook profile to learn more about you. You might consider reviewing your Timeline to see if there is anything that might cause them not to hire you. Worried about your friends posting something stupid on your wall or tagging you in an unflattering picture that might affect a potential job offer? Turn on the Tag Review and Post Review features so that you can decide what gets posted about you before a post goes live. People often overshare on Facebook due to a combination of psychological and social factors. The platform provides an immediate way to seek validation and connect with others, which can lead to oversharing as users crave attention and approval. The anonymity and distance provided by the online environment may reduce self-censorship, leading individuals to disclose information they might otherwise keep private. Social comparison also plays a role; users might overshare to match or exceed the perceived social status of their peers. Additionally, the instant feedback loop of likes and comments can reinforce the behavior, making users more likely to share personal or excessive details. Team Up Now – Your Digital Footprint From the day that you compose your first text message or sign in to a social network, your digital footprint begins a data trail of interactions. Using a free website called Diigo—a social bookmarking site that assists in researching, annotating, and sharing information—search digital material about the guidelines for creating your digital footprint. a. Each team member should open a browser and go to the site diigo.com. Each member should create an individual account. The site contains videos to assist you in using Diigo. b. Invite each of your team members to share your annotated pages to build a personal learning network for this team project. c. Search for sites using the search term “Digital Footprint.” Each team member should select five of the most informative sites and use Diigo to annotate a few sentences on each site that provides the best information for your team. Each team member will automatically receive an email from Diigo about what you have shared with your group. d. Share the sites with your team using Diigo. The site creates a single page listing of the annotated information contributed by your group. In this way, group bookmarks become a repository of collective research. e. Share this full listing as a bookmark with your instructor. Answer: Answers will vary but should include some of the top listings of “Digital Footprint” in search engines. Below is a screen shot of top listings on Bing at time of writing. Solution Manual for Technology Now: Your Companion to SAM Computer Concepts Corinne Hoisington 9781305110144

Document Details

Related Documents

person
Isabella Thomas View profile
Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right