CS 103 lecture 1 - 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Internet security has two parts

1. Protecting your computers and data from malware and intrusions 2. Protecting your credentials from hackers and cybercriminals

Screen reader software cannot read images, it only reads the text of the alt attribute

Alternative Text

Anyone using your work must provide attribution (give credit) to you

Attribution (BY)

In almost all countries, computer software are protected by copyright as well.

Computer Software

ccTLDs(___) are particular to a geographic location .ca = Canada .uk = United Kingdom .mx = Mexico Each country controls how its ccTLD is used. Some countries have chosen to allow people outside the country to use theirs such as: .io (British Indian Ocean Territory) .me (Montenegro) .co (Colombia)

Country Code TLDs

Exception of copyright: _____ this is a provision in U.S. copyright law that allows for limited use of copyrighted works for a few defined purposes. criticism, comment, news reporting, research, scholarship, teaching

Fair Use

_____is the ease with which contents of a website can be found using software such as search engines and users on the website. Search engines cannot see images. They are only able to use the alternative text to determine what an image is about.

Findability

_____: also called content images, provide information, can be used as hyperlinks.

Foreground images

Screen readers include the level of the headings.

Heading

http://www.bpl.org/general/hours/index.php: http:// is

HyperText Transfer Protocol

What is HTML?

Hypertext Markup Language

Screen readers include the number of items in a list, helping users to visualize the length of the list

Lists

Reasons to Hyperlink

Navigation, Help the User, Do the right thing

Can websites be copyrighted? The original authorship appearing on a website may be protected by copyright. This includes writings, artwork, photographs, and other forms of authorship protected by copyright." Can domain names be copyrighted? ____

No.

Abbreviation for "no derivative works", Others may use your work "as is", but not create a derivative work (collage, translation, mashup)

NoDerivs (ND)

Commercial (business) use not allowed

Non-Commercial (NC)

Not protected by copyright: _______

Public Domain

______ gTLDs are meant for a particular purpose. When registering one, you need to agree that you meet the _____. You may be contacted upon to prove it later. Examples: .biz = businesses .pro - for licensed professionals (e.g. accountant, plumber) .name - for individual people, or fictional characters to which the registrant has rights

Restricted, criteria

Derivative works you create must have the same CC license as yours

Share Alike (SA)

_______ gTLDs are administered by ______ that tightly control their use. Only eligible entities are allowed to register them in the first place. .edu: colleges, universities (within the US) .gov: U.S. federal government entities .mil: (U.S. military) .museum: Museums .travel: travel and tourism sites .xxx: "Adult" sites

Sponsored, organizations

Getting Permission: To use copyrighted material, you must get permission from the owner. This can be done in several ways: 1) The copyright owner may pre-emptively give you permission through a _______ or _______that grants permission as long as you follow those terms. 2) Otherwise, you must get permission individually by writing to the copyright owner and negotiating a license. This may involve payment.

Terms of Use, Creative Commons license

This malware "enter through files that we willingly download or open because we think they are useful"

Trojan horses

Every webpage, folder or file in world wide web has a specific address which is called ____

URL

If a page has no title, the ____ or _____ will be displayed in the browser frame instead

URL, filename

URL

Uniform Resource Locator

This malware "enter via infected files (such as email attachments)"

Virus

Different types of malware

Worms, Viruses, Trojan horses

what is markup language?

a computer language that uses tags to annotate the information in a document

____attribute is a must for images in the web It is supposed to describe the image in a few words. <img src="bu-logo.png" height="" width="" alt="Boston University" > The value of alt attribute (Boston University in the above example) is called _________

alt, alternative text.

Trojan Horse Example - Fake ____ has become a common Trojan horse technique. Affects both Windows and ___ systems - A ___ window tells you that your computer is _____ "Click here to scan or fix". - Some web pages use _____ to download malware when you visit the page; no ___ required. - This is called a "______." -This is the reason to avoid pages with suspicious URLs.

anti-virus software, Mac, pop-up, infected, JavaScript, clicking, drive-by download,

Protect Yourself Against Viruses: - Run ____ ( even if you have a Mac) - Keep anti-virus software ____ - Do not open _____ that you aren't expecting, or from people you don't know and trust - If you are not sure, call the person/company and ask before opening

anti-virus software, up to date, email attachments,

href is an _____ of the <a> tag - it provides information necessary for the a tag to work. Here, that information is the designation (or target) of the link.

attribute,

______: can be created by CSS not by HTML, do not provide information (just for decoration), are not clickable.

background images

For images that are purely ____, use the null alt attribute: alt=""

decorative

A Trojan horse is malware "____ as ____ files or applications that entice you into ____ and _____ them."

disguised, useful, downloading, executing

http://www.bpl.org/general/hours/index.php: bpl.org is the ______name

domain

Two great hiding places for Virus:

email attachments, Microsoft Office (Word or Excel) macros

How does Trojan horses get onto your computer?

enter through files that we willingly download or open because we think they are useful

How does worm get onto your computer?

enter through vulnerabilities in software

How does virus get onto your computer?

enter via infected files (such as email attachments)

http://www.bpl.org/general/hours/index.php: /general/hours/ is the _____

file path

These ______s are all unrestricted; they can be used by anyone for any purpose. However, they are usually used for com = ? org = ? net = ? info = ?

gTLD

Copyright is a legal concept that ____authors and artists control over _____of their creations for defined periods of time.

grants , certain uses

http://www.bpl.org/general/hours/index.php: www is a_____or ______(World Wide Web)

hostname , subdomain

You are hosting a web at the following URL: http://cs-people.bu.edu It means that you have a _____ on WorldWideWeb (WWW) under _____ name bu.edu

house,domain

The text between the <a> and </a> tags is called the ____ text.

link

In addition to reading all the text of the page, screen readers identify ____, _____, and _____

links,lists,headings

For most web hosts, this is the public_html folder (for Unix/____ machines) or the Inetpub/wwwroot folder (for _____ web servers) An _____ software such as FileZilla can transfer files from a computer to a webhost. FTP stands for ______

linux, Windows,FTP, File Transfer Protocol

http://www.bpl.org/general/hours/index.php: Index.php is the _____

page (file)

Malware (malicious software)

software designed to interfere with a computer's normal functioning

A virus is: -a ____ type of malware, not a term for all malware. - A parasitic application that can _____. - Requires a ____ that it can hide inside of.

specific, self-replicate, carrier

Table Tags: To make a table, you need three tags:

table, tr, td (or th)

Hypertext?

text that contain links to other text

Protect Yourself from Trojan Horses - Read reviews from ___ sources (e.g. CNET, Mac World) before you download any software. - Trusted source means something that cannot be faked or manipulated - Are user reviews trusted sources? - Never download software from a____ window or by clicking on a ___. Always go to the ____ website for software. - Be suspicious of pop-ups, software offers, warning messages. - Never visit a site marked as _____ in search engine results

trusted, pop-up, link, vendor's, malicious

cybercriminals were using a certain top-level domain to make phishing more effective.What is the name of this phishing attack?

typosquatting

To Protect Yourself from Worms: - Keep ALL your software _____ - Whenever possible, turn on ____ - ____ of software you do not need - Do not ____ apps or software that is ___ longer being updated

up to date, automatic updates, get rid, use, no

What Makes You Vulnerable to Worms? - Not automatically _______ the operating system on your computer or phone - Not applying updates for popular software like (Microsoft Office, Firefox, Safari, Google Chrome, Anti-Viruses, WordPress, Adobe Reader, Flash Player)

updating

Title is crucial to both_____and ____

usability,findability

This malware "enter through vulnerabilities in software"

worm

- A ____ travels from computer to computer on a network by _____ vulnerabilities (bugs) in ______. - It does not require ____ action to spread.

worm, exploiting, software, human

Two reasons to talk about internet security:

- When building a website, it's your responsibility to keep your visitors from being at risk - When using a website hosted by others, it's important to protect yourself


Conjuntos de estudio relacionados

Chapter 2: Characteristics of Managers

View Set

Florida real estate ch 3 Commission rules simplified

View Set

Mental Health Chpt 3. Psychosocial Theories 1-4

View Set

Narrative Literature Reviews Versus Systematic Reviews

View Set

N144 - Exam 4 - Practice Questions

View Set