EMIS Study Guide Exam 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

7. What is a cookie? Why do some people object to third-party cookies?

* Cookie: small data file that a web site places on your computer to remember your information. * Third party cookies can offer information to websites you did not intend to look at

24. Explain different types of online threats discussed in the textbook and lecture slides.

-Online threats include: unauthorized access and use, computer sabotage using viruses and spam, online theft, fraud, and dot cons, cyberstalking, cyberbullying, and personal security risks, identity theft, data theft, and social media hacking -Other threats include phishing, pharming, DoS attacks, cyberterrorism, Wi-Fi piggybacking, and war driving

31. According to the linked websites on Canvas explain How to Avoid Phishing Scams.

-Phishing is a form of social engineering -Attackers often take advantage of current events, as these emails can also appear to come from charities -To avoid: -Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal info and try to verify the identity of the person directly with the company they claim to be from -Do not provide personal info unless you are certain of the person's authority to have this info -Do not reveal personal or financial info in email and do not respond to email asking for this info or click on the links in these emails. -Pay attention to the URL of a website. They may look identical but the malicious sites URl may use a different spelling or a different domain like .com versus .net. -Try to verify the email request by contacting the company directly, and not using the contact information in the email -Install and maintain anti-virus software, firewalls, and email filers to reduce some of this traffic -Take advantage of any anti-phishing features offered by your email client

23. How can you recognize a phishing email?

-Phishing: the use of electronic communications (typically email messages) to gain credit card numbers and other personal info -Appears to come from a legitimate organization, for example PayPal, but is actually send from a phisher to trick the recipient into revealing sensitive personal information -Includes an urgent message stating that the individual's credit card or account information needs to be updated -Forged URL -Poor grammar -Scare tactics, "we are shutting down some Yahoo accounts" -Generic greetings are common -Phishers frequently use spy wear -Outdated design -"Http" versus "Https" (https indicates a secure login) -Asks too much information, for example on PayPal could ask you for your social security number, driver license number, state issued, ect. -Different fonts and design elements from the real login screen -Low graphic resolution

18. What is presence technology?

-Presence technology: technology that enables one computing device to locate and identify the current status of another device via the Internet or other network

18. What is a code of conduct?

-The code of conduct are the guidelines for behavior for students, employees, or other users that explain acceptable computer use

5. List the main parts of the URL (the Universal Resource Locator)

-URL: an Internet address that uniquely identifies a Web page by specifying the protocol, or standard, being used to display the Web page, Web served hosting the Web page, the name of any folders on the Web server in which the Web page file is stored, and the Web page's file name

20. Explain the difference between war driving and Wi-Fi piggybacking. Are they legal? Are they ethical?

-Unauthorized use of a Wi-Fi network is called war driving or Wi-Fi piggybacking, depending on the location of the hacker at the time -War driving: driving around an area with a Wi-Fi enabled computer or mobile device to find a Wi-Fi network to access and use without authorization -Wi-Fi piggybacking: accessing an unsecured Wi-Fi network without authorization, from the hacker's current location -War driving and Wi-Fi piggybacking are both ethically and legally questionable -They can lead to illegal behaviors such as individuals deciding to use credit cards or other data they find for fraudulent purposes -In some countries, piggybacking is illegal

27. Explain how a virtual private network works. Can anyone have access to it?

-Virtual private network (VPN), is a private, secure path across a public network that is set up to allow authorized users private, secure access to a network. -It uses encryption to convert data into a form that is unreadable. Only those who are authorized can view data on the VPN network.

21. What are four ways the chapter mentions to protect yourself against personal cyberstalking and other types of online harassment?

1. Be discreet online and use gender-neutral, nonprovocative identifying names 2. Be careful about the types of photos you post of yourself online and do not reveal personal information such as real name, address, or telephone number to people you meet online 3. Do not respond to any insults or other harassing comments you receive online 4. Consider requesting that your personal information be removed from online directories, especially those associated with your email or other online identifier

12. Choosing the right ISP for your needs isn't always as simple as it seems. List the four main areas of interest and at least two questions to ask regarding each area

1. Services Is the service compatible with my device? Is there a monthly bandwidth limit? 2. Speed How fast are the max. and usual downstream speeds? How fast are the max. and usual upstream speeds? 3. Support Is 24/7 telephone support available? Is web-based support available? 4. Cost What is the monthly cost for service and is it lower than what I pay? What is the cost of any additional hardware needed, such as a modem or transceiver?

c. How many years did it take for the email service to become publicly available?

14 years, service MCI mail

a. What was the first program written to allow users that shared the same computer to leave messages for each other?

ARPANET in 1969

25. What is the difference between identity theft and phishing?

Identity theft: using someone else's identity to purchase goods or services or otherwise illegally masquerade as that individual, occurs when someone obtains enough information about a person to be able to masquerade as that person usually to buy something in that persons name Phishing: the use of electronic communications (typically email) to gain credit card numbers and other personal information and data to be used for fraudulent purposes, the use of an email message that appears to be coming from a legit organization but is actually sent from a phisher to trick the recipient into revealing sensitive information such as a credit card or username and password

26. Is it legal for companies to review the email of their employees? Is it ethical?

It is legal for companies to review their employees' email. The primary reason for employee monitoring is for legal liability but also for monitoring productivity. Although it is legal, many employees feel that being watched at work is an invasion of their personal privacy, however, it is still very common.

19. Do you think U.S. Information Security laws are enough to secure information and protect our privacy on the Internet? Why or why not?

No they are not enough because technology is advancing rapidly with that, cyber crimes are increasing as well as malware.

33. According to the linked websites on Canvas explain Ransomware.

Ransomware-locks you out of your computer, for example in personal computer files. You are prevented from accessing the files or the computer until you pa a ransom to the writes of the malware. CryptoLocker is a type of ransomware that locks you out of your personal computer files.

b. Who created the first email program and the addressing system with "@"? When?

Ray Tomlinson, 1969

d. How is email transmitted?

Sender composes e-mail and message will send to a recipient via their email address. Then, email sends over Internet from sender to receiver.

21. According to the linked websites on Canvas explain Social Engineering.

Social engineering- when an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. Phishing is a form of social engineering

3. What was the first packet-switched network?

a. ARPANET became the world's first packet-switched network.

10. List key consitutents of an electronic commerce site.

a. Catalogue of products - details the products for sale and their prices b. Well-designed and easy to sue - essential otherwise the website would not be used c. Shopping carts - analogous to shopping carts in supermarkets d. Security - credit card safety is key concern for users of the web, as users need to have confidence that their credit will remain secure e. Payments - once user has completed the selection of purchases there is a checkout facility to arrange for the purchase of the goods f. Order fulfillment/order enquiry: once payment has been received, the products must be delivered to customer

9. Who founded Facebook and Twitter?

a. Facebook was founded by Mark Zuckerberg and other Harvard students in 2004. b. Twitter was founded by Jack Dorsey in 2006.

11. List three key Internet organizations and their main responsibilities. (ex ISOC)

a. ISOC (internet society): provides leadership in addressing issues that may impact future of internet. b. ICANN (internet corporation for assigned names and numbers): coordinates activities related to the Internet's naming system, such as IP addresses and domain names. c. W3C (world wide web consortium): dedicated to developing new protocols and specifications to be used with the Web and ensure its interoperability.

22. List six precautions you should keep in mind when using portable computers and other mobile devices to protect against hardware loss and theft.

a. Install and use encryption, antivirus, antispyware, and firewall software b. Do not store usernames or passwords attached to a computer or inside its case c. Secure computers with boot passwords; set your mobile phone to auto lock after a short period of time d. Regularly back up your data e. Do not store unencrypted, sensitive data on your device

11. List examples of the issue of trust that arises in E-Commerce.

a. Is the other person who they claim to be? b. Can the other person be relied upon to deliver the goods on payment? c. Can the other person be trusted not to inflict malicious damage? d. Is financial information kept confidential on the server?

14. Security and privacy are hot topics today. What are two common misconceptions people often have about the privacy (or lack thereof) of their email correspondence? What method(s) can be used to help mitigate some of the threats to that privacy?

a. Many people believe their email is private b. Many people believe their email will never be ready by anyone else c. You can send encrypted emails to help mitigate some threats

13. List any 2 examples of dot com failures that you are familiar with. What caused the company to fail?

a. Pets.com is a dot com failure I am familiar with. They did not succeed because it poured too much money into warehousing and vehicles, and did not create enough capital to breakeven. b. Boo.com is another dot com failure. They did not succeed because of poor site design, poor management and leadership, lack of direction and communication, and high costs from staff and contractors. A large number of products were returned by purchases and the company had to incur the costs of postage from these returns.

2. Who did originally formulate ideas for hypertext that later would be used in the development of World Wide Web?

a. Ted Nelson and Douglas Engelbart invented hypertext, which inspired Tim Berners-Lee to develop the World Wide Web.

4. When was the telnet protocol and file transfer protocol developed? Explain "telnet" and "file transfer" as their main functionalities.

a. The Network Working Group developed the telnet protocol and file transfer protocol in 1971. b. Telnet program allowed user of one computer to remotely log in to the computer of another computer. c. The file transfer protocol allows the user of one computer to send or receive files from another computer.

8. List 9 applications of the World Wide Web.

a. Travel industry (booking flights, trains, hotels) b. E-marketing c. Online shopping (amazon) d. Portal sites (yahoo) e. Recruitment sites (JobServe) f. Internet banking g. Online casinos (for gambling) h. Newspapers and news channels i. Social media

5. Who did originally use ARPANET? Explain main reasons.

a. UCLA and Stanford Research Institute used ARPANET, and in 1969, the first host-to-host connection was made between a computer at each location. b. Reasons included: connections with other computers, remotely logging in, file transfer, and using the viability of packet-switching as a standard for communication.

7. What are four main features of World Wide Web?

a. URL: Universal resource identifier, provides a unique address code for each web page b. HTML: hypertext markup language, used for designing the layout of web pages c. HTTP: Hypertext transport protocol, allows a new web page to be accessed from the current page d. Browser: client program that allows a user to interact with the pages and information on the World Wide Web.

10. The chapter listed numerous groups, or categories, in which members of the Internet community belong. Name and briefly describe the eight groups.

a. Users: people who use the Internet to retrieve content or perform online activities. b. Internet service providers: businesses or other organizations that provide Internet access to others. c. Internet content providers: the suppliers of information that is available through the Internet. d. Application Service Providers (ASPs): the companies that manage and distribute Web-based software services to customers over the Internet. e. Infrastructure companies: the enterprises that own or operate the paths along which the internet data travels. f. Hardware & Software companies: the organizations that make and distribute the products used with the Internet and Internet activities. g. Governments: the ruling bodies of countries that can pass laws limiting both the information made available via the Web servers located in a particular country and the access individuals residing in that country have to the Internet. h. Key Internet Organizations: other organizations that are responsible for many aspects of the Internet such as the ISOC that provides leadership in addressing issues that may impact the future of the Internet.

1. Who first envisioned the Internet and the World Wide Web?

a. Vannevar Bush in the 1940's, who worked for the US Navy. He was funded by the Rockefeller Foundation and worked later at MIT. He was the connection between Harvard and Berkeley, which lead to ARPANET.

6. Who invented the World Wide Web and when? Why is it considered revolutionary?

a. World Wide Web was invented by Tim Berners-Lee in 1990 at CERN in Switzerland. b. Revolutionary because it transformed the use of the internet from mainly academic use to where it is now an integral part of peoples' lives. Also: i. No single organization is controlling the web ii. No single computer is controlling the web iii. Millions of computers are interconnected iv. It is an enormous marketplace of billions of users v. The web is not located in one physical location vi. The web is a space and not a physical thing

12. List any 2 examples of successful dot-com companies that you are familiar with. What has made those companies successful?

a. Yahoo is a successful dot com company that I recognize. They are successful because they provide multiple outlets of interests, and therefore maintain a large audience/following. It offers free email, a search engine, news, shopping, entertainment, health, etc. and also earns revenue from advertising, web hosting, web tools, etc. b. Amazon is another successful dot com company. They are successful because they also have expanded past their original goal of just selling books, and now has thousands of products as well as easy searching facilities, checkout facilities, and order fulfillment.

What is the "memex"?

b. The "memex" (stands for memory extender) is an information management system, which he envisioned as a device electronically linked to a library with the ability to display books and films.

9. What are the typical options for Internet connections for personal use today? What are the advantages and disadvantages of each? Which one is the most secure? What are the cost/speed differences between the options?

* Typical options for Internet connections: o Conventional dial-up: dial-up access via standard telephone lines * Advantage: inexpensive hardware, ease of setup and use, widespread availability (including remote areas), increased security due to the computer not continually connected to the Internet * Disadvantage: much slower connection speed than other types of connections (max of 56 Kbps) * Cost: Free-$30/month * Speed: max of 56 Kbps, slowest o Cable-fast, direct Internet access via cable TV lines * Advantage: very fast, available wherever cable TV access is offered as long as the local cable provider supports Internet access * Disadvantage: not widely available in rural areas and requires a modem * Cost:$30-110/month * Speed: very fast, 6-200 Mbps, typically around 25 Mbps o DSL (Digital Subscriber Line) -fast, direct internet access via standard telephone lines * Advantage: direct connection that transmits via standard telephone lines, but it does not tie up your telephone line * Disadvantage: usually only available in urban areas * Cost: $30-40/month * Speed: slower than cable o Satellite-fast, direct Internet access via the airwaves and a satellite dish * Advantage: direct connection with similar speeds to DSL access, often the only broadband option for rural areas * Disadvantage: more expensive than DLS and cable and has a data cap, requires a satellite modem and a dish mounted to home to receive and transmit data, WEATHER: performance will degrade or stop completely during rain or snow storms * Cost: $40-80/month * Speed: 5-15 Mbps, similar to DSL o Fixed wireless-fast, direct Internet access via standard telephone lines * Advantage: direct connection with wireless signals, but it uses radio transmission towers * Disadvantage: only in selected areas where the service is available * Cost: $60-250/month * Speed: 2-10 Mbps, but typically determined on the distance between the tower and the customer, the type and number of obstacles in the path, and the type and speed of connection o Broadband over fiber (BoF)-very fast, direct internet access via fiber-optic networks (light travels faster than electricity) * Advantage: new type of very fast, direct Internet connection (example: Verizon Fios) used to deliver telephone and TV service plus Internet service * Disadvantage: not available everywhere, anywhere fiber has been installed into building, requires special networking terminal installed at the building to convert optical signals into electrical signals that can be sent to a computer * Cost: $30-70/month * Speed: very fast o Mobile wireless (4G) * Advantage: most commonly used with smart phones and tables to keep them connected to internet * Disadvantage: data caps, speed is dependent on service * Cost: vary a lot based on plan, many have unlimited voice and text but data caps * Speed: depends on cellular standard and specific network being used, 4G networks are usually 3-15 Mpbs with speeds up to 100 Mpbs available

29. Is it legal or ethical to write malware code? What about distributing it?

- Writing malware or posting malware is not illegal, although it is considered highly unethical and irresponsible behavior. Distributing malware, on the other hand, is illegal.

2. What is Internet2?

-A consortium of researchers, educators, and tech leaders from industry, government, and the international community who are dedicated to the development of revolutionary internet technologies -Uses high performance networks linking member institutions to deploy and test new network apps and technology -Designed as a research and development tool to help create technologies that ensure the internet can handle tomorrow's applications -First network to use 100 Gigabit Ethernet over its entire footprint.

1. How and why was the Internet started?

-Began with an experimental project called ARPANET created to connect 4 supercomputers -One objective was to create a computer network that would allow researchers in different places to communicate, and another was to build a computer network capable of sending/receiving data over a variety of paths to ensure network communications could continue even if part was destroyed -ARPANET grew and connected computer networks together and eventually evolved into present day internet -In early years, Internet was used primarily by the government, scientists, and educational institutions -Went virtually unnoticed by the public and business community because it was hard to use and required a computer -Transformed by the creation of the World Wide Web by Tim Berners-Lee

8. What is the biggest advantage of VoIP?

-Biggest advantage of VoIP: cost savings, like unlimited local and long-distance calls for as little as $25/month or basic cable and VoIP services bundled together for $50/month -Biggest disadvantage: does not function during power outage or if Internet connection goes down

6. Explain each of the Other types of messaging for Beyond Browsing and Email (pgs. 144-149)

-Blog: a Web page that contains short, frequently updated entries in chronological order, typically by one individual; Used as a online, personal journal accessible to the public; Used to post personal commentary, research updates, comments on current events, political opinions, recipes, and more; Beginning to have an increasing influence on businesses, politicians, and individuals -Wiki: a collaborative Web page that is edited and republished by a variety of individuals; Wikipedia, online encyclopedia updated by contribution from around the world -Forum (also called discussion groups or message boards): a Web page where individuals can post messages on specific subjects to initiate a discussion within a large group of individuals ; Used for asking questions of, making comments to, or initiating discussions on specifics subjects with a large group of individuals -Podcast: a recorded audio or video file that can be played or downloaded via the Web; Enables individuals to create self-published, inexpensive Internet broadcasts in order to share knowledge, express opinions, or present original work -Voice over Internet Protocol (VoIP): the process of placing telephone calls over the Internet; Calls can take place from one device to another, such as by starting programs like FaceTime or Skype; More permanent VoIP setups are designed to replace conventional landline phones in homes and businesses -Web conferences: a face-to-face meeting that takes place over the Web ; Used for business meetings between individuals that are located in different geographic areas -Webinar: a seminar presented via the Web; Includes a designated presenter and an audience

16. List and explain all of the different malware discussed in the chapter and videos

-Botnets: A computer that is controlled by a hacker/computer criminal that is used for illegal activity under the owner's identity. -Virus: a software program installed without the user's knowledge that is designed to alter the way a computer operates or to cause harm to the computer system. -Worm: a malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. -Trojan horse: a malicious program that masquerades as something else, such as a free game or movie. -Spyware: a program designed to find private information on a computer and then send that info to the creator of the malware. -Keylogger: a malware program that records every keystroke on a computer and then sends the sensitive information it recorded to criminals.

35. According to the linked websites on Canvas explain cyberbullying laws. (Cyberbullying ResearchCenter, then click on laws hyperlink)

-Bullying and cyberbulling are related behavior that are addressed typically in a single law or many be addressed in multiple laws. -Laws are unique by state and include 4 sanctions, criminal sanction, school sanction, school policy, and off-campus. -All states also have criminal harassment and or stalking statutes, and most include explicit reference to electronic forms. 48/50 include cyberbullying or online harassment in their laws, 44 include cyberbullying as a criminal sanction, 45 as a school sanction, 49 as school policy, and 15 as off campus policy.

15. Provide examples of cybercrime.

-Cybercrime: any illegal act involving a computer -Examples include: -Internet scams, counterfeit currency, stealing computers -Hacking: breaking into a computer network -Cyberterrorism: terrorist attacks via the internet -War driving: driving around finding access to Wi-Fi -Piggybacking: accessing unsecured Wi-Fi network

17. How is cyberstalking different from cyberbullying? Are they ethical - explain why or why not? Is there Federal Law against cyberstalking or cyberbullying?

-Cyberstalking: repeated threats or harassing behavior between adults carried out via email or another Internet communications method -Cyberbullying: the use of online communication to bully other person

25. How does a DoS (DDoS) attack disable a server?

-DoS (denial of service) attack: an act of sabotage that attempts to flood a network server or Web server with so much activity that it is unable to function. -DDos (distributed denial of service) attack is a DoS attack carried out by multiple computers -Often performed by botnets created by hackers. If enough useless traffic is generated, the serve has no resources left to deal with legitimate requests. -Hackers computer sends several simultaneous requests, each one asks to establish a connection to the server but supplies false return info, so multiple computers send multiple requests at one time in a DDoS. "Hello? I'd like some info" -Server tries to respond but cant locate the computer so the server waits before closing the connection which ties up the server and keeps other from connecting "I cant find you, Ill wait a try again" -Hacker's computer continues to send new requests so as the connection is closed there is a new request. Cycle continues, tying up the server indefinitely. -Server becomes so overwhelmed that legit requests cant get through, so it crashes

4. What are the differences between domain name server, Web server, and e-mail server?

-Domain name: a text-based Internet address that uniquely identifies a computer on the Internet. For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com. -Web server: a computer continually connected to the Internet that stores Web pages accessible through the internet, hold subscribers' Web pages -E-mail server: distributes email

28. How does a firewall help protect a computer?

-Firewall is a collection of hardware and/or software that protects a computer or computer network from unauthorized access. Firewalls close down all external communications to unauthorized computers and programs.

30. What information about you does/can government databases store? Are marketing databases different?

-Government databases store information such as Social Security earnings and tax income returns, is confidential and can be legally seen only by authorized individuals. Other information they hold includes birth records, marriage certificates, divorce information, property purchases, assessments, liens, and tax values. -Marketing databases hold marketing and demographic data about people, such as where they live and what products they buy.

3. Explain the difference between the Internet and the World Wide Web.

-Internet: the largest and most well-known computer network, linking billions of computers all over the world, a physical network -World Wide Web: the collection of Web pages available through the internet, not all internet activities happen over the web


Kaugnay na mga set ng pag-aaral

Introduction to the Business of IT

View Set

Memory and Cognition: Unit 2 "Memory"

View Set

Laws and/or Policies to Ensure Data Privacy and Patient Confidentiality in the International and Local Setting

View Set

ANTHROPOLOGY.111 EXAM 1 USI W/ DR. DAUER

View Set

Potter and Perry Chapter 46 Bowel Elimination

View Set