Computing Chapters 7,8,10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

VoIP

Which technology enables calls to be transmitted over the Internet instead of via traditional phone lines or cellular towers?

FTTH

Which technology uses fiber-optic cable to carry digital signals to your home?

True

With WiMAX Mobile Internet, you connect to the Internet using cellular networks that provide 4G service.

Credibility of Web Content

-Web has lots of user-generated content, which means almost anybody can say almost anything -Should not necessarily assume content is valid

False

Like a wiki, a blog usually has many authors.

Microblog

Which type of social media site is Twitter?

False

A viral video spreads computer viruses.

IM

Which form of online communication happens in real time?

SSL

Which is a protocol that encrypts data before it is sent across the Internet?

Edge

Which is the default browser on Windows 10 computers?

True

Every device on the Internet must have a unique IP address.

.gov and .edu

Examples of sponsored TLDs (top-level domains) are:

Firewalls

-A device or software that blocks unauthorized access to a network or individual computer -Most home routers have firewall software... you should activate it -MS-Windows and Mac OSX have software firewalls

1980's ... the Internet Emerges

-1981: CSNET created to link more universities -1983: URLs as we know them today are created -1983: MILNET split from the APRANET -1983: "War Games" released, beginning of "hacker culture" in popular culture -1986: NSFNET created as a "backbone" that connected various supercomputers around the country -The expanded use of NSFNET allowed the ARPANET to be decommissioned in 1990

Early Web Browsers

-1993: Mosaic --First GUI-based web browser --Non-commercial -1994: Netscape Navigator --Based on Mosaic --First commercial web-browser (not free) -1995: Microsoft Internet Explorer --Free --Included with MS-Windows -Internet growth starts to accelerates exponentially -And the browser wars commence...

Router

-A device that connects two or more networks together. It uses address information to route the data packets it receives to the correct computers. -Almost all home routers have firewall software, may need to be configured -The outside Internet has the public IP address of your router, but within your local area network, each computer has a private IP address -SSID - the name of a wireless network --Should always change this (do not use the default), make it anonymous --Can prevent it from being broadcast (to hide your network) -Wireless Encryption - encrypts transmitted data --Use WPA2-PSK (not older options that are less secure)

Microblogging / Twitter

-A form of blogging in which posts are limited to a small number of characters -Twitter is the most popular form of microblogging --Twitter posts are called tweets and are limited to 280 characters (used to be 140) --Twitter users have followers --A hashtag is a word or phrase preceded by a # symbol that is used organize and make tweets searchable

RSS (Really Simple Syndication)

-A format used for distributing web feeds that change frequently (such as blogs, podcasts, and news) to subscribers -Saves a user time by sending updates on sites he/she subscribes to -Need a feed reader app (also called a news reader app) -Not as popular as it used to be

Podcast

-A prerecorded radio- or TV-like show that you can download and listen to or watch any time -Distributed over the web and played on a computer or portable media player -Podcast client - a program used to locate, subscribe to, and play podcasts --Example: iTunes

Trojan Horse / Rootkit

-A program that appears to be legitimate but is actually malicious --Appears to be working normally --Behind the scenes, doing something malicious -Rootkit --A set of programs that allows someone to gain control over a computer system while hiding the fact the computer has been compromised --Can be downloaded from the web

Computer Fraud

-A scheme perpetrated over the Internet or email that tricks a victim into voluntarily and knowingly giving money or property -Many different types... Advance-fee scams --419 (Nigerian) scam --Lottery -Shill bidding - fake bidding to drive up the price of an auction item -Fake charities -Craigslist scam - buyer requests shipment before paying

Social Review Sites

-A website where users review restaurants, hotels, movies, games, books, and other products and services -Reviews are from regular people, not experts -Yelp, TripAdvisor most popular

Parts of an Email Message

-Address (To, Cc, Bcc) -Subject line (can be read in most email clients without opening the message) -Body (contains the message itself) --Technically can only contain text --HTML email messages the norm these days; most email clients can read, but those that cannot (or configured not to) will only be able to see the text -Signature (a block of text that is automatically put at the end of messages)

Digital Footprint

-All the information that someone could find out about you by searching the web, including social networking sites --May include not only content you post, but content posted by others --A disgruntled employee, unhappy customer, or former partner can post negative, untrue, or unflattering information about you --Once something has been posted on the Web, it is almost impossible to completely get rid of it (for example, you can delete a tweet, but if it has been re-tweeted...) --When using social networking sites, make sure you understand the privacy settings (which can be complex and sometimes are changed) --Some people use aliases for personal social networking accounts

Mailing Lists (listserv)

-Allows communications with (potentially large) groups of people using email -On the Internet, there are thousands of listserv mailing lists for different topics that users can sign up for... when any user sends an email to the list, it is automatically sent to all signed-up users -Private mailing lists also commonly used in businesses and schools

Two-Factor Authentication

-An account security measure that requires both a password and a verification code to sign in --Example: logging into iLearn - after entering your username and password, a verification code is texted to your smartphone or a "push notification" sent to your security mobile app --Google and other web sites commonly use as well

Denial-of-Service (DOS) Attack

-An attack that sends so much traffic that it can cripple a server or network -Example: Sending repeated requests to a web server to overload it and make it unresponsive to legitimate users -Botnet - a network of computers (called zombies or bots), controlled by a master --Can be used to launch DOS attacks --Can be used to send spam

Social Networking Sites

-An online community where people with common interests can communicate and share content with each other -Combines many of the features of other online tools -Facebook: The largest social networking site (by far) with over a billion active users -LinkedIn: Most popular professional networking site --For job / business opportunities --No games, etc.

Blogs (Weblog)

-An online journal that anyone can set up using simple blog tools to write about whatever they like --Can new posts as frequently (or infrequently) as you like --Readers can post comments about your blog posts -Blogosphere - all the blogs on the web and the connections between them -WordPress and Blogger are popular blog sites that allow users to create accounts and blog for free

Antivirus Software

-Antivirus Software --Security software that protects computers against viruses and other malicious software (like Trojan horses and worms) --Needs to be updated often --Some are free (Avast) -Antispyware Software --Security software used to prevent and remove adware and spyware -Security Suite --A package of security software that includes a combination of firewall, antivirus, and antispyware programs --Can be expensive

The "dot com" Bubble: 1994-2000

-As Web suddenly became very popular, investors became eager to invest, at almost any valuation, in almost any "dot com" company -NASDAQ stock market rose 400% between 1995-2000 -Traditional metrics for valuing companies overlooked -Most companies spent huge amounts on advertising and promotions in an effort to "get big fast" instead of trying to be profitable -Often spent lavishly on employees (free food, release parties, etc.) -March 10, 2000: NASDAQ peaks at 5,048

Networks

-There were other networks (besides ARPANET) using different technologies (NPL, Merit, CYCLADES, and X.25) -Needed way of communicating between them -Packet switching developed in mid-1970's to address this issue

Getting Connected

-Bandwidth - the data transfer rate of a network, measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps) -Internet Service Providers (ISPs) - Companies that offer Internet access --Dial-Up, Cable, DSL, FTTH (Fiber), Satellite -Dial-Up --Uses traditional phone lines --Very slow, max speed is 56 Kbps -Cable --Uses same coaxial cables used to provide cable TV --One potential drawback is that you share the cable, and therefore bandwidth, with your neighbors. (Not as much of an issue as it used to be.) --Typical speeds from up to 500 Mbps -DSL (Digital subscriber line) --Uses special digital phone lines --You must be within 3 miles of a service provider's facilities for fastest bandwidth --Typical speeds up to 25 Mbps -Fiber Optic, also known as FTTH (Fiber-to-the-Home) --Uses fiber optic cables --Not as widely available as Cable and DSL --Typical speeds up to 500 Mbps --Fastest and most reliable of the ISP services -Wireless --Cellular service ---3G/4G/5G (5G speeds may be up to 1 Gbps) ---Some smartphones can serve as a wi-fi hotspot --Satellite ---Usually costs more, not as reliable ---Typical speeds up to 15 Mpbs ---Municipal wi-fi, public wi-fi hotspots

Social Network Attacks

-Clickjacking - where clicking on a link allows malware to post unwanted links on your page -Clickbait - a link that teases you with just enough information to get you to click the link, driving traffic to a web page -Sharebaiting - when users share posts, often without actually clicking them first, which can lead you to believe the links are safe

Laws

-Computer Fraud and Abuse Act (1986) --Makes it a crime to access classified information you are not authorized to see --Has been amended to include other types of cybercrimes -USA Patriot Act (2002) --Contains provisions for fighting cybercrime --Allows government to scan emails -Internet is worldwide; many attacks originate outside the U.S. where U.S. laws do not apply

Email

-Created in 1965, so pre-dates the Internet -Adapted for the ARPANET soon after its creation, becoming the first "service" -1971: Modern email created, using the @ symbol to separate mailbox (i.e. user) names from host names

Cybercrime

-Criminal activity on the Internet -Most types of crimes existed before computers, but technology has made them easier to commit and therefore more widespread

Harassment

-Cyberbullying - computer harassment between minors -Cyber-harassment - computer harassment between adults --Harassers use email, text messages, IMs, and social networks to embarrass, threaten, or torment someone -Cyber-stalking - More serious form of computer harassment that includes a credible threat of harm

Browser Settings

-Default web browser (but can have multiple browsers installed) -Each browser has default home page, search engine, download folder, etc., but they can all be changed -Cookie - a small text file placed on your computer by a web site you visit --First-person vs third-party -Pop-up blocker - can be configured to allow pop-ups from specific sites -Plug-in - a third-party program that extends the functionality of browsers (largely phased out in more recent browser versions) -Add-on - created for a specific browser to add features to it -Browser toolbar - a browser extension installed by an app that provides quick access to the app from the browser

Web 2.0

-Email and newsgroups have been around since the 1970's -The web developed in early 1990's, and in the first several years, most users were only consumers of information -However, today much of the content on the web is user-generated -Web 2.0 --Technologies used to communicate and collaborate on the web that enable a user to be a creator, not just a consumer, of content --More of a marketing term... a new World Wide Web service was not created

Computer Criminals

-Employees / insiders (most common for companies) --Many companies monitor their employees (track websites visited, read emails) and it is legal for them to do so --Many companies monitor their employees (and it is legal) -Hackers / crackers -Organized crime -Terrorists groups

Encryption

-Encryption software can be used to encrypt files on your hard drive so they can only be accessed with a password -Encryption software can be used to encrypt messages sent via email -When asked to enter personal or credit card info on a web page, make sure it is using the https (not http) protocol

Deep Web/Dark Web

-Estimated that only about 5% of web can be found using a search engine -Deep web --The portion of the web that is not indexable by search engines --Most of this content is legal, but is hidden behind logins and firewalls -Dark web --A subset of the deep web that is encrypted and hidden and only accessible using the Tor browser to view it anonymously and securely --Darknet markets (Silk Road, AlphaBay) can be accessed anonymously to purchase illegal items such as guns, drugs, stolen data, etc. --Bitcoins and other cryptocurrencies used

IP Adresses

-Every device connected to the Internet has to have a unique IP address -Series of 4 numbers (from 0-255) separated by periods -Example: 172.217.11.174 -Domain Name System (DNS) --An Internet service that allows users to use a "friendly" domain name (such as "google.com") instead of IP addresses --DNS servers all over the world -Maintained by ICANN (Internet Corporation for Assigned Names and Numbers -Cybersquatting

FAANG Companies

-Facebook (founded in 2004) -Apple (founded in 1976) -Amazon (founded in 1994) -Netflix (founded in 1997) -Google (founded in 1998) --The "Big Tech" companies - the largest and most dominant companies in the information technology industry

Online Tools For Business

-Facebook Pages - linked to a business or organization instead of a person -Twitter - only one type of account, but can be created for a business instead of a person -SEO (Search Engine Optimization) --Methods used to make a website easier to find by people and web crawlers and to increase the webpage ranking in search engine results --Some SEO methods are highly discouraged by Google and others and can lead them to remove your site entirely

Digital Communication Tools

-Online Collaboration Technologies, such as Microsoft Sharepoint, make it easy for team members to share documents and access them from almost any device -Slack - combines chat and IM - can create channels (similar to chat rooms) for group communication or talk to users individually (like IM) -Web conferencing - Zoom, GoToMeeting, Microsoft Teams, etc. --Can allow users to share screens, use chat

Asynchronous Online Communication

-Online communication that does not require all users to be online at the same time -Examples: Email, SMS/MMS, mailing lists (listserv), newsgroups (discussion boards, forums)

Email

-First Internet service -Uses store-and-forward technology (an email server holds your messages until you request them) -Two ways to access --Email client (MS-Outlook) ---Downloads messages from an email server ---Can read messages in client even when offline ---Can configure to remove messages from email server when downloaded --Webmail interface (using a web browser) ---Can access from anywhere (with Internet access) ---Must be online to read messages -Can configure email clients and webmail interfaces to: --Try and filter out spam mail --Create folders to sort messages --Archive old messages in case you need to retrieve them -Deleted messages saved to a trash folder and can be un-deleted (until you empty the trash) -Can have multiple email accounts (one for work, one for school, etc.) --ISPs provide at least one email account (usually more) --Plenty of free email services ---gmail (Google), yahoo, hotmail, etc. ---Not tied to your ISP, work, or school -Email is not secure --A message can be intercepted as it travels through different networks before reaching its destination --Email provider may scan messages --Employer (or school) network administrators can read messages (and it is legal) --Analogy: an email is like a postcard, not a letter in a sealed envelopeParts of an Email Message

ARPANET (Advanced Research Projects Agency Network)

-First message sent on October 20, 1969 between UCLA and SRI -System crashed on the third letter -By December 5, ARPANET had 4 "nodes" --University of California Los Angeles --Standford Research Institute --University of Utah --University of California Santa Barbara -Bandwidth: 56 kbps

Is E-Commerce Safe?

-Fraud can never be completely eliminated -Before entering personal or credit card information on a page, make sure the URL is using the https protocol --The https protocol tells the web browser and web server to encrypt all data sent using SSL (Secure Sockets Layer), recently re-named TLS (Transport Layer Security) -Sending money to others can be done securely using services such as PayPal, Venmo, Google Wallet, Zelle, etc.

Search Engines

-Google is (by far) the most popular search engine - 90% of all search queries -Others include Bing, Yahoo!, DuckDuckGo, etc. -When doing a search, you are searching against a huge database, not the actual live Web -Search engine companies use software called spiders (crawlers) to crawl the web and gather information, which is then indexed -The entire Web is NOT indexed

IM/Chat

-IM (Instant Messaging) --A real-time text-based communication over the Internet --Primarily between two users, though more can be added --Conversations not persistent (i.e. not saved by the IM service) -Chat --Primarily for real-time group communication over the Internet --Chat rooms are text-based and persistent, and users come and go, often without knowing each other --Chat rooms geared towards common interests (travel, cooking, class, tech support, etc.) --May be moderated (though most are not)

Merging the Networks (TCP/IP)

-In the 1970's, research started on a set of communication protocols to "unify" ARPANET and the other networks -TCP/IP (which define how packet switching works) finalized in 1978 -Became possible to join almost any networks together -1974: First use of the term "internet" (short for internetworking), though this term would not be adopted as the name of the global network until the 1980's -TCP/IP become the official communications standard on ARPANET and other networks on January 1, 1981 (marking the start of the "modern" Internet)

Evolution of the Internet

-Intended to be a military network -Until mid-1990's was primarily an educational network -Starting in mid-1990's, became primarily a commercial network

1990's

-Internet Service Providers (ISPs) become a way for home users to connect to the Internet -Dial-up (slow - 56 kbps) -Crucial in getting home users used to being online -World Wide Web and web browsers developed --Makes Internet easier to use --Greatly increased popularity of Internet -1995: Final restrictions on accessing the Internet lifted

Logic Bomb / Time Bomb

-Logic Bomb --Malware that attacks when certain conditions are met --Example: an employee's name is removed from a company database -Time Bomb --Malware that attacks on a certain day and time --Example: on April Fool's Day

Virtual Worlds

-MMORPG (massively multiplayer online role-playing game) --An online game in which players interact with people in real time in a virtual world using an avatar --Avatar - a virtual body used to interact with others online in virtual worlds and games --Started with MUD, World of Warcraft most popular today

Ransomware

-Malware that perpetually blocks access to a victim's data (by encrypting it) unless a ransom is paid -Payment usually must be paid in bitcoins since they are nearly impossible to trace -Example: WannaCry (2017) --Targeted MS-Windows using an exploit developed by NSA (National Security Agency) --Microsoft had released patches to prevent the exploit, but many sites never installed the patches or were using old Windows versions past their end-of-life --Affected over 200,000 computers in 150 countries, including hospitals in England --North Korea believed to be behind the attack

Packet Switching

-Messages divided into individual packets --Each packet has a header and arbitrary data --Each packet is transmitted and routed independently (using routers) --No single point of failure (decentralized and more robust) -Different from circuit switching (like with telephone switchboard operators) that has a single point of failure

Web Browsers

-Most information on the web is in the form of web pages -HTML (HyperText Markup Language) -Web browsers used to display web pages (and other types of information) -Microsoft Internet Explorer / Edge - Comes installed with Windows -Apple Safari - Comes installed with Mac OSX -Google Chrome - Most popular web browser -Firefox - Open source successor to Netscape Navigator -Mobile browsers for smartphones, tablets

Newsgroups / Discussion Boards / Forums

-One of the first forms of social media... Usenet Newsgroups developed in 1979 -Thousands of different newsgroups on different topics, so people with common interests can ask questions, discuss, etc. -Similar to chat rooms, but not real time -An original message, and all the responses, is called a thread -Private discussion boards / forums common --Companies use for questions and answers about their products --Schools can use for different classes

VoIP (Voice over Internet Protocol)

-Originally allowed phone calls to be transmitted over the Internet instead of traditional phone lines -Later expanded to include video calls as well -Need fast bandwidth (especially for video) -No need to ever pay expensive long distance fees again (especially for international calls) -Examples: Skype, MagicJack

Phishing / Pharming

-Phishing --Emails (and IMs) that appear to be from those you do business with (such as your bank, credit card company, or IT administrator), designed to trick you into revealing information (such as passwords) --Sent out to thousand (or even millions) of email addresses --Spear Phishing - A phishing email (or IM) targeted to a specific individual --Use scare tactics (like your credit card will stop working or you will be locked out of your email account) to get people to respond... do not do it -Pharming --Redirects you to a phony website even if you type in the correct address into your browser --DNS poisoning

Crowdfunding

-Project funding from multiple small investors rather than a few large investors -Most popular sites: gofundme.com, kickstarter.com -Example: Veronica Mars movie funded in 2013 by a kickstarter campaign

SMS / MMS

-SMS (Short Messaging Service) --Also known as text messaging --Used to send brief electronic messages to mobile devices -MMS (Multimedia Messaging Service) --Used to send electronic messages that include text, graphics, video, animation, and/or sound content to mobile devices --Example: Snapchat (messages viewable for brief amount of time and then deleted)

Computer Virus

-Self-replicating malware code that uses a host file to infect computers -When the host file is executed, the virus code is activated -Viruses spread through contact (like biological viruses) --Email attachments (most common method) --Downloading software from websites --USB flash drives

Computer Worm

-Self-replicating malware program that does not need a host file --Not the same as a virus --Spreads itself through networks (like on the Internet) --Example: 1988 Internet worm (Morris worm)

Social Bookmarking and Social News Sites

-Social Bookmarking Site --A site that allows you to save and share your bookmarks or favorites online --Most popular: Pinterest -Social News Site --An online news site that allows community members to submit content they discover on the web and puts it in one place for everyone to see and discuss --Content that is submitted more frequently or gets the most votes is promoted to the front page --Most popular: reddit, Digg, and Slashdot

E-commerce

-Social Media Marketing (SMM) - The practice of using social media sites to sell products and services -E-Commerce - Doing business on the web --B2B (business-to-business) ---One business provides services to other businesses (website hosting, Paypal) --B2C (business-to-consumer) - Most common form of E-Commerce ---Businesses such as Amazon sell goods and services online --C2C (consumer-to-consumer) ---Auction sites, such as eBay and Craigslist ---Airbnb, ride-sharing services (Uber, Lyft) ---Shopping services (Instacart)

Updating Software

-Software publishers often release updates to their programs, which may address security holes in the programs -You can configure software to check for updates automatically, or you can search for updates yourself (auto update usually recommended) -Unpatched systems vulnerable to attack --Example: WannaCry ransomware attack exploited security holes in old versions of MS-Windows -Zero-Day Exploit --An attack that occurs on (or before) the day an exploit is discovered, before the software publisher can fix it

Malware (Malicious Software)

-Spam --Unsolicited and unwanted email messages --Over 50% of all email messages are spam -Adware --Shows ads in the form of pop-ups and banners -Spyware --Secretly gathers personal information about you --Examples: Keyboard logger, browser hijacker

The "dot com" Bubble Bursts: 2000 - 2002

-Staring in April, 2000, NASDAQ stock market started falling -By November, 2000, most Internet stocks had declined by 75% -October 9, 2002: NASDAQ hits lowest level at 1,114 (down 78% from its peak) -Many "dot com" companies (such as Pets.com) were liquidated -Employees layoffs became common -Some surviving companies (Amazon, Google, Ebay) came to dominate

Salami Slicing / Penny Shaving

-Stealing money repeatedly in extremely small quantities -Amounts are small in hope that the thefts will go unnoticed -Example: An employee transferring a single penny from every transaction handled by a bank -Usually done by employee or other insider with access to company's system

Pump-and-Dump

-Stock market manipulation scheme -Buy stock in a company -Put false information out about the company to boost (pump) stock price -Sell shares (dump) while price is high -When people find out the information was false, stock price usually drops

Extortion

-System subject to repeated attacks which will stop with paying of ransom -Embarrassing photos or info obtained and will be shared unless ransom paid (Jeff Bezos) -Data on system encrypted and will only be unlocked with paying of ransom (Ransomware)

The Mobile Revolution

-The "mobile Internet" refers to access to the Internet via a cellular telephone service provider -Shift to mobile access begin in 2007, started accelerating in 2010 -Mobile browsers still have interoperability and usability issues

Hacking

-The act of gaining unauthorized access to a computer system or network -Different types of hackers: --Sneakers - security experts paid to hack into systems to find security holes --Crackers - hack for malicious purposes (theft or vandalism) --Grey hat - hack into systems illegally but not with malicious intent -Hacktivism - hacking to make a political statement -Data breach - a situation in which sensitive data is stolen or viewed by someone who is not authorized to do so --2017 Equifax data breach resulted in over private records of over 140 million Americans being compromised

Identity Theft

-The deliberate use of someone else's identity --Financial identity theft - most common: where someone fraudulently uses your name, Social Security number, or bank or credit card number --Information gathered by many means ---Phishing ---Hacking ---Theft (pickpocketing, etc.) ---Dumpster diving --Better to use credit cards instead of debit cards, since you are not responsible for fraudulent credit card purchases --Check your credit report one time per year for free at: annualcreditreport.com

The Internet vs The Web

-They are NOT the same thing -The Internet - the hardware; i.e. the network of interconnected computer networks -The Web - one of the services (like software) available on the Internet; others are e-mail, chat, VOIP, newsgroups

Crowdsourcing

-Trusting the collective opinion of a crowd of people rather than the individual opinion of an expert -Social Review Sites: Yelp, TripAdvisor -Almost all e-commerce sites show ratings and comments for products -Waze - a mapping app that uses only user-generated content for real-time traffic and route information

Passwords

-Typical method for securing access to computer accounts, online accounts, etc. -Should use strong passwords (passwords that cannot be guessed or easily cracked) --Use a mixture of upper- and lower-case letters, numbers, special characters ($:;!...) --Use at least 8 characters (the longer the better) --Never use common words or personally-identifiable info -Password managers can be used to generate and store passwords so you do not have to remember them -Never give your passwords to other people

Google Search Engine Queries

-Typing one or more words performs an "AND" search, meaning only pages that contain every word will be included in search results -Can put "-" before a word to exclude it; i.e. to not include pages that include the word -Can use "OR" to find pages that include either word (not recommended) -Can use quotes ("...") to find pages with an exact phrase -Can use parentheses for grouping -Can use operators such as "site:" (restricts searching to particular site) -Many other advanced operators

USENet Newsgroups / MUD (Late 1970's)

-USENet Newsgroups --Divided into different topics / anybody can post articles to a newsgroup --Bulletin board systems (like forums today) --No central server or dedicated system administrators -MUD (multi-user dungeons) also created --First online RPG (role playing game) --Allowed online players to chat with each other --Text-based (no graphics like today's RPGs)

URLs

-Uniform Resource Locator - the address of something on the web (a web page, an image, etc.) -A URL consists of several parts, including the protocol, domain name, top-level domain, and (optionally) path -Example - https://www.apple.com/music/index.html --https - protocol (default / most common is http) --www.apple.com - domain name (second-level domain, domain, top-level domain) --/music/index.html - path (optional)

Record Manipulation

-Used to cover up evidence of theft -Database or other records altered so it appears nothing is missing -Could also be used to cover up embezzlement -Usually done by employee or other insider with access to company's system -To help prevent this, not uncommon for companies to monitor their employees' computer activities

Telecommuting

-Using the Internet to work from a remote location (such as home) -Can save time (commuting), gas, etc. -Can be across the country or across the world... -Offshoring: Employing workers in other countries... normally done to save money since foreign labor may be much cheaper

Vishing

-Voice Phishing --Victims are called --May hear a recording saying to call a number --May be a live person -Examples --A call from the IRS saying you have unpaid taxes and have to make an immediate credit card payment in order to prevent the police coming to arrest you --A "support" person from Microsoft saying they have detected malware on your computer, but if you download certain software, they can remove it

Social Media

-Websites that use Web 2.0 technologies that allow a user to create user-generated content, connect, network, and share -Meme - a funny image or catchphrase that is spread by Internet users across social media -Second screen - using a computer or mobile device while watching television to interact with other viewers or view enhanced content

Wikis / Wikipedia

-Wiki - a website that allows users to edit content, even if it was written by someone else -Wikipedia - the most popular wiki site in the world --A massive free encyclopedia where articles written and edited by users --If an article contains incorrect information, it can be updated by a user who knows more --Generally frowned upon for use as a primary source in academic research (though not as much as in the past)

Social Video, Image, and Music Sites

-YouTube - the largest online video-hosting site in the world --Users can subscribe to other users' channels, send messages, and recommend videos --Viral video - a video that becomes extremely popular because of recommendations and social sharing -Flickr - one of the largest image-sharing sites in the world --Can post up to 1,000 pictures or videos --Can adjust the copyright of an image to allow others to use it legally --Can tag an image with keywords so it can be found in searches -Spotify / Pandora --Recommend music to you based on what you and your friends listen to --Can follow friends to see what they like

Cold War

1950's -Department of Defense created ARPA: Advanced Research Project Agency 1960's -ARPA starts research on a "network" that could survive a nuclear attack -Actually more of way to reliably interconnect local area networks

Growth of the Internet

1993: The Internet accounted for 1% of information flowing through two-way telecommunications networks 2000: 51% 2007: 97%

A browser hijacker

A ________ is a form of malware that changes your home page and redirects you to other websites.

Boolean Operator

A ________ is used to create a search filter.

denial of service attack

A ________ sends out so much traffic that it could cripple a server or network.

Web Browser

A __________ is a program that interprets HTML to display webpages.

Meme

A funny image or catchphrase, often of celebrity or pop culture reference, that is spread by Internet users across social media is called a(n):

True

A rootkit is a set of programs that allows someone to gain control over a computer system while hiding the fact that the computer has been compromised.

cyber-stalking

A serious form of personal cybercrime with the perpetrator demonstrating a pattern of harassment and posing a credible threat of harm is ________.

True

A service pack is a large planned update that addresses multiple problems or adds multiple features and includes previous patches and hotfixes.

False

A worm needs a host file, such as a game, to travel on.

Emoji

A(n) ________ is a small image that represents facial expressions, common objects, and people and animals.

Mobile Browser

A(n) ________ is optimized for a small-screen device.

False

Accessing the dark web is illegal.

False

Chat is a service that allows phone calls to be transmitted over the Internet instead of traditional phone lines.

All of the above

Check the ________ on a website for the credentials of the author or organization.

True

Crowdsourcing means obtaining the collective opinion of a crowd of people rather than the individual opinion of an expert.

False

Cyber-harassment between two minors is known as cyber-terrorism.

True

E-commerce is doing business on the web.

False

Email is private and cannot be read by others.

Hyperlinks

Hypertext enables you to navigate through pieces of information by clicking the __________, that connect them.

False

Internet Exchange Points are companies that offer Internet access.

False

It's necessary to type https:// when entering a URL in your browser.

True

Membership in Internet2 is limited to colleges, universities, other educational institutions, museums and art galleries, libraries, hospitals, and other organizations that work with them.

False

Microsoft HTML5 is a popular web browser.

True

Most information on the web is in the form of basic HTML webpages.

True

Much of the Internet consists of user-generated content that should be critically evaluated.

True

On auction websites, one should be wary of shill bidding—fake bidding by the seller or an accomplice to drive up the price of an auction item.

Synchronous Online Communication

Online communication that happens in (near) real time, with two or more people online at the same time Examples: IM, chat, VoIP

True

Ransomware prevents you from using your computer until you pay a fine or fee.

Responding to an Email Message

Reply Reply All Forward

Two-factor Authentication

Which feature requires a verification code to access an account?

True

SharePoint enables employees in an organization to access information across organizational and geographic boundaries.

True

Social media enables users to create user-generated content, connect, network, and share.

True

The Internet Crime Complaint Center (IC3) provides a website for victims to report cybercrimes.

False

The SSID (service set identifier) shields the devices on your network from the outside world.

Dark Web

The ________ is encrypted and hidden and only accessible using the Tor browser to view it anonymously and securely.

Crowdsourcing

The social web relies on _______, obtaining the collective opinion of a crowd of people rather than the individual opinion of an expert.

True

The web is just one way that information moves on the Internet.

False

The web was developed in 1991 by the Advanced Research Projects Agency (ARPA).

False

User-generated content includes videos and photos posted online but not what is written and said.

True

Using the Short Message Service (SMS), you can send brief electronic messages between mobile devices.

Social Media

Websites that enable you to create content, connect, network, and share are called ________.

DNS (Domain Name System)

What enables you to type a URL in your browser instead of an IP address to reach a website?

Podcast

What is a digital media file of a prerecorded radio- or TV-like show that's distributed over the web?

False

You shouldn't run a hardware and software firewall at the same time because they can conflict with each other, causing connectivity issues.

SMM

_______ is the practice of using social media sites to sell products and services.

Cyber-terrorism

________ is an unlawful attack against computers or networks that's done to intimidate a government or its people for a political or social agenda.

Bandwidth

________ is the data transfer rate of a network measured in kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).

A data breach

________ occurs when sensitive data is stolen or viewed by someone who is not authorized to do so.

Identity Theft

________ occurs when someone fraudulently uses your name, Social Security number, or bank or credit card number.

Pharming

________ redirects you to a phony website even if you type the correct address into your browser.

Network Address Translation (NAT)

__________ is a security feature of a router that shields the devices on a private network from the public network (the Internet).


Ensembles d'études connexes

Chapter 13: Investments and Fair Value Accounting

View Set

FOC I - 4.6 Indirect Argument: Contradiction and Contraposition

View Set

Digital Imaging and Digital Subtraction (DSA)

View Set

Real Estate Final (quizzes 3-13)

View Set