CS 103 lecture 1 - 5
Internet security has two parts
1. Protecting your computers and data from malware and intrusions 2. Protecting your credentials from hackers and cybercriminals
Screen reader software cannot read images, it only reads the text of the alt attribute
Alternative Text
Anyone using your work must provide attribution (give credit) to you
Attribution (BY)
In almost all countries, computer software are protected by copyright as well.
Computer Software
ccTLDs(___) are particular to a geographic location .ca = Canada .uk = United Kingdom .mx = Mexico Each country controls how its ccTLD is used. Some countries have chosen to allow people outside the country to use theirs such as: .io (British Indian Ocean Territory) .me (Montenegro) .co (Colombia)
Country Code TLDs
Exception of copyright: _____ this is a provision in U.S. copyright law that allows for limited use of copyrighted works for a few defined purposes. criticism, comment, news reporting, research, scholarship, teaching
Fair Use
_____is the ease with which contents of a website can be found using software such as search engines and users on the website. Search engines cannot see images. They are only able to use the alternative text to determine what an image is about.
Findability
_____: also called content images, provide information, can be used as hyperlinks.
Foreground images
Screen readers include the level of the headings.
Heading
http://www.bpl.org/general/hours/index.php: http:// is
HyperText Transfer Protocol
What is HTML?
Hypertext Markup Language
Screen readers include the number of items in a list, helping users to visualize the length of the list
Lists
Reasons to Hyperlink
Navigation, Help the User, Do the right thing
Can websites be copyrighted? The original authorship appearing on a website may be protected by copyright. This includes writings, artwork, photographs, and other forms of authorship protected by copyright." Can domain names be copyrighted? ____
No.
Abbreviation for "no derivative works", Others may use your work "as is", but not create a derivative work (collage, translation, mashup)
NoDerivs (ND)
Commercial (business) use not allowed
Non-Commercial (NC)
Not protected by copyright: _______
Public Domain
______ gTLDs are meant for a particular purpose. When registering one, you need to agree that you meet the _____. You may be contacted upon to prove it later. Examples: .biz = businesses .pro - for licensed professionals (e.g. accountant, plumber) .name - for individual people, or fictional characters to which the registrant has rights
Restricted, criteria
Derivative works you create must have the same CC license as yours
Share Alike (SA)
_______ gTLDs are administered by ______ that tightly control their use. Only eligible entities are allowed to register them in the first place. .edu: colleges, universities (within the US) .gov: U.S. federal government entities .mil: (U.S. military) .museum: Museums .travel: travel and tourism sites .xxx: "Adult" sites
Sponsored, organizations
Getting Permission: To use copyrighted material, you must get permission from the owner. This can be done in several ways: 1) The copyright owner may pre-emptively give you permission through a _______ or _______that grants permission as long as you follow those terms. 2) Otherwise, you must get permission individually by writing to the copyright owner and negotiating a license. This may involve payment.
Terms of Use, Creative Commons license
This malware "enter through files that we willingly download or open because we think they are useful"
Trojan horses
Every webpage, folder or file in world wide web has a specific address which is called ____
URL
If a page has no title, the ____ or _____ will be displayed in the browser frame instead
URL, filename
URL
Uniform Resource Locator
This malware "enter via infected files (such as email attachments)"
Virus
Different types of malware
Worms, Viruses, Trojan horses
what is markup language?
a computer language that uses tags to annotate the information in a document
____attribute is a must for images in the web It is supposed to describe the image in a few words. <img src="bu-logo.png" height="" width="" alt="Boston University" > The value of alt attribute (Boston University in the above example) is called _________
alt, alternative text.
Trojan Horse Example - Fake ____ has become a common Trojan horse technique. Affects both Windows and ___ systems - A ___ window tells you that your computer is _____ "Click here to scan or fix". - Some web pages use _____ to download malware when you visit the page; no ___ required. - This is called a "______." -This is the reason to avoid pages with suspicious URLs.
anti-virus software, Mac, pop-up, infected, JavaScript, clicking, drive-by download,
Protect Yourself Against Viruses: - Run ____ ( even if you have a Mac) - Keep anti-virus software ____ - Do not open _____ that you aren't expecting, or from people you don't know and trust - If you are not sure, call the person/company and ask before opening
anti-virus software, up to date, email attachments,
href is an _____ of the <a> tag - it provides information necessary for the a tag to work. Here, that information is the designation (or target) of the link.
attribute,
______: can be created by CSS not by HTML, do not provide information (just for decoration), are not clickable.
background images
For images that are purely ____, use the null alt attribute: alt=""
decorative
A Trojan horse is malware "____ as ____ files or applications that entice you into ____ and _____ them."
disguised, useful, downloading, executing
http://www.bpl.org/general/hours/index.php: bpl.org is the ______name
domain
Two great hiding places for Virus:
email attachments, Microsoft Office (Word or Excel) macros
How does Trojan horses get onto your computer?
enter through files that we willingly download or open because we think they are useful
How does worm get onto your computer?
enter through vulnerabilities in software
How does virus get onto your computer?
enter via infected files (such as email attachments)
http://www.bpl.org/general/hours/index.php: /general/hours/ is the _____
file path
These ______s are all unrestricted; they can be used by anyone for any purpose. However, they are usually used for com = ? org = ? net = ? info = ?
gTLD
Copyright is a legal concept that ____authors and artists control over _____of their creations for defined periods of time.
grants , certain uses
http://www.bpl.org/general/hours/index.php: www is a_____or ______(World Wide Web)
hostname , subdomain
You are hosting a web at the following URL: http://cs-people.bu.edu It means that you have a _____ on WorldWideWeb (WWW) under _____ name bu.edu
house,domain
The text between the <a> and </a> tags is called the ____ text.
link
In addition to reading all the text of the page, screen readers identify ____, _____, and _____
links,lists,headings
For most web hosts, this is the public_html folder (for Unix/____ machines) or the Inetpub/wwwroot folder (for _____ web servers) An _____ software such as FileZilla can transfer files from a computer to a webhost. FTP stands for ______
linux, Windows,FTP, File Transfer Protocol
http://www.bpl.org/general/hours/index.php: Index.php is the _____
page (file)
Malware (malicious software)
software designed to interfere with a computer's normal functioning
A virus is: -a ____ type of malware, not a term for all malware. - A parasitic application that can _____. - Requires a ____ that it can hide inside of.
specific, self-replicate, carrier
Table Tags: To make a table, you need three tags:
table, tr, td (or th)
Hypertext?
text that contain links to other text
Protect Yourself from Trojan Horses - Read reviews from ___ sources (e.g. CNET, Mac World) before you download any software. - Trusted source means something that cannot be faked or manipulated - Are user reviews trusted sources? - Never download software from a____ window or by clicking on a ___. Always go to the ____ website for software. - Be suspicious of pop-ups, software offers, warning messages. - Never visit a site marked as _____ in search engine results
trusted, pop-up, link, vendor's, malicious
cybercriminals were using a certain top-level domain to make phishing more effective.What is the name of this phishing attack?
typosquatting
To Protect Yourself from Worms: - Keep ALL your software _____ - Whenever possible, turn on ____ - ____ of software you do not need - Do not ____ apps or software that is ___ longer being updated
up to date, automatic updates, get rid, use, no
What Makes You Vulnerable to Worms? - Not automatically _______ the operating system on your computer or phone - Not applying updates for popular software like (Microsoft Office, Firefox, Safari, Google Chrome, Anti-Viruses, WordPress, Adobe Reader, Flash Player)
updating
Title is crucial to both_____and ____
usability,findability
This malware "enter through vulnerabilities in software"
worm
- A ____ travels from computer to computer on a network by _____ vulnerabilities (bugs) in ______. - It does not require ____ action to spread.
worm, exploiting, software, human
Two reasons to talk about internet security:
- When building a website, it's your responsibility to keep your visitors from being at risk - When using a website hosted by others, it's important to protect yourself