Tuesday, January 26, 2010

1.)

2.)A static IP address is an address that does not change over time unless changed manually. It is used when you need the IP address or network location to remain the same consistently. A Dynamic IP address is an address that keeps on changing. It is mostly used when having a consistent IP address is not necessary.

Google's IP Address: 216.239.51.99

Tuesday, January 19, 2010

Discussion Questions: 380 HW

4.) I believe that everybody should have the right of security on the web especially through email.

5.) I would not mind working in a business where all employees were required to wear active badges. As a matter of fact, in some ways I do. By knowing where all of the employees are located in the building, the employee can be located if they receive an emergency phone call. Also, let's say there is a fire in the building. Security would be able to tell if anyone was trapped inside. I think it's a great idea!

6.) How do the issues raised in the debate over the missile defense system apply to other large software systems? How do you feel about the different issues raised in the debate?

It seems reliably and fair and the issues raised in the debate seems quite fair.

Review Questions: 1/19/2010

10. Computer security can help protect private information by keeping viruses and other information stealing things out of our computer. But, such virus protection can be carried too far, preventing the computer user from getting any work done.

11. Smart weapons are missiles that use computerized guidance to locate their target. These weapons locate their target without being controlled from a third party. The advantage is that they can be extremely accurate to the target. A risk is that it reduces the amount of time people make to make life and death decisions.

Monday, January 18, 2010

Discussion Questions: p. 376

1.Yes I agree with the author's assessment on the widespread of RFID tags.

2. Yes, for that little price tag it would be reliable in using, if i loose any items at my house it would be easier to find.

3.I would most definitely embed an RFID tag in my dogs and cat if that would increase their chance of being returned to me.

Monday, Jan. 19: Review Qs #7-8

7.) computers have two inherent characteristics that leave them open to attack or operating error: A computer will do exactly what it is programmed to do, including revealing sensitive information. Any computer can do only what it is programmed to do.

8.)One way to reduce the risk of security breaches is to make sure that only authorized personnel have access to computer equipment. Depending on the security system, you might be granted access to a computer based on something you have&endash;a key, an ID card with a photo, or a smart card containing digitally encoded identification
something you know&endash;a password, an ID number, a lock combination, or a piece of personal history
something you do&endash;your signature or your typing speed and error patterns
something about you&endash;a voice print, fingerprints, retinal scans, or other measurements of individual body characteristics, known as biometrics

Wednesday, January 13, 2010

p. 363-366 notes

When Security Threatens Privacy:

*Active badges can simultaneously improve security and threaten privacy by:
*Identifying who enters a door or logs onto a machine
*Finding an employee’s current or earlier location
*Remembering: At the end of the day, an active-badge wearer can get a minute-by-minute printout listing exactly where and with whom he or she has been.

Rules of Safe Computing :

*Share with care.
*Beware of BBS risks.
*Don’t pirate software.
*Disinfect regularly.
*Treat diskettes with care.
*Take your password seriously.
*Lock sensitive data.
*Use backup systems.
*Consider encryption for Internet activities.
*Prepare for the worst.

1/13/10 Wednesday

1.) why is it hard to estimate the extent of computer crime?

Since Its happening everyday which is hard to keep track of the hackers



2.) What is the most common computer crime? Who Commits it? what is being done to stop it?

Identity Theft; The typical computer criminal is a trusted employee with personal or financial problems and knowledge of the computer system. Because of rising computer crime and other risks, organizations have developed a number of computer security technique to protect their systems and data.

Tuesday, January 12, 2010

Key Terms: 1/12/10

1.) Sabotage: A malicious attack on work, tools, or business.

2.) Malware: Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.

3.)virus(es) :Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.

4.) Worms: programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.

5.)Trojan horse: A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.

6.) spyware: Technology that collects information from computer users without their knowledge or consent.

7.) Hackers: A slang term for a computer enthusiast, i.e., a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject(s).

8.) Dos Attacks: (denial-of-service attack), a type of attack on a network that is designed to bring the network to its "knees" by flooding it with useless traffic.

9.) smart weapons: are missiles that use computerized guidance systems to locate their targets.

S/E issue: People & Machines
AOI:

10.)autonomous system : is a complex system that can assume almost complete responsibility for a task without human input.

S/E issue: People & Machines
AOI: Business

Monday, January 11, 2010

Key terms: 1/11/10

1.) Computer crime: Any crime accomplished through knowledge or use of computer technology.

S/E: Privacy and Security: Your privacy and security has been hacked by hackers through either identity theft on the computer
AOI: Business: the hacker might use if for money purposes

2.) Identity theft: The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim’s credit cards.

S/E: Privacy and Security: Your information is not protected
AOI: Business

3.) Spoofing: A process used to steal passwords online.

S/E: Privacy and Security: Your account is now hacked and now free of access to hackers
AOI: Business; maybe your account had to do with business purpose.

4.) Social engineering: Slang for the use of deception to get individuals to reveal sensitive information.

S/E: Privacy and Security: Your information is now to the public and no sense of privacy by the hackers.
AOI: Business

Sunday, January 10, 2010

1/11/10

etiquette rules for appropriate behavior while on the internet:

While on the internet, it is important to follow guidelines and rules while surfing the net for instance being polite at all times while on the web even though you are not actually having a conversation with a person face to face, but you still have to respect to the person your chatting with and to be careful what you type, remember that you're not communicating with a computer screen. One easy thing that can be avoided is typing in CAPITAL LETTERS; it shows that your shouting to the person your chatting is one rule to avoid for appropriate behavior on the web. Also when you type something make sure you are not using slang or offensive words, it shows that you are a bad person on the web and face to face and may result to your account may be deleted for offensive behavior. There are many illegal programs on the internet which is tempting to download on your desktop, make sure not to break any laws and to follow policies and standards; you may get a fine from the government for breaking the law. Make sure that your identity is not to revealing to the world since anybody has access to the web and can read your information that you posted on a social networking sites like Facebook or MySpace, keep it restricted to people you only know and don't reveal to much information for. One last thing is to not expose yourself on the web by uploading pictures or videos or even posting up inappropriate pictures and it can be addicting and may become out of control which may lead to bad habits on the web. These are some etiquette rules for appropriate behavior while on the internet.

Thursday, January 7, 2010

Vocabulary Words

1.) Network: A computer system that links two or more computers.

S/E Issues: Reliability and Control

AOI: Business and Education

2.) Ethernet: A popular networking architecture developed in 1976 at Xerox.

S/E Issues: Policies & Standards: Certain requirement on this networking device and Reliability: since its been around for 30 years.

AOI: Business and Education

3.) Wi-Fi: A popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away. Often referred to as 802.11b.

S/E Issues: Reliability and Control

AOI: Entertainment

4.) LAN (local area network): Multiple personal computers connected on a network.

S/E Issues: Equality of access: each user get the same local network and Control

AOI: Business and Education

5.) Node: Each computer and shared peripheral on a local-area network.

S/E Issues: Reliability and Control

AOI: Business and Education

6.) fiber-optic cable: High-capacity cable that uses light waves to carry information at blinding speeds.

S/E: Reliability

Control

AOI: Business and Education


7/8.) Client/Server: Client programs in desktop computers send information requests through a network to server databases on mainframes, minicomputers, or desktop computers; the servers process queries and send the requested data back to the client.

S/E: People and Machines

Policies and Standards

AOI: Business and Education


9.) Spam: Internet junk mail

S/E: Control: you control what is junk

AOI: Business and Education


10.) Password: The most common security tools used to restrict access to computer systems.

S/E: Privacy: You only have access to your password

Security

11.) VPN (virtual private network): A network that uses encryption software to create secure “tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet.

S/E: Private and Security

AOI: Business



12.) Sysadmin: A system administrator, s a person employed to maintain and operate a computer system and/or network.

S/E: People & machines

AOI: Business



13.) Nodes: Each computer and shared peripheral on a local-area network.

S/E: Equality of access

AOI: Business and Education



14.) UPS (uninterruptible power supply): A hardware device that protects computers from data loss during power failures.

S/E: Reliability

AOI: Business and Education



15.) EDI: (electronic data interchange): A set of specifications for conducting basic business transactions over private networks.

S/E: Privacy and Security

AOI: Business and Education

"Online Study Guide": Ch.8

Summary of Results
76% Correct of 25 Scored items:
19 Correct: 76%
6 Incorrect: 24%

Tuesday, January 5, 2010

HW: 1/5/10

What are the different levels of access to the internet?

These are different levels of networks one can access and use:
1.)LANs allow Multiple personal computers connected on a network.
2.)MANs is a service that links two or more LANs within a city.
3.)WANs allows a network that extends over a long distance. Each network site is a node on the network.

Monday, January 4, 2010

Networking Sites

1.) Twitter: allows you to post up comment to different users and also send messages to your friends.

Facebook: another social networking site which allows to post images, videos, pictures and status almost similar to what of twitter (same concept).

Myspace: upload music, video on your profile share your mood update your layout almost similar to facebook and twitter.

2.)It allows to connect with friends and family with a click of a mouse and you can no what there up to by just reading their statuses it saves lots of time.

3.) Privacy
Security
Control