Added security
IP Address: Unique identifier on the Internet – Unique number attached to the Internet
Phishing – Emails or queries asking for personal information and can be related to identity theft.
Identity Theft – someone uses your information
Piggy Backing – Connect to someone else’s network without the owners consent.
Cookies - Information about your data and yourself
3rd party cookie – used for advertising
Biometric authentication – finger print or eye scan
Scare Ware – “Your computer is infected” – popup
Incognito feature on a browser – Google Chrome
Mac – security system is the IOS Gatekeeper
Mac – change system settings through “Preferences”
Approximate range for Bluetooth – Up to 30 feet.
Mobile device – virus is called mobile malware
Logical virus – Logic bomb – when logical conditions exist, for example at a certain date or time for virus to initiate.
Macro - Virus embedded in a Microsoft office document.
Worm - Self-replicating program.
Click jacking – Icon that you click on and it takes you somewhere else.
Important to run anti-virus software, delete history and cookies on a computer.
Know what could indicate a virus present on a computer.
Firewall – acts like a locked door on your computer.
Zombie – similar to a root kit – computer that is controlled by the hacker without the user’s knowledge.
Easiest way to get on your network is with a wireless network.
Wireless router security should be set at the best or the highest.
WPA2 – Security standard on a router.
Passwords – Use symbols, not personal information. Don’t use function keys. Symbols mix upper and lower case, numbers.
Social Media, LinkedIn, number one site for social media to get jobs.
Lion on LinkedIn – Linked In Open Networker.
Social media privileges can be revoked if you do something that you should not on the site.
Ask for LinkedIn recommendation from someone immediately after completing a project.
Maximize button on browser is the square.
RAM – Random Access Memory – memory storage on your computer.
Problem step recorder.
Screen recorder,
LAN – Local Area Network.
Ready Boot – Windows 7, 8, 8.1 – Can use storage space on a jump drive as RAM.
Professional picture on LinkedIn – shoulders and head.
Peripheral Device – Keyboard, mouse, printer. Anything that you plug into a computer. Speakers, microphone.
Speed – hertz. Gigahertz is faster than a megahertz.
Cloud storage – Cloud computing – Internet storage. Need Internet access.
Input peripheral – mouse, keyboard,
Output device – printer, monitor.
Computer box – system unit or CPU.
Wireless LAN – Wireless network.
Title bar – tells the name of a document.
Operating system - Windows or IOS – program that operates the computer, runs applications
URL – Visual representation of your IP Address. Uniform Resource Locator – www.weber.edu, only one page can have a URL. It cannot be shared.
Internet protocol – HTTPS
Domain – www.weber.edu - weber is the domain
You May Also Find These Documents Helpful
-
Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…
- 255 Words
- 2 Pages
Satisfactory Essays -
1. Cut-through frame processing by a switch allows the switch to discard frames that fail the FCS check?…
- 901 Words
- 3 Pages
Powerful Essays -
! ! enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 enable password class ! ! !…
- 2018 Words
- 38 Pages
Satisfactory Essays -
Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…
- 508 Words
- 3 Pages
Satisfactory Essays -
* Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…
- 275 Words
- 1 Page
Satisfactory Essays -
To demonstrate that a particular type of virus can be written or created, some virus writers create “proof of concept” viruses that do not cause…
- 546 Words
- 3 Pages
Good Essays -
Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such…
- 599 Words
- 3 Pages
Good Essays -
Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…
- 393 Words
- 2 Pages
Satisfactory Essays -
A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…
- 691 Words
- 3 Pages
Good Essays -
* Is the virus software configured to scan all the important hard drives and files?…
- 594 Words
- 3 Pages
Good Essays -
Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…
- 1283 Words
- 6 Pages
Good Essays -
My week starts on Thursday after work. I get home do my daily routine and then start reviewing the week that I have ahead. I start of by going through the Leaning Guide for Unit 3, where it tells me all the tasks I have for the week and produces a checklist that I should complete by the end of the week. My first task was to peer review the writing assignment for Unit 2. Therefore, that was what I did first and this did not take long. I was surprised because most of the students did not get the answers correct, or they left it incomplete. When I saw the answers, I knew I had gotten three of them wrong and I was so furious because I was unsure of the answers that I produced at first, and I had changed them several times. One student got 2/7, and the other two got 3/7. This make me think that most of the students do not understand the material. I’m not saying I understand everything but I always try to attempt every question rather than leaving it incomplete.…
- 570 Words
- 3 Pages
Good Essays -
When an identity thief calls or emails you pretending to be someone else in order to get your personal information.…
- 402 Words
- 2 Pages
Satisfactory Essays -
Save all these passwords in your browser because it will be a HUGE pain to type them in every time you need them.…
- 464 Words
- 2 Pages
Satisfactory Essays -
Never mind creating a password with at least eight characters, two of which are numbers, one of which is a capital letter, and one of which is a symbol like (*&^%$). The easiest way for a hacker to weasel into your account is likely the "Forgot your password?" link.…
- 666 Words
- 3 Pages
Good Essays