(
Latest Revision:
Sept 07, 2006
)
Week Two Notes
Announcements
- We are doing 'self-service' roll call today. Please mark the appropriate
box with an 'X'. Please tell me if your name is missing from the sheet.
- Quickly illustrate left, right justification, centering & left+right
justification.
- Check to see if you got e-mail from me: you may need to re-send your
e-mail message for assignment #1.
- There are some errors in the subject lines: 'copy and paste' is probably
the best strategy.
- Look at example of 'Phishing'
Morals:
- Almost always, an e-mail requesting personal information means
someone is trying to deceive you.
- If you visit a web site and you plan to enter personal information,
verify the URL independently and make certain you are visiting the site
you intend to visit. Best way: enter the URL your self in the address
pane at the top of your browser.
- I posted some URL's - you can look and get some security information.
-
Chapter Ten
- How can we change technology so we feel more secure?
- Have you been a victim of computer crime?
- A lot of computer crime goes unreported. Should something be done about
that? If so, what? If not, why not?
- Are you concerned about the possibility that your life might be adversely
affected by computer crime, such as:
- stolen credit card numbers
- identity theft
- stolen e-mail addresses sold to spammers
- changes in databases
- password theft: how could this happen here at school? What if
someone does something illegal while logged in as you and
authorities trace the activity back to you? What if someone finds
out how to log into your online bank account and takes your money?
- actual theft of computer
- How could password theft happen here at school? What if someone does
something illegal while logged in as you and authorities trace the
activity back to you? What if someone finds out how to log into your
online bank account and takes your money?
- Do you ever get "phished"?
- Do you ever shop online? If so, what kinds of precautions do you take?
- Do you know what a computer virus is? Ever had problems with one? How
about worms, trojan horses, spyware?
- After looking at the access control methods on page 396, which do you
think would be the most convenient? Why?
- What are the characteristics of a good password?
- Why are backups important as a security consideration?
- If you use your company's e-mail system, it probably has the right to
read all the e-mail you send and receive using that system - without
informing you. What do you think of that?
- Does it bother you that government officials may be able to track your
location by using GPS technology in your cell phone?
- What do you think of "Active Badge" technology that allows your employer
to track you while in the workplace?
- What do you think about relying on software to decide whether to fire
weapons - weapons that may kill people? Do you believe there are
problems with software reliability?
Chapter Zero
- Most people in the world have never touched a computer. How far will
computers 'reach' in the future?
- What are the parts of a computer? What is disk storage? What is primary
memory? What does the CPU do?
- What is an operating system?
- What is an application?
- What is a 'document'?
- How are we going to do our backups?
-
-
-