~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _...

14
~h.Rp+ef }7 The Internet and Your Security The Internet is a worldwide collection of computer networks. Anyone with a computer and a modem or other connection can tap into the Internet's amazing wealth of information. The convenience and quick access to information that it provides is a tremendous benefit. However, there is a security risk due to the fact that computers around the world are so well connected. Anyone on that vast net- work of networks-even someone across the world- could take private information from your computer. Fortunately, there are steps you can take to protect yourself. You can thwart the efforts of intruders by learning how to fight threats to your security. .... -= =~ Q .~ :> -0 ....... = Q ~ CI Q) c... © @ Lesson 17-1 t> Interactive tutorials Privacy v Vocabular~Previewworksheet and Copyright v Learn More interactivities Issues v CheckYourUnderstanding ® instant feedback assessment Lesson17-2 v CheckYourKnowledge - Computer Crime instant feedback assessment and Criminals v InterdisciJ21inaI):: J2ractice .. ® activities Lesson17-3 !> InterdisciJ2linaryal2l2lication Ensuring Computer activities Safety Using Technology Wisely 247

Transcript of ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _...

Page 1: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

~h.Rp+ef }7

The Internet and Your Security The Internet is a

worldwide collection of computer networks. Anyone

with a computer and a modem or other connection can

tap into the Internet's amazing wealth of information.

The convenience and quick access to information that it

provides is a tremendous benefit. However, there is a

security risk due to the fact that computers around the

world are so well connected. Anyone on that vast net-

work of networks-even someone across the world-

could take private information from your computer.

Fortunately, there are steps you can take to protect

yourself. You can thwart the efforts of intruders by

learning how to fight threats to your security.

....-==~Q.~:>-0.......=Q~CIQ)c...

©

@ Lesson 17-1 t> Interactive tutorialsPrivacy v Vocabular~Previewworksheetand Copyright v LearnMore interactivitiesIssues

v CheckYourUnderstanding

® instant feedback assessmentLesson17-2

v CheckYourKnowledge-

Computer Crime instant feedback assessmentand Criminals v InterdisciJ21inaI)::J2ractice

..®

activitiesLesson17-3 !> InterdisciJ2linaryal2l2licationEnsuring Computer activitiesSafety

Using Technology Wisely • 247

Page 2: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

-_ ~===~.9~t~ille ·I~.p!~~tion_~s·yo_u______:=In-lesson 1"7.-.1-onlin_Sl~.you will -=

::::-=--.=- ogyi~~erodin'9 personal ·reacnhe lesson-use an outline ~ -fiiYdcmrrrefeatures artd--informa--=-- privacy. =- = to nelp you-organize iSSlTe~ - - tlC)rl for tnis leS_:son;includin'g: -

-. Describe the issues of copy- about privacy and ethic_sin • lnteractive tuto-rials- --righted materials. computing.

• Discuss ways to use-com- .r-r.----------.puters responsibly. ~A. _

B. _..,.

~ Key Terms• Web bug (p. 248)• source note (p. 249)

248 • Chapter 17

,What's Online

• As You Read worksheet• Learn More interactivities• Check Your Understandinginteractive assessments

• Interactive lesson review~A. _

1.

Eroding PrivacyThe Internet has spawned new ways to track the things youdo-even in the privacy of your own home. The Web sites youvisit, the pages you read, and the items you buy can be moni-tored by others.

Web Bug Placed on a Web site or in an e-mail message, a Webbug is a tiny GIF graphic image. It is used with a cookie to trackthe activity of a Web user. It sends the information to a companythat watches all the activity on the Web site. These bugs, alsoknown as spyware, can tap into the Internet address of the com-puter being used, making it possible to record the surfing habitsof a particular user.

The DoubleClick Case The Internet advertising companyDoubleClick found itself in a lot of trouble over privacy. In early2000, the company purchased Abacus Direct, which had a hugemarketing database. After the purchase, DoubleClick announcedthat it would combine its Internet database and the Abacusinformation. This would make the Abacus data on 120 millionhouseholds available over the Internet. People complained, andsome filed lawsuits. A federal government agency threatened toinvestigate. Finally, DoubleClick dropped the plan.

Privacy at Work Employers have the right to monitor allactivity that takes place on their equipment. This includes per-sonal phone calls made on business phones, personal e-mailmessages sent from a company e-mail account, and nonbusiness-related Internet activity conducted on the company's comput-ers. Nearly 75 percent of businesses monitor employee activitieson company time. Workers are advised to never use companyequipment for personal use. This policy also applies tocomputers at school-which is also a type of business.

Page 3: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

Copyright IssuesThe Internet is the largest library in the world. Copying some-thing from the Internet and pretending it is your own work isunethical and illegal. Failure to properly acknowledge a sourceis called plagiarism and is punishable by law.

Requesting Permission To request permission to use a largeamount of copyrighted material, you need to contact the authoror the organization that holds the copyright. On a Web site, thecopyright and contact information may be given at the bottomof the page. If it is not, it is probably best not to use that source.

Properly Citing Sources You should always give credit tothe original author of material you are quoting no matter whatthe length. Writers give this credit by using source notes. Whatinformation is included in the source note depends on the kindof source that was used:

• For material from books, list the author's name, the nameof the publication, the publisher, the date of publication,and the page number.

• For material from Web sites, include the title of the Website, the date it was last updated, the sponsoring organi-zation, the date you visited it, and the site's URL.

Consequences of Violating Copyright Copyright infringe-ment is a crime punishable by law. Stealing someone's work isthe same as stealing CDs from a store. The parents of minors-children below age IS-are liable for damages and court costs iftheir children are prosecuted for copyright infringement.

Software is copyrighted, too, and itcannot be copied without violatingthat copyright. Companies caneither buy a copy of a program foreach user or buy a network ver-sion with multiple licenses.

Think About It!Underline the method of updatingthat would take less time.

~ Buy, install, and upgrade thesoftware for each computer.

'> Buy and install a network ver-sion of the software and storeit on a server.

Figure 17 .1.1 You need to supplysource references for materials youfind on a Web site, just as you wouldfor printed materials.

Using Technology Wisely • 249

Page 4: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

[email protected]

Sequence the importance of eachitem using a scale of 1 (lowest) to5 (highest) to indicate how vitalyou think each goal of acceptableuse pollcles is. Write yourresponse next to each item.

s> respect privacyt> prohibit copyright violations!> block users from objection-

able sitespromote a feeling of comfortamong all users

v protect school property

Using Computers ResponsiblyHow people use computers can affect other people. This appliesto how they use a network and to the e-mail messages theysend.

Following AUPs School districts and many public librarieshave written acceptable use policies, or AUPs. These policiesstate what kind of behavior is expected and explain the conse-quences that occur when people act in unacceptable ways.Access to computers is a privilege, not a right. Therefore, accessentails using computers responsibly.

Not Sharing Passwords At a school, each student is respon-sible for any policy violations traced to his or her account. Keep-ing a password a secret, therefore, is one way of preventinganyone else from misusing an accotmt.

Practicing Netiquette The Internet has a set of expectedbehaviors called netiquette. One of those norms is to send e-mailsonly to people who really need to see a message. You should alsokeep e-mail messages short and avoid sending extremely largefiles, which take a long time to download.

Rules for Computer Use1. Internet use is for educational

purposes only.

2. Users must have a valid, authorizedaccount to access the networks.

3. Accounts may be used only by theowner of the account.

4. The user is responsible forsafeguarding the computer account.

5. E-mail and other communications shallnot be considered confidential andmay be monitored for acceptable use.

6. Users are expected to use appropriatenetiquette at all times.

7. Vandalism-including uploadingor downloading viruses-is a criminalactivity punishable under state andfederal laws.

Figure17.1.2 Make sure you know and follow your school's acceptable use policy.

250 • Chapter 17

Page 5: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

Using Technology Wisely • 251

Cri,tical Thinking,

1. How do Web bugs invade a person's privacy?

2. Why do you think employers have the right to monitor workplace communications?

3. What do you think is meant by the statement" Access to computers is a privilege, not a right.Access entails responsibility"?

Activities

1. Complete the chart below with the information required to properly cite a source.

Citing Sources Properly

;,\' .'

.,'~Online sources' .'.' /. 'FPri,r,tt sources " ,

/".' }," ," ,

,- ._ ~ _o._' __ .

2. Work with a partner to review your school district, campus, or class AUF to identify issuesregarding netiquette. Identify appropriate activities, give examples of each, and evaluatewhether users apply the policies consistently.

Page 6: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

~ Key Terms• denial of service attack(p.252)

• hacker (p. 253)• cracker (p. 253)• cyberstalking (p. 254)

252 • Chapter 17

• Check Your Understandinginteractive assessments

• Interactive lesson review

Different Types of AttacksCountless attacks on computer networks have taken place overthe years. They can be split into three categories:

• reconnaissance attack• access attack• denial of service attack

Reconnaissance Attack In the army, reconnaissance isscouting ahead to see where an enemy is positioned. In the com-puter world, a reconnaissance attack is also an information-gathering activity. The computer user, like an army scout, gath-ers information that can be used later to tap into a computer.Software tools are used to find weaknesses in home computers,networks, and Web servers.

For example, password-cracking software was originallydeveloped to help technical support staff assist users who hadforgotten their passwords. However, this software can also beused by intruders to find passwords so they can break into a net-work and damage it.

Access Attack An access attack gains access to e-mailaccounts, personal files, databases, and other confidential infor-mation. This information can then be used to commit crimessuch as fraud, identity theft, or information theft.

Denial of Service Attack The purpose of a denial of serviceattack is to prevent legitimate users of the system from beingable to use it. Attackers flood a network with large amounts ofdata. This prevents other people from getting through, shuttingdown the attacked system. In 2001, a denial of service attackcrippled major Web sites like Amazon, eBay, and Yahoo.

Page 7: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

Computer CriminalsThere are a variety of individuals who cause security problemsincluding the following.

Hackers Computer users who enjoy pushing computer sys-tems and programs to the limits are called hackers. They like tofind undocumented features of software and track down weak-nesses in security. An unwritten code of conduct, called thehacker ethic, forbids the damage and destruction of data.

Some businesses recruit hackers to help them develop bettersecurity procedures. In some cases, hackers have joined withlaw enforcement officials to track down people who wrotedestructive viruses or who committed computer crimes.

Crackers Crackers is short for criminal hackers. These indi-viduals intend to gain entry to highly secure networks. Some-times they only leave a message to let everyone know they werethere, but crackers have also been known to damage the sys-tems they enter.

Virus Programmers Most virus programmers are peoplewho have superior programming skills. Most of them simplywant to push the limits of virus software. However, some virusprogrammers create viruses that are very damaging-they candestroy all the data on a computer's hard drive.

Detective If you are interested instopping computer crime, youmight want to become a detective.These law enforcement officialsinvestigate crimes and try to iden-tify-and catch-the criminalswho committed them. Detectiveswho work in the field of computercrime need a good understandingof computers and software, aknowledge of the law, and a desireto help others.

CLIFF STOLL

" I learned what our networksare. I had thought of them as acomplicated technical device, atangle of wires and circuits. Butthey're much more than that-afragile community of people,bonded together by trust and co-operation. If that trust is broken,the community will vanish forever. "

Cliff StollAuthor, The Cuckoo's Egg

In1986, Stoll noticed an error-of 75cents-in a university computer network.Stoll traced the error to someone whowas not authorized to access the network.Eventually, he realized that the intruderwas looking for secret defense informa-tion. Stoll cooperated with law enforce-ment officials and tracked down theintruder, who was later arrested.

Using Technology Wisely • 253

Page 8: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

Some Web sites have a specialarea for children under 13 years ofage that includes advice on how touse the Internet safely and how topractice Internet netiquette. Manyhave tips on avoiding viruses,hoaxes, and frauds. Others includeways children can report suspi-cious or illegal activities they haveseen on the Internet.

Figure17.2.1 A partnershipbetween the FBI and theNational White Collar CrimeCenter, called IC3, lets youreport cybercrimes online.

Swindlers Some computer criminals are swindlers who usethe Internet to trick people out of their money. They might sellgoods that they never deliver or use false work-at-home oppor-tunities or get-rich-quick scams to take advantage of people.

Cyberstalkers One of the fastest growing computer crimes iscyberstalking. This is the use of the Internet, e-mail, or otherforms of electronic communication to harass or threaten some-one. Women and children are at the most risk. Cyberstalkers aredangerous; some victims have been killed when they met per-sonally with the stalker. The growing presence of cyberstalkersmakes it very important not to give out personal information.

Software Pirates Many ordinary people are softwarepirates-people who illegally use software copied from anotherperson. Users should buy all software that requires payment.Violators may be punished for running software that is copiedillegally.

Reporting a CybercrimeIf you witness an Internet-related crime, whom should youreport it to? You could talk to a parent or guardian. If you saw itwhile in school, you might speak to a teacher or school official.The important thing is to report the crime to someone.

Complaint Referral FormInternet Crime Complaint Center

L Note: Fields marked with" are required.

Your Personal information ------------------,

*' First Name:

Middle Name: --------* Last Name:Business Name: --------

* Age: Please Select One... ...

*' Gender: Please Select One... ...

*' Address: -------~--Address (continued): ----------Suite/Apt.jMail Stop: ~----------* City:

254 • Chapter 17

Page 9: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

Hackers Crackers

Criticall Thinking

1. How do denial of service attacks differ from reconnaissance attacks and access attacks?

2. Why is it unethical to use pirated software?

3. What do cyberstalkers do? Who is most at risk from these attackers?

Activities

1. Complete the Venn diagram to compare and contrast computer hackers and crackers.

........... ...

.-JIiII/I.~-"~~~~~

•.............•~~~=;.:~~

Both

2. Make a list of computer crimes you have seen or are aware of. Explain how these crimes affectothers, and what people can do to reduce their occurrence. -

Using Technology Wisely • 255

Page 10: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

_ __ atlo-Q~~:'YO_U==--In Lesson 17=3 online,-you~~ill - ;__--=-=-re-ad the lesson-use a corrcept =:o-.find more-features-an-d informa: --=

i Describe methods to protect weDt9;:help you identify details ti6n-for this.lesson, includihg:that s_upportsafe computingcomputer systems.practices.

• Discuss ways to protect yourpersonal safety online.

~ Key Terms• token (p. 257)

• smartcard (p. 257)

Figure 17 .3.1 Some networks,such as those used by air trafficcontrollers, are critical to publicsafety.

• Interactive tutorials• As You Read worksheet• Learn More interactivities• Check Your Understandinginteractive assessments

• Interactive lesson review

The Risks to SafetyCriminals who access computerized information can causemany problems. They can harm individuals, companies, andeven nations.

Loss of Privacy Intruders who steal personal information canharm an innocent person in many ways. They can carry outidentity theft. These intruders can gain credit card informationand make purchases. They can also find very private informa-tion-such as personal medical data. They could try selling theinformation or use it to blackmail the person the information isabout. Intruders can also break into a person's computer systemand send messages using the person's password. Any problemsthat result will appear to have been caused by the passwordowner, not the intruders.

Character Assassination People's reputations can be ruinedby others who send false-and sometimes unpleasant-mes-sages in their names. A cybercriminal once forged an online arti-

cle in the name of a professor. Thatprofessor received thousands of e-mail messages criticizing him for anarticle he never actually wrote.

256 • Chapter 17

Public Safety The misuse of com-puters and technology can pose risksto public safety and even endangerhuman life. A teenager once dis-rupted telephone service at a regionalairport, and the air traffic controllershad trouble communicating withpilots. An air accident could easilyhave occurred as a result. .

Page 11: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

Identification Techniques One way to stopunauthorized people from accessing a computer net-work seems to come straight from a science fictionmovie. Biometric authentication relies on uniquephysical characteristics-such as voice recognition,facial recognition, thumbprint analysis, and retinalscans-to match authorized users to a database.

What types of organizations might benefit from such tools? Write your ideas below.

Protecting Your Computer SystemJust as there are many different ways of tapping into someoneelse's computer, there are also many different approaches topreventing those attacks from taking place.

Authentication Techniques Some companies require usersto provide more than just a password:

• In some systems, users must also have tokens, which arehandheld electronic devices that generate a logon code.

• Some companies require people to use a smartcard, acredit-card-sized electronic device with its own internalmemory. Used along with a secret number, a smartcardcan reliably establish that the person trying to gain accesshas authorization to do so.

Using Firewalls Many businesses and home computer sys-tems use firewalls as protection. A firewall is a program or pieceof hardware that provides a barrier between the Internet and anindividual computer or network. It permits a computer toaccess the Internet but blocks the ability of outsiders to accessdata on that computer.

Computers that use a DSL or cable modem to connect to theInternet are always connected-all day, every day-unless themodem is turned off. This greatly increases the possibility thatsomeone can break into the computer. Firewalls are essential inthese cases.

Using Technology Wisely • 257

Page 12: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

TechnQlogy@iliHolDeMany people have both e-mailand a personal Web site. Suchsites also need to be protectedfrom invasion of privacy.

Thin'k About 'It!Think about the information Websurfers can log onto. Underlineeach item you think could be aproblem if it reaches the wronghands.

p> photograph of the family,/ family tree,/ holiday newsletter,/ details of family member's

new job,/ home address and telephone

number

Figure 17.3.2 Manysites offer help in protect-ing your online privacy.

258 • Chapter 17

,Protecting Yourself OnlineIndividuals need to be careful to protect themselves when surfingthe Web or talking to others in Internet chat rooms or via e-mail.

Surfing Anonymously You can pay a service to cloak youridentity when you go online. This prevents others from findingout who you are. The best protection is to guard your identity.

Preventing Cyberstalkers Many people enjoy conversingwith others in chat rooms. Unfortunately, some visitors to chatrooms do not have good intentions. Cyberstalkers try to learnthe identity of other chat room participants and then locate andcontact them. Protect yourself by following these guidelines:

• Never share personal information, such as your name,address, or school's name, with anyone in a chat room.

• Use a name that disguises your age and gender.• Do not post a user profile. People in a chat room mayseem friendly, but you never know who might be there.

• Never agree to contact or see in person anyone that youmet in a chat room. You do not know what that person isreally like, or if he or she is a risk to your safety.

• If you become involved in any situation that makes youafraid, contact the police. Save all the communicationsyou received-they may help police locate the person.

Facts for Consumers EmIli PDF Farmll

How to Protect Kids' Privacy OnlineWhether pl~ng, ,hopping, tlu~ng or Just surfing, loday'll(lda are laldng advantaoe of III th.lthl web has to offer.Butwhln It

comu to thalr personal Information onlln., wtlo'aln charge? In an etrortto putparlnttln the catbird seat, the Faderal TradeCommlsalon has established nawrul •• forwebalte operators 10make sure Ihal klds1 prlVacyi$ protsel.d While theYTe online, rheasrules are part cflh, 1 aaa Children'. Onllne Prhacy ProtlcUon Act Ha,,,,, a lOokat what the law "Clul, .. , .lartlngAprIl21, 2000,

Website Operator. Must:POIt ,hell' IIIM."tC)II)oUcy.

Web,'t .. dlrectad to children or thai knOWlngry coll,ct Informatlon (rom kids unaer 13 must poat a notice ofthllr InformaUon GolI.euonpractlees thatlnctudea:

.. IYPII ofpllreon.'lnfOm'liUon thaycotl,c1ft'am k1dl4tor lumpls, name, home address. email Iddrlll or hobbl"

.. howtha site will u"In, InformlUon-for el(am1l11,to markel to ttle ehUdwho supplied thalnform,Uon, to noUfyconblalwlnnat. orto m.kettt,lnrorm,ticn mUable through, chUd.. p,rtldp.Hon In a ctlal room.

- whether plrsonlllnformlUon II folWlrded to adVertruri or other third parties ... lConl.ctalth •• ite.

Get Ptl'.'lal COIIN,II.In mlny cues, a sltemust obtain parentll conunt before collecting, using or dISClosing pe/sonallnformation ,boul. chUd.

Conlent', not rlqulr.dwtlan a sne II collecting In ImlUlddrEtis to:

.. respond WI on.-tlme ,.qullt fromthe cnlld •

.. prOVIdl notice to Ihe p.,.nt.- an,ure the .Ifety oftha child ortne ~"e... end a nlwaletlar or othlr Information on I regular basis is long II the slta notl1il8 a parent and glva. them I chanetto say no to

the arrangemlnt.

Page 13: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

1. _

Critical Thinking1. What are some consequences of an intruder's being able to hack into a computer system?

2. What is the purpose of tokens and smartcards?

3. Why are firewalls especially important for computers that have DSL or cable modem hook-ups to the Internet?

Activities1. Using the graphic organizer below, indicate different strategies for preventing yourself from

being harmed by a cyberstalker.

...;-=c~.S!e 4.:0"'C.....C0~<:>a.>.....@

12 I 3._

......~ ~

~I~"""""'!!"~"""""""'~I. """"I ~-;;-;::;::.-: "!""""'!!'~ ~----=-~----:-__ ~.'.'...........•.•......•....•......•...............•........'

_~.~ 5. __

......~

2. Using the library or the Internet read about firewall software. Find out how a firewall works.Draw a diagram illustrating the process.

Using Technology Wisely • 259

Page 14: ~h.Rp+ef }7images.pcmac.org/SiSFiles/Schools/TX/HondoISD... · 2019. 9. 26. · _ ~===~.9~t~ille·I~.p!~~tion_~s·yo_u_____:=In-lesson 1"7.-.1-onlin_Sl~.you will-=::::-=--.=-ogyi~~erodin'9

Directions: Match each vocabulary term in the left column with the correctdefinition in the right column. Write the appropriate letter next to the word or term.

1. Web bug2. source note3. denial of service attack4. hacker5. cracker6. cyberstalking7. token8. smartcard

a. prevents authorized users fromaccessing a service

b. device that confirms networkauthorization

c. computer user who examines programsto find flaws and weaknesses

d. way to acknowledge a sourcee. handheld device that generates a logon

codef. cybercriminal who tries to access secure

networks to cause damageg. image that makes it possible to record

the surfing habits of a computer userh. using electronic communications to

threaten or harass someone

Directions: Circle the correct choice for each of the following.

1. About what percentage of employersmonitor the computer communica-tions of their workers?a. 10 percentb. 25 percentc. 50 percentd. 75 percent

2. What must you always do to quotefrom a published source-whetherfrom a book or from the Internet?a. Copy and paste the quotation.b. Request the source's permission.c. Drop the idea because it is illegal.d. Cite the source.

3. Which is appropriate netiquette?a. send files of any size with e-mailsb. send only large files as

attachmentsc. send small files as attachmentsd. avoid sending any attached files

• Chapter 17

4. What kind of attack is it when anintruder hacks into a network to com-mit a crime or cause damage?a. accessb. denial of servicec. reconnaissanced. virus

5. How can the data on a hard drive becompletely erased?a. fraudb. scamc. swindled. virus

6. Which of the following securitymeasures is NOT an authenticationtechnique?a. firewallb. passwordc. smartcardd. token