Tuesday, January 26, 2010

Criterion I

Week of 1/25- 1/31: Download Dreamweaver, look up tutorials, practice using it. Scan clothing designs and make descriptions
Week of 2/1- 2/7: Design web page, diagram process
Week of 2/8- 2/14: Design web page, diagram process
Week of 2/15- 2/21: Design web page, diagram process
Week of 2/22- 2/28: Edit/test web page, diagram process
Week of 3/1- 3/7- Finalize edits and make sure final product works

Tuesday, January 19, 2010

Discussion Questions 4-6

4- I think that email messages should be encrypted when they are sent. This way it will be harder to decode them, and those who are not willing to work too hard to get the information they want (illegally) will be discouraged. However, people bent on evil will find a way to commit it one way or another, so it doesn't make much difference whether the messages are encrypted or not.

5- No, I would not like to work in a business where I was required to wear an active badge. I like to have my privacy and I would not like my location being tracked and recorded at all times. I might as well be a cow or some other livestock or merchandise that needs to be kept track of.

6- Like missile defense systems, other large software systems would have to be completely reliable, without the chance of making a mistakes. There is also the worry that these large systems would take humans out of the equation and result in the loss of jobs.

Review Questions 10, 11

10- In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals?
Computer security can protect the privacy of individuals when it blocks unauthorized users from gaining access to private information. It prevents those intent on harming others from hacking into private accounts and stealing money or information. Computer security can threaten privacy of individuals when it becomes too invasive. Companies are allowed to read through the email records of employees who use their computers, and the FBI is allowed to wiretap, go through personal conversations and emails, and do other electronic surveillance.

11- What are smart weapons? How do they differ from conventional weapons? What are the advantages and risks of smart weapons?
Smart weapons are weapons that use computerized guidance systems to locate their targets. They are extremely accurate, but reduce time people have to make life and death decisions. If used properly, they can greatly decrease the amount of civilian damage done. If the user does not use accurate data or make a correct decision, many innocent lives can be lost, as with the example of an American guided missile cruiser using a computerized defense system to shoot down and Iranian Airbus with 290 civilians.

Monday, January 18, 2010

CrossCurrents: Risky Business

1- The author suggest that the widespread deployment of RIFID tags will be accepted by consumers if the industry makes handy RFID-reading tools available to them. Do you agree with his assessment?
At this point in technologic advancement, I think consumers will accept anything that will, or appear to, make their lives easier. People want their lives to be fast and easy, these tags will make locating things a lot easier.

2- Suppose every object costing more than $10 contained an RFID tag. Would you be interested in purchasing a hand-held RFID reader capable of helping you find lost items around your house?
No, I would not want one. The RFID reader may get confused between items. Also, if it costs more than $10, there is not MUCH likelyhood that you will easily lose it.


3- Would you embed an RFID tag in your dog or cat if that would increase your lost pet's chance of being returned to you?
No, I would not. Even if the pet gets lost, it may either come back or find a better home. I would rather not have a device that tracks and records the movements of my pet and possibly me embedded in it.

Ch 10. Review Questions

7- What are the two inherent characteristics of computers that make security so difficult?
Two inherent characteristics that make computer security so difficult are software errors and hardware glitches.

8- Describe several different computer security techniques and explain the purpose of each.
Different computer security techniques include passwords, which make the user type in a special code to gain access to a computer; firewalls, which guard agains unauthorized access to an internal network; encryption, which scrambles transmissions by apply a secret numerical code to the message; and audits, or audit-control software which monitors and records computer transactions as they happen so auditors can trace suspicious computer activity.

Wednesday, January 13, 2010

Review Questions 2, 4

2- Why is it hard to estimate the extent of computer crime?
Many computer crimes go undetected. Among those that are detected, many go unreported because businesses fear that they will lose more money from the negative publicity generated, than from the actual crime. The crime might also be covered up.

4- What is the most common computer crime? Who commits it? What is being done to stop it?
Theft is the most common computer crime. Computers are used to steal money, informations, goods, and computer resources. Criminals may steal the actual computer, or the identity of the person who owns it. The people who commit these crimes are usually trusted employees who discover a loophole and get tempted and have problems that motivate them to act on these temptations.

Tuesday, January 12, 2010

Key Terms:

computer crime: any crime accomplished through knowledge or use of computer technology


identity theft: the crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards

spoofing: a process used to steal passwords online

social engineering: slang for the use of deception to get individuals to reveal sensitive information


sabotage: a malicious attack on work, tools or business


malware: malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs


virus: software that spreads from program to program or from disk to disk, and uses each infected program of disk to make copies of itself. a form of software sabotage macro virus: viruses that attach to and are transmitted through macros embedded in documents; usually spread via email email virus:viruses spread via email


worms: programs that use computer hosts to reproduce themselves, Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy, a form of software sabotage


trojan horse: a program that performs a useful task while at the same time carrying out some secret destructive act. a form of software sabotage. logic bomb: a program designed to attack in respnse to a particular logical event or sequence of events time bomb: a logic bomb that is triggered by a time-related event


spyware: technology that collects information from computer users without their knowledge or consent tracking software -> spybot: a spyware application, also called tracking software, that gathers user information and communicates it to an outsider via the Internet drive-by download: a spyware download onto your computer that occurs simply by visiting certain websites

hackers: someone who uses computer skills to gain unauthorized access to computer systems cracking: unauthorized access and/or vandalism of computer systems, shore for criminal hacking phreaking: the hacking of telecommunications systems

DoS attacks: Denial-of-service attacks: bombard servers and web sites with so much bogus traffic that they are shut down, DDos: distributed denial-of-service attacks: a denial of service attack in which the flood of messages comes from many compromised systems distributed across the Net


antivirus: a program designed to search for viruses, notify users when they're found, and remove them from infected files

computer security: protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction

passwords: the most common security tools used to restrict access to computer systems firewalls: a gateway with a lock, encryption: codes protect transmitted information and a recipient needs a special key to intercept it, SSL: badges: A microprocessor-controlled ID badge that broadcasts infrared identification codes to a network receiver that updates a badge-location database.

verification and validation: the process of checking that a product, service, or system meets specifications and that it fulfills its intended purpose

UPS: uninterruptible power supply: protect computers from data loss during power failures

virus scans: when a software scans the computer for files infected by viruses

backups: a data recovery insurance

RAID: redundant array of independent disk: a storage technology that enables multiple hard disks to operate as a single logical unit

authentication mechanisms: guarantee that users have permission to perform particular actions

user identifier: information about the user's privileges associated with every user

smart weapons: a missile that uses computerized guidance systems to locate its target

autonomous system: complex systems that can assume almost complete responsibility for a task without human input, verification, or decision making

Monday, January 4, 2010

Key Terms: Ch. 8

network: a computer system that links two or more computers wireless network: a network in which a node has a tiny radio of infrared transmitter connected to its network port so it can send and recieve data through the air rather than through cables

Ethernet: a popular networking architecture developedin 1976 at Xerox

Wi-Fi: a popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away wireless access point: a communication device, typically connected to a wired network, that is used to create a wireless network

LAN: Local area network: multiple personal comuters connected on a network MAN: metropolitan area network: a service that links two or more LANs within a city WAN: wide area network: a network that extends over a long distance. each network site is a node on the network

node: anything connected to the network routers: programs or devices that decide how to route Internet transmissions

fiber-optic cable: high-capacity cable that uses light waves to carry information at blinding speeds

client-host: client: part of network that requests information, recieves data. host: part that gives data out

server: a computer especially designed to provide software and other resources to other computers over a network access: physical proximity to a person, or knowledge about that person, a common theme in privacy discussions access permissions

spam: Internet junk mail phishing: the use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information

login: a one-word name that you type to identify yourself when connecting to a secure computer system, network, or email account password: the most common securtiy tools used to restrice access to computer systems

firewall: internet security system for computers VPN: Virtual Private Network: a network that uses encryption software to create secure "tunnels" through the public internet or between intranets, a method an organization can use to set up and extranet.

sysadmin: system administrator: person employed to maintain and operate a computer system and/or network

nodes: anything connected to a network work station: personal home computer

UPS: uninterruptible power supply: a hardwar device that protects computers from data loss during power failures

EDI: electronic data exchange: a set of specifications for conducting basic business transactions over private networks

blogs: short for web log, a personal web page that carries diary-like entires or political commentaries wiki: a web site that lets anyone iwth access to a web browser to modifiy its pages

asynchronous communication: Delayed communication, such as that used for newsgroups and mailing lists, where the sender and the recipients don’t have to be logged in at the same time. real-time communication: Internet communication that enables you to communicate with other users who are logged on at the same time. chat room: public real-time teleconference IM: instant messaging: a technorlogy that enables users to create buddy lists, check for buddies who are logged in, and exchange typed messages and files with those who are

bps: bits per second

GPS: global positioning system: a defense department system with 24 satellites that can pinpoint any location on the Earth

Internet telephony: A combination of software and hardware technology that enables the Internet to, in effect, serve as a telephone network. Internet telephony systems can use standard telephones, computers, or both to send and receive voice messages. VoIP: voice over IP: a protocol that allows the Internet to be used to mave voice telephone calls video teleconference: Face-to-face communication over long distances using video and computer technology. voice mail: a telephone-based messaging system with many of the features of an email system

NOS: network operating system: server operating system software fo a LAN




workstation: personal home computer
client-host: client, part of network that recieves data. host: part that gives data out
server: allows many users access to same information ex. websites stored on servers
Network interface card: allows you to connect an Ethernet or other internet using this card
protocol: how data is formatted, transmitted, and received.