Danie Weishaar

Module 5

Checkpoint

T/F:

1.       F; Crimeware is software used by cybercriminals.

2.       F; A rootkit is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.

3.       T

4.       T

5.       T

6.       T

7.       F; A license agreement is the right to use software.  The license agreement provides specific conditions for use of the software, which a user must accept before using the software.

8.       F; Unencrypted, readable data is called plaintext.

9.       F; Private key encryption is also called symmetric key encryption.

10.   T

11.   T

12.   T

Matching:

1.       I

2.       C

3.       D

4.       E

5.       F

6.       G

7.       B

8.       H

9.       J

10.   A

 

Problem Solving:

2. Phishing Scam: If you have fallen victim to a phishing scam, the first thing you may want to do is to change your password to your email account immediately.  You would also want to change the password to any important account that you may have accessed on your computer including online banking site passwords and email passwords.  You would want to do this immediately because then the scammers are then less likely to be able to access your sensitive information on your computer.

3. Suspicious File Attachment: If your computer is running slower than usual after opening a suspicious file attachment, that probably means that your computer was infected with a virus or malware.  What you would want to do is to try and remove the virus or malware, which may require purchasing a software that will help you do this.  Or you could try and take your computer to a knowledgeable and trusted IT technician.

5. Laptop’s Physical Security: If you want to ensure that your computer will remain safe after stepping away from it for a bit, you may want to set up a password onto your laptop.  By setting up a password, people cannot easily access your laptop.  So before you leave your laptop unattended, make sure you lock your computer so no one else can get into it.

6. Corporate Firewall Interference: After installing a new program on a corporate computer, you often will get an error message that prompts you to enter a username and password.  This is because you do not have authorization to download or install certain programs onto the computer.  Companies and schools set the computers up this way so that people cannot download anything that could be damaging to the computers.  You must be within the IT department to be able to have the access to download or install items.

8. Unclear Acceptable Use Policy: After looking through your company’s acceptable use policy and not finding information about looking on news sites while on lunch break, the best thing to do would be to ask.  Ask either a manager or a coworker on what sites are acceptable to access during your lunch breaks.  News sites are likely okay, but it is important to use your own discretion on what is acceptable.

 

Internet Research

2. Social Media: Unauthorized Access – I chose to look at Facebook

                a.) What steps can you take to mitigate the chance of becoming a victim of a hack?

                                b.) You can protect your password by not using your Facebook password anywhere else online.  You can also use their extra security features, make sure your email accounts are secure, log out of Facebook when not using it, run anti-virus software on your computer, and think before downloading anything.

                a.) Can you adjust the connection settings to restrict who can see stories, send friend requests and messages, or search for you by name or contact information?

                                b.) You can control who sees your posts, stories, messages, and if you appear in searches through your privacy settings on your profile.

                a.) Can you hide certain posts or block people from posting on your page?

                                b.) Yes, you can do both of these things.  If you want to hide posts on your timeline, there is a little settings button on each of your posts on your timeline, you can choose who sees the post or you can choose to delete the post.  You can also block people on Facebook so they won’t be able to see your posts or be able to search you.  You can also choose who posts on your timeline.  On your profile you can go to the Activity Log and change it so that you can choose each post you want on your timeline by reviewing the pending posts.

                a.) Can you reports posts if they violate the website’s terms?

                                b.) Yes you can reports posts if they violate Facebook’s terms.  Many social media platforms allow you to do this.

                a.) What are other potential threats to someone accessing your account?

                                b.) A major threat to someone accessing your account is that they can gain a lot of information on you.  People often put a lot of information on social media in which people can hack into your account and possibly steal your identity.  Someone could start using your profile as a front to catfish or scam other people into giving you money and believing they are someone they aren’t.