Chp 11 Section 4-5 Notes - Auburn City Schools

klapdorothypondMobile - Wireless

Nov 23, 2013 (3 years and 8 months ago)

58 views

Chapter 11


Section 4
-
5


Techniques use to Access the network


War Driving or access point mapping


Individuals attempt to detect wireless network via their
notebook computer or mobile device while driving a
vehicle through areas they suspect have a wireless
network


War Flying


Use airplanes instead of vehicle to detect unsecured
wireless network

How can I ensure my wireless communication is
secure?



Firewalls


Secure your wireless access point (WAP)


WiFi Protected Access (WPA)


Authenticate network users and provide advanced
encryption techniques


802.11i (WPAs)


Conforms to the government security standards and
uses more sophisticated encryption techniques the
WPA

What are some health concerns of computer
use?



Computer vision syndrome (CVS)
eye and vision problems

Computer addiction
-
when computer
consume entire social

Tendonitis


inflammation
of a tendon due to
repeated motion

Carpal tunnel syndrome


inflammation of the nerve that
connects the forearm to the palm



Repetitive strain injury (RSI)

Injury or disorder of the muscles, nerves,
tendons, ligaments, and joints




What precautions can prevent tendonitis or
carpal tunnel syndrome?


Spread fingers apart for several seconds while
keeping wrist straight


Gently push back fingers and then thumb


Dangle arms loosely at sides and shake arms and
hands

What is Ergonomics?


An applied science devoted to incorporating
comfort, efficiency, and safety into the
design of items in the workplace.

What are
computer ethics
?


Moral guidelines that govern use of computers and information systems

Unauthorized use
of computer
&Networks

Intellectual
property rights

Codes of conduct

Information
privacy

Information
accuracy

Software theft

(piracy)

Green
Computing

What is information accuracy?



Accuracy of computer input


Altering photo


National Press Photographer Association oppose



What are intellectual Property (IP) and
Intellectual property rights?


Intellectual Property


Refer to unique & original work such as ideas,
inventions, art, writing, processes, company and
product name and logos.



Intellectual Property Rights


The rights to which creators are entitled for their work

What is an IT code of
conduct?


Written guideline that
helps determine whether
computer action is ethical


Employers can distribute
to employees

IT Code of Conduct

1.
Computer may not be used to harm other
people.

2.
Employee may not interfere with other’s
computer work.

3.
Employees my not meddle in other’s
computer files.

4.
Computers may not be used to steal

5.
.Computers may not be used to bear false
witness.

6.
Employees may not copy or use software
illegally.

7.
Employees may not use others’ computer
resources without authorization

8.

Employees may not use others’
intellectual property as their own.

9.
Employees shall consider the social
impact of program and systems they
design.

10.
Employees always should use computers
in a way that demonstrates and respect for
fellow humans.



What is Green Computing?


Involves reducing the electricity and
environmental waste while using a computer.


ENERGY STAR program


Develop by US Department of Energy and US
Environmental Protection Agency (EPA)


Help reduce the amount of electricity used by computer
and related devices


What is Information Privacy?


Right of individual and companies to deny or
restrict the collection and use of information
about them


Difficult to maintain today because data is stored
online


What is an electronic profile?


Data collected when you fill out forms on the Web


Merchant sell your electronic profile


Often you can specify whether you want personal
information distributed

What is a Cookie?


Small
text file on
your computer that
contains data about
you

Set browser to
accept cookies,
prompt you to
accept cookies or
disable cookies

Some Web sites
sell or trade
information
stored on your
cookie

User
Preferences

How
regularly
you visit
Web site

Interest
and
browsing
habits

What is Spam?


Unsolicited e
-
mail message or newsgroup,
posting sent to many recipients or
newsgroups at once.


Internet Junk mail

How can you control spam?



E
-
mail filtering

Anti
-
spam program

Service that
blocks email
messages from
designated
source

Attempts
to remove
spam

Collects spam
in central
location that
you can view
anytime

Sometimes
removes valid
email
messages

What is Phishing and Pharming?



Phishing

Scam in which a perpetrator
sends an official looking
email message that
attempts to obtain your
personal and financial
information

Pharming

Similar as phishing but they
attempts to obtain your
personal and financial
information through
spoofing

What are Spyware and Adware?


Spyware is a program placed on a
computer without the user’s knowledge
that secretly collects information about
the user


Adware is a program that displays an
online advertisement


Some Privacy laws that have been enacted



1970 Fair Credit Reporting Act


Limits the right of other viewing a credit report to only
those with a legitimate business need.


1984 Computer Fraud and Abuse Act


Outlaws unauthorized access of federal government
computers


1998 Children’s Online Privacy Protection Act (COPPA)


Requires Web sites protect personal information of
children under 13 years of age




What is Social Engineering?



Gaining unauthorized access or obtaining
confidential information by taking advantage
of the trusting human nature of some victims
and naivety of other

What is Employee Monitoring?



Involves the use of computers to observe,
record, and review an employee’s use of a
computer

What is content filtering?


Process of restricting access to certain
material


Internet Content Rating Association (ICRA) provides
rating system of Web content


Web filtering software restricts access to specific
sites