Tuesday, January 26, 2010

Criterion I

For my project, I'll be making a cook book filled with recipes by the "Fattouh-e's" and other family friends that we use daily. These recipes are unique and would be good for others who are still learning how to cook or just want to try something new.
I will be going around adding recipes of my own and from other family members. I'll actually be cooking/making these recipes and take pictures of them to add in my cook book. Every time I make one of the recipes, I'll add the ingredients and instructions as I go. Finally, I'll put it all together in a certain format so that it will be easily put together as a "book". Then, I'll print it out at Kinko's in book form, and I might even be able to distribute/sell them to others. Also, this was a project my sister and I had been wanting to work on for a while (for the family at least), and now others can benefit from it as well.

Tuesday, January 19, 2010

Discussion Questions (4-6) HOMEWORK

4) I think that it can work both ways. It secures the user's privacy and at the same time it can help computer criminals do their job a lot easier with that extra help.

5) I wouldn't mind it as long as it's not something that, in a way, "controls" me or "monitors" me. But if I had to choose between two jobs, one with it and one without it (and I liked the jobs both the same), I would probably go with the one without the active badges.

6)

page 379 Review Questions 10 & 11

10) In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals?
- It protects the privacy of an individual because it allows them to keep things to themselves and not let things get out to others.
-It can threaten the privacy of individuals because there are computer thieves, hackers, software pirates, viruses, spy bots, wiretaps, and so forth that come with the computer securities. With all of the information that we give about ourselves to a machine that sends information to who knows where, we are then under the government's control. They can tap our calls and read our e-mails, monitor what we're doing, and data transmissions.

11) What are smart weapons? How do they differ from conventional weapons? What are the advantages and risks of smart weapons?
- Smart weapons are missiles that use computerized guidance systems to locate their targets.
- Advantage: If everything works properly, smart weapons can reduce the amount of civilian destruction.
- Risk: They reduce the amount of time people have to make life-and-death decisions. Decision time decreases, and error increases.

Monday, January 18, 2010

page 379 #s 7 and 8

7) What are the two inherent characteristics of computers that make security so difficult?
- Bugs and Breakdowns. Computers are just one long chain of technologies and we rely on them a lot. If one BIG power fails, then it affects so many others.

8) Describe several different computer security techniques and explain the purpose of each.
- Passwords/eye and fingerprint scanning keeps people from stealing user's information.
- Firewall keeps the programs inside a computer secured.

Thursday, January 14, 2010

Key Terms

smart weapons: A missile that uses computerized guidance systems to locate its target.

autonomous system: The unit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division).

notes on 366-368 (HW)

There have been so many computer crimes happening lately and the federal and state gov'ts needed to do something about it. People got away with so much, and finally the gov't decided to take action by creating laws against hackers and other people who commit crimes using technology (i.e. identity theft). Some have had their computers confiscated while others have been arrested and jailed.
Telecommunications Act of 1996 attempted to deal with things like "what kind of communications are legal online?" More laws came up because the questions were endless. So, other laws came up to try to put a stop to these offenses and criminal acts because so many innocent people are paying for it. There are still more problems that are to be solved by future lawmakers. This is just one of the many things that lawmakers have to face to be able to protect us and our rights, especially with all of these technological advances that have gotten people to commit such crimes.

Wednesday, January 13, 2010

Review Questions pg 379 #s 2 &4

2) Why is it hard to estimate the extent of computer crime?
- We can't really estimate how many people commit computer crimes or even how far the computer crimes go because some people commit computer crimes without even knowing it. Some do it intentionally, but even then not all crimes are recorded or dectected. Therefore, we don't know for sure, nor can we estimate.

4) What is the most common computer crime?
- Software Piracy. It is a violation of intellectual property laws.

Who commits it?
- The crime itself is committed by millions of people, even if they don't realize they're doing it, but it can also be committed by young people who are smart with computers (hackers). But even then, hackers are responsible for only a small fraction of computer crimes. The computer criminal is usually someone who is trusted with personal things and has knowledge of the computer system.

What is being done to stop it?
- Because of all the computer crimes, many organizations developed a new security techniques to protect their system. (i.e. keys, scanners, badges, etc.)

Monday, January 11, 2010

Key Terms

sabotage: A malicious attack on work, tools, or business.

malware: Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.


virus: Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
macro virus: Viruses that attach to and are transmitted through macros embedded in documents; usually spread via email.
email virus: Viruses spread via e-mail.

worms: Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.


trojan horse: A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
logic bomb: A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
time bomb: A logic bomb that is triggered by a time-related event.

spyware: Technology that collects information from computer users without their knowledge or consent.
tracking software: A spyware application program, also called a spybot, that gathers user information and communicates it to an outsider via the Internet.
spybot: A spyware application program, also called tracking software, that gathers user information and communicates it to an outsider via the Internet.
drive-by download: A spyware download onto your computer that occurs simply by visiting certain Web sites.

hackers: Someone who uses computer skills to gain unauthorized access to computer systems. Also sometimes used to refer to a particularly talented, dedicated programmer.
cracking: Unauthorized access and/or vandalism of computer systems; short for criminal hacking.
phreaking:

DoS attacks: (Denial of Service attacks)--> A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they’re effectively shut down, denying service to legitimate customers and clients.
DDos: (Distributed Denial of Service)--> A denial of service attack in which the flood of messages comes from many compromised systems distributed across the Net.

Monday, January 4, 2010

FLASHCARDS (words)

network: A computer system that links two or more computers.
wireless network: A network in which a node has a tiny radio or infrared transmitter connected to its network port so it can send and receive data through the air rather than through cables.

Ethernet: A popular networking architecture developed in 1976 at Xerox.

Wi-Fi: A popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away. Often referred to as 802.11b.
wireless access point: A communication device, typically connected to a wired network that is used to create a wireless network.

LAN: Local Area Network--anything in one home, really small area.
MAN: Metropolitan Area Network--less than 30 miles range.
WAN: Wide Area Network--biggest network, any network over 30 miles.

node: Each computer and shared peripheral on a local-area network.
routers: Programs or devices that decide how to route Internet transmissions.

fiber-optic cable: High-capacity cable that uses light waves to carry information at blinding speeds.

client: any part of the network that receives data.
host: any part of the network that sends data.

server: Offers many users access to the same information.
access: Physical proximity to a person, or knowledge about that person, a common theme in privacy discussions.
access permissions:

spam: Internet junk mail.
phishing: The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information.

login: A one-word name that you type to identify yourself when connecting—logging in—to a secure computer system, network, or email account. Sometimes called login name or alias.
password: The most common security tools used to restrict access to computer systems.

firewall:
VPN:

sysadmin:
work station: A high-end desktop computer with massive computing power, though less expensive than a minicomputer. Workstations are the most powerful of the desktop computers.

UPS:

EDI:

blogs: Short for Web log, a personal Web page that often carries diary-like entries or political commentaries. Blogs are fast proliferating as new software allows users to create Web pages without having to learn the technical details of HTML and Web authoring.
wiki: A Web site that lets anyone with access to a Web browser to modify its pages. The best-known example is Wikipedia.

asynchronous communication: Delayed communication, such as that used for newsgroups and mailing lists, where the sender and the recipients don’t have to be logged in at the same time.
real-time communication: Internet communication that enables you to communicate with other users who are logged on at the same time.
chat room: Public real-time teleconference.
IM: Instant Messaging

bps: (bits per second) The standard unit of measure for modem speed.

GPS: A device that can use Global Positioning System signals to determine its location and communicate that information to a person or a computer.

Internet telephony: A combination of software and hardware technology that enables the Internet to, in effect, serve as a telephone network. Internet telephony systems can use standard telephones, computers, or both to send and receive voice messages.
VoIP: (voice over IP) A protocol that allows the Internet to be used to make voice telephone calls.
video teleconference: Face-to-face communication over long distances using video and computer technology.
voice mail: A telephone-based messaging system with many of the features of an email system.

NOS: (Network Operating System) Server operating system software for a local-area network.