Intro. to Internet Unit: Security

In this unit you are going to learn about computer viruses and how to protect your computer from viruses. You will also study spyware, adware, personal safety/security issues (data, computer, and personal safety), scams, and identity theft.

Protecting Systems (page 180) 1. What can be done or used to protect a network?

Computer Viruses Use your book to answer to the following questions. 1. Define hacker and cracker.

2. What is a computer virus?

3. List four things a virus can do. (See also http://www.teach-nology.com/tutorials/virus/harmful/)

4. What is a “trigger event”?

5. Describe file viruses, boot sector viruses, and macro viruses.

6. What is a trojan horse?

7. What is a worm?

8. What does a KLEZ worm do?

9. List four common sources of viruses.

10. Describe how viruses are spread.

(NOTE: Be wary of file attachments with .sys .com .drv .bin .exe .vbs .ovl and .scr) 11. List the symptoms of a virus.

12. What does a multipartite do?

13. What do stealth viruses do?

14. What do retro viruses do?

15. What are your options in terms of using your antivirus software to scan files? 16. How can you check on virus hoaxes? Go to the school’s home page and click on Technology (NOT Dragonnet), click on training guides. Scroll down to Spam, Viruses, and Hoaxes. Click on Computer Viruses. 1. Briefly describe spoofing. 2. Many hoax emails come out. What do you need to be careful with? Use the following site to answer the questions that follow. http://archives.cnn.com/2000/TECH/ 1. What do they say is the probability that you will get a virus?

2. What does a worm do? 3. What can a trojan horse do?

4. What percent do email viruses account for?

5. What suggestions are given to protect yourself from viruses?

6. Describe how antivirus software works.

Your Own Search—use search engines, any sites you are already familiar with, or any sites you have used in this exercise to find the following. 1. Find five antivirus software programs and list the cost for each one. Use this site to answer the next two questions. http://www.howstuffworks.com/firewall.htm 1. What is a firewall? protect system; server scan incoming items 2. How does a firewall protect you? blocks virus from coming in; warns of possible virus items 3. What are cookies? How do you get rid of them?

Internet Safety Text pages 230-231 1. What does a secure connection do to the data you enter for a business transaction? 2. How do you know you are visiting a secure site?

COPPA Act 1. What does the acronym stand for? 2. Briefly describe what the law says. www.safeteens.com/safeteens.htm (General risks) 1. List three risks of online activity for teens. 2. If you receive a harassing message, where should you report it? 3. When you respond to messages that are harassing, what are you giving the person? 4. What could happen if you give out your name, mailing address, phone number and/or email address? 5. What information should you use if you post your own webpage? 6. What area of the Internet is considered to be the most dangerous?

Hoaxes/Urban Legends What is the purpose of a hoax or an urban legend? Describe in detail one urban legend.

What do you think you should do if you were to receive an e-mail containing a hoax or an urban legend?

Blog Safety

In case you don’t know--"Blog" is short for "Web log," an online journal or diary with - depending on the blogging service - varying degrees of privacy. Having one is a lot like having your own Web site, only much easier to create and maintain (no techie know-how required), and in most cases it's free.

Go to http://www.blogsafety.com/teentips.htm to answer the following questions.

How long can a photo stay on the web?

What should you do if someone posts a mean or embarrassing comment on your blog?

While you may personally know many of the people who post to your blog, is it a good idea to arrange a meeting with someone you do not know?

Is it possible to control who can visit your blog?

List five personal types (not specifics!) of information that you should not put in your blog. 1) 2) 3) 4) 5) Go to http://www.blogsafety.com/realworldrisks.htm to answer the following questions.

Besides your friends, name two other people who might view your blog. 1) 2) What is the name of the website that keeps archives of Web pages, including blog entries, as far back as 1995.

Could you ever be sued because of a blog posting?

If you provide a link to copyrighted material on another website, can you be charged with breaking copyright laws?

If you include copyrighted material in your blog, can you be charged with breaking copyright laws?

While you are not legally responsible for postings made by other people, is it possible that you could be subpoenaed to court because of them?