Chp 11 Section 4-5 Notes
Transcript Chp 11 Section 4-5 Notes
Chapter 11 – Section 4-5
Techniques use to Access the network
War Driving or access point mapping
▪ Individuals attempt to detect wireless network via their
notebook computer or mobile device while driving a
vehicle through areas they suspect have a wireless
▪ Use airplanes instead of vehicle to detect unsecured
How can I ensure my wireless communication is
Secure your wireless access point (WAP)
WiFi Protected Access (WPA)
Authenticate network users and provide advanced
Conforms to the government security standards and
uses more sophisticated encryption techniques the
What are some health concerns of computer
Computer addiction-when computer
consume entire social
Repetitive strain injury (RSI)
Injury or disorder of the muscles, nerves,
tendons, ligaments, and joints
Computer vision syndrome (CVS)
eye and vision problems
Tendonitis – inflammation
of a tendon due to
Carpal tunnel syndrome –
inflammation of the nerve that
connects the forearm to the palm
What precautions can prevent tendonitis or
carpal tunnel syndrome?
Spread fingers apart for several seconds while
keeping wrist straight
Gently push back fingers and then thumb
Dangle arms loosely at sides and shake arms and
What is Ergonomics?
An applied science devoted to incorporating
comfort, efficiency, and safety into the
design of items in the workplace.
What are computer ethics?
Moral guidelines that govern use of computers and information systems
Codes of conduct
What is information accuracy?
Accuracy of computer input
National Press Photographer Association oppose
What are intellectual Property (IP) and
Intellectual property rights?
▪ Refer to unique & original work such as ideas,
inventions, art, writing, processes, company and
product name and logos.
Intellectual Property Rights
▪ The rights to which creators are entitled for their work
IT Code of Conduct
What is an IT code of
Written guideline that
helps determine whether
computer action is ethical
Employers can distribute
Computer may not be used to harm other
2. Employee may not interfere with other’s
3. Employees my not meddle in other’s
4. Computers may not be used to steal
5. .Computers may not be used to bear false
6. Employees may not copy or use software
7. Employees may not use others’ computer
resources without authorization
8. Employees may not use others’
intellectual property as their own.
9. Employees shall consider the social
impact of program and systems they
10. Employees always should use computers
in a way that demonstrates and respect for
What is Green Computing?
Involves reducing the electricity and
environmental waste while using a computer.
ENERGY STAR program
▪ Develop by US Department of Energy and US
Environmental Protection Agency (EPA)
▪ Help reduce the amount of electricity used by computer
and related devices
What is Information Privacy?
Right of individual and companies to deny or
restrict the collection and use of information
Difficult to maintain today because data is stored
What is an electronic profile?
Data collected when you fill out forms on the Web
Merchant sell your electronic profile
Often you can specify whether you want personal
What is a Cookie?
Small text file on
your computer that
contains data about
Some Web sites
sell or trade
stored on your
Set browser to
prompt you to
accept cookies or
What is Spam?
Unsolicited e-mail message or newsgroup,
posting sent to many recipients or
newsgroups at once.
Internet Junk mail
How can you control spam?
you can view
What is Phishing and Pharming?
Scam in which a perpetrator
sends an official looking
email message that
attempts to obtain your
personal and financial
Similar as phishing but they
attempts to obtain your
personal and financial
What are Spyware and Adware?
Spyware is a program placed on a
computer without the user’s knowledge
that secretly collects information about
Adware is a program that displays an
Some Privacy laws that have been enacted
1970 Fair Credit Reporting Act
Limits the right of other viewing a credit report to only
those with a legitimate business need.
1984 Computer Fraud and Abuse Act
Outlaws unauthorized access of federal government
1998 Children’s Online Privacy Protection Act (COPPA)
Requires Web sites protect personal information of
children under 13 years of age
What is Social Engineering?
Gaining unauthorized access or obtaining
confidential information by taking advantage
of the trusting human nature of some victims
and naivety of other
What is Employee Monitoring?
Involves the use of computers to observe,
record, and review an employee’s use of a
What is content filtering?
Process of restricting access to certain
Internet Content Rating Association (ICRA) provides
rating system of Web content
Web filtering software restricts access to specific