Recent Changes

Wednesday, June 3

  1. page References edited Security, Netiquette, Privacy, and Ethics PowerPoint: https://cislinux.hfcc.edu/~djmaier/cis221-223…
    Security, Netiquette, Privacy, and Ethics PowerPoint: https://cislinux.hfcc.edu/~djmaier/cis221-223/SecurityNetPrivacyEthics.pdf
    Dictionary.com: http://dictionary.reference.com/browse/netiquette
    Webster University: http://www.webster.edu/technology/service-desk/illegal-downloading.html
    (view changes)
    5:46 pm
  2. page Computer or Network Security Threats edited ... Password length should be at least 8-15 characters in space; the longer the better. Use diffe…
    ...
    Password length should be at least 8-15 characters in space; the longer the better.
    Use different passwords for different sites.
    ...
    and Facebook page.
    page
    Sources: Security, Netiquette, Privacy, and Ethics PowerPoint

    (view changes)
    5:44 pm
  3. page Unethical Computer Activities edited ... Downloading music online without paying for it. This infringes on the copyrights of the artis…
    ...
    Downloading music online without paying for it.
    This infringes on the copyrights of the artists.
    Sources: Webster University
    Security, Netiquette, Privacy, and Ethics PowerPoint

    (view changes)
    5:42 pm
  4. page References edited Security, Netiquette, Privacy, and Ethics PowerPoint: https://cislinux.hfcc.edu/~djmaier/cis221-223…
    Security, Netiquette, Privacy, and Ethics PowerPoint: https://cislinux.hfcc.edu/~djmaier/cis221-223/SecurityNetPrivacyEthics.pdf
    Dictionary.com: http://dictionary.reference.com/browse/netiquette
    (view changes)
    5:40 pm
  5. page Netiquette Defined edited Good and Bad Netiquette ... ("Network Etiquette"): guidelines, or set of rules, for…

    Good and Bad Netiquette
    ...
    ("Network Etiquette"): guidelines, or set of rules, for good/acceptable online behavior; the do's and don'tsrules of online communication.etiquette that apply when communicating over computer networks,especially the Internet.
    Good Netiquette Examples:
    Use descriptive subject lines in emails.
    ...
    Posting photos of others online without permission.
    Once photos are online they are permanent.
    Sources: Dictionary.com
    Security, Netiquette, Privacy, and Ethics PowerPoint

    (view changes)
    5:39 pm
  6. page home edited ... Unethical Computer Activities Computer or Network Security Threats References
    ...
    Unethical Computer Activities
    Computer or Network Security Threats
    References
    (view changes)
    5:34 pm
  7. page References edited Security, Netiquette, Privacy, and Ethics PowerPoint: https://cislinux.hfcc.edu/~djmaier/cis221-22…
    Security, Netiquette, Privacy, and Ethics PowerPoint: https://cislinux.hfcc.edu/~djmaier/cis221-223/SecurityNetPrivacyEthics.pdf
    (view changes)
    5:31 pm
  8. page home edited ... Netiquette: The Good and the Bad Unethical Computer Activities Computer or Network Security…
    ...
    Netiquette: The Good and the Bad
    Unethical Computer Activities
    Computer or Network Security Threats
    (view changes)
    5:21 pm
  9. page Computer or Network Security Threats edited Possible Threats Hoaxes Involves emails sent out with false information for the purpose of mak…

    Possible Threats
    Hoaxes
    Involves emails sent out with false information for the purpose of making the recipient believe it is true.
    Can contain scam/phishing attachment.
    Prevention:
    Follow safe web browsing and email habits.
    Do not respond to hoaxes.
    Do not open attachments from someone you don't know.
    Copy and paste URL into web browser to make sure links are not redirecting you to a phishing site.
    Phishing
    E-mails are sent from a malicious source masquerading as a trustworthy entity in order to get you to divulge your personal information.
    This is an example of a privacy threat.
    Prevention:
    Install a phishing toolbar to detect phishing websites
    Ex. SmartScreen Filter from Microsoft Internet Explorer
    Use safe web browsing and email habits.
    Keylogger
    Tracks and records the user keyboard usage, often in order to gain access to passwords.
    Prevention:
    Choose good, strong passwords.
    Use mixed-case characters (A-Z, a-z) and numbers (0-9) in your password.
    Password length should be at least 8-15 characters in space; the longer the better.
    Use different passwords for different sites.
    Ex. choose different passwords for your bank account and Facebook page.

    (view changes)
    5:18 pm

More