2. • About Me
• Contact Info
• Open Syllabus and Schedule from eCampus
• Netiquette
• Important Dates
• How to Succeed in IT 100 Without Really Trying
• Navigating eCampus
• Navigating MyITLab
• Homework
3. • Monmouth University Adjunct Professor
• High School Business and Computer Teacher
• Current EdD Student [Curriculum and Instruction
with focuses in Instructional Technology and
Distance Learning]
• Entrepreneur [run 4 businesses and a non-profit]
• Ambassador [Edmodo and SimpleK12]
• Financial Blogger [The Street, Seeking Alpha, and
Nasdaq]
4. • E-mail: mamarino@Monmouth.edu
• E-mail is the best way to get in touch with me.
• I try to respond within 24 hours.
• In case of EMERGENCY call me at 848-333-8637
• OFFICE HOURS:
Where? Howard Hall Room 223
When? To Be Determined
5. • Class Meeting Time
• Required Course Materials
• Learning Objectives
• Grading Scale
• Attendance
• Academic Honesty
• MyITLab
• Helpful Info
6. • Please come to class on time
• Be Prepared [Course Schedule Defines
Everything]
• Be Ready to Start as soon as our course time
starts
8. • Course Attendance Policy:
– Final grade will be reduced by 3 points for 3 absences
– Final grade will be reduced by 1 point for each additional
absence
– This means if you’re absent once or twice there is no penalty
– If you need to be absent obtain documentation to have absence
excused
• My Attendance Policy:
– If I am absent for any reason everyone will receive 1 point
towards their final grade for each of my absences
– In the event someone fills in for me students will need to be
present to receive that credit
9. • Statement on Academic Honesty on Syllabus
• Consequences of Academic Dishonesty
– You will receive an F for the course
– Further disciplinary action may occur; including
dismissal from the university
– Lowers GPA
– Financial cost to retake course
– Potential loss of scholarships
– Potential loss in eligibility for extracurricular activities
– Need to repeat course for credit
10. • Help Desk
• IT Lab Assistants
• IT Tutors and Tutoring Lab
• Other Campus Computer Access
11. • Defines Topics to be covered in class
• Defines all HW Assignments and Due Dates
• Defines PPT Presentation Dates [subject to
change]
12. • Netiquette is the term used to describe the rules of etiquette
that apply to electronic communications. It is important to
use good netiquette when communicating with me and with
your classmates, so I ask that you abide by the rules of
netiquette in all aspects of this course. These rules are
basically common sense things, but I feel they are important
enough to reiterate here.
13. • The rules of netiquette you will be expected to follow in this course
are as follows:
• Be clear.
– Use Standard English and do not abbreviate.
– Spell check, revise and edit your messages before sending them.
– Use appropriate subject lines that reflect the content of the message.
• Be polite and careful.
– Do not use ALL UPPERCASE LETTERS!!! or multiple exclamation marks,
as it is sometimes difficult to understand the tone of the message.
– Typing in all capital letters is synonymous to yelling at someone.
– Avoid sarcasm and irony, which can be misinterpreted by the reader.
– Refrain from using inappropriate or offensive language.
– Remember you are not talking to a machine; there is a person on the
other end of your message.
14. • Demonstrate respect for the opinions of others
when responding to your classmates.
• Remember that you are communicating within a
classroom and behave accordingly.
• Be forgiving of other people's mistakes.
• Always remain calm, even if you believe someone
has insulted you.
• Disagree respectfully and with facts, not gossip.
• Apply the golden rule -- treat others the way you
would like to be treated.
15. • Late Registration/Add-Drop Period: 1/17 to 1/24
• Spring Break: 3/11 to 3/17
• Withdrawal Deadline: 3/20
• Any additional important dates will be
announced at the start of class
16. • Be on time to class/Be in class: Being in class will
help you do well on assignments and exams
• “Alright Young Scholars” means class is starting
• Submit all assignments on time
• Study all review materials prior to exams
• Work smart
17. • Each unit will have its own folder: Word,
Computer Concepts, Access and PowerPoint,
Computer Security, and Excel
• Agendas for class; such as this one, will all be
put into one folder
18. • MyITLab will feature most of your assignments
for this course [there are other small assignments
on eCampus]
• MyITLab will house all five unit exams and the
final exam
• MyITLab features a digital copy of the course
textbook and Technology in Action for easy usage
19. • Purchase required course materials if you
haven’t already done so
• Complete About Me Discussion Thread
[Instructions in eCampus]
• Complete Plagiarism Tutorial
20. • Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
25. • Type Letter Text
• Apply Styles and Set
Grammar and Spelling
Options
• Select and Insert Text
• Copy, Cut, and Paste
Text
• Check Spelling and
Grammar
• Insert Synonyms
• Use Format Painter
• Apply Advanced Font
Settings
• Create Document
Footers
• Save Documents as
PDF Files
26. • Open “Land” on MyITLab
• Download files
• Complete steps
• Submit file
• Modify as necessary to receive a 100
27. • Insert Text and
Pictures From Files
• Resize and Align
Pictures
• Apply Pictures Styles
and Artistic Effects
• Set Tab Stops
• Type Tabbed Lists
• Apply Table Styles
• Create Tables
• Delete and Add Table
Rows and Columns
• Format Text in Table
Cells
• Format Tables
28. • Open “Festival” on MyITLab
• Download files
• Complete steps
• Submit file
• Modify as necessary to receive a 100
29. • About Me Discussion Thread and Plagiarism
Tutorial [eCampus] due at 9PM
• Windows 10 Simulation [MyITLab] due at 9PM
• Word Ch 3 Classwork [eCampus] due Sunday
30. • Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
34. • Folder on eCampus
• Download file
• Edit file based on Steps 1-27
– Step 11 – if done right all paragraphs will be
indented
– Step 13 – glossed over in video
• Download attached Word file to dropbox and
watch screencast
35. • Review on MyITLab is
the same 18 questions
from the Ch 1 and Ch
3 Simulations
• Completing the
Review gives you the
best chance to ace the
Exam
• Exam on February 6th
is 17 of those 18
questions
• 3.01 is on the Review,
but not on the Exam
36. • Open on MyITLab
• If you are unsure use the aids: video or
practice
• Unlimited attempts to get a 100
37. • Open on MyITLab
• If you are unsure use the aids: video or
practice
• Unlimited attempts to get a 100
38. • Check eCampus for Wednesday’s online lesson
[video and PPT] discussing conducting
research
• Complete all Word assignments due on
February 6th: Integrated Project 1, Ch 1
Simulation, Ch 3 Simulation, Ch 1 Grader
Project, and Ch 3 Grader Project
39. • Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
41. • Research Paper Example
• Discuss Research Paper Rough Draft
• Introduce Computer Purchase Assignment
• Computer Concepts Discussion
42. • Show Research Paper Example to demonstrate
concepts
• Point to location on eCampus
43. Storage
Output
Process
Input
– Input: Gathers data, allows
entering data
– Process: Manipulates,
calculates, or organizes data
– Output: Displays data and
information
– Storage: Saves data and
information
44. • Bit: Binary digit 0 or 1
• Byte: Unique combinations of 8 bits of
0s and 1s
• Kilobytes, megabytes, gigabytes,
terabytes, and petabytes
• Computers use binary language
consisting of 0s and 1s.
• Which of the following is the smallest
unit of measure? Megabyte
45. • Mainframe: Many users
simultaneously
• Supercomputer: Complex
calculations
• Embedded: Self-contained
– Examples: electronic
thermostat, drone
• Embedded computers are
specially designed computer
chips that reside inside other
devices such as a car.
• Which of the following
computers is large, expensive
and supports many
simultaneous users and
manages large amounts of
data? Mainframe computer
• An Apple iPad and a Microsoft
Surface are examples of Tablet
computers.
46. • Enter data and instructions
• Examples
– Keyboard
– Mouse
– Microphone
– Scanner
– Digital camera
– Stylus
• A(n) Stylus is an input device
that looks like a pen.
• A keyboard and mouse are
examples of input devices.
47. • Send data out of the computer
in the form of:
– Text
– Pictures
– Sounds
– Video
• Examples
– Monitors
– Printers
– Speakers and earphones
• Monitors: Liquid crystal display
(LCD), Light-emitting diode (LED),
Organic light-emitting diode
(OLED)
• The most common type of
monitor is a(n) liquid crystal
display (LCD).
• The number of pixels displayed on
the screen is known as screen
resolution.
48. • Inkjet: Affordable, High-
quality color, Quick and
quiet
• Laser: Faster printing
speed, Higher-quality
printouts, More
expensive
• All-in-one printer: Printer,
scanner, copier, and fax
• Plotter: Prints oversize
images
• Thermal printer
• Thermal printers either melt a
wax based ink on regular paper
or by burning dots on specially
coated paper.
• Laser printers are usually faster
at printing in black and white
than inkjet printers. True
49. • Speaker
– Output device for sound
– Surround-sound speakers
– Wireless speaker system
• Headphones or earbuds
– Keep from distracting others
• Most computers include inexpensive speakers. These
speakers are sufficient to play audio clips from the
Web and enable you to participate in
videoconferencing or phone calls made over the
Internet.
• A surround-sound speaker is a system of speakers
and audio processing that envelops the listener in a
360-degree field of sound.
• Wireless speaker systems are available to help you
avoid cluttering up your rooms with speaker wires.
• Headphones or earbuds plug into the same jack to
which speakers connect. Hearing might be damaged
by excessive volume when using earbuds.
50. • Motherboard: CPU,
ROM, RAM, and cache,
Slots for expansion
cards, Sound/Video
cards, Network
interface card (NIC)
• The motherboard is located inside the system
unit and contains the central electronic
components of the computer, including the
computer's processor (CPU), and many circuit
boards that help the computer to function.
•A network interface card (NIC)
enables your computer to connect
to other computers or to the
Internet.
•The motherboard contains the
central electronic components of
the computer.
51. Stores instructions and data
Series of several memory cards
or modules
Temporary (volatile) storage
• RAM is the abbreviation for the
place in the computer where
the programs and data the
computer is currently using are
temporarily stored.
• RAM is a volatile storage
location.
52. Stores startup instructions
Permanent (nonvolatile)
storage
• The area that holds all the
startup instructions the
computer needs to start is the
ROM.
• Apple's OS X and Microsoft
Windows are examples of
operating system software.
53. CPU or processor
“Brains” of the computer
Controls all functions of the
computer’s components
Processes all commands and
instructions
Billions of tasks per second
• CPU Performance
Measures: Processor
speed measured in
hertz (Hz), Megahertz
(MHz) or gigahertz
(GHz)
– Number of cores: Single, Dual,
Quad, Ten
• Today's CPUs run at speeds
measured in kilohertz. False
• A(n) dual-core CPU has two
processing paths, allowing it to
process more than one
instruction at a time.
54. • Primary device for permanent
storage
• Nonvolatile storage devices
• Internal drive is for permanent
storage
• External hard drive
• Solid-state Drive (SSD)
• All of the following are
names for a flash drive
EXCEPT hard drive.
55. • External hard drives
• Flash Storage
• Compact discs (CDs)
• Digital video discs (DVDs)
– Store more data than CDs
• Blu-ray discs (BDs)
• Which of the following
optical storage media has
the greatest storage
capacity? BD
• Flash drives plug into a(n)
USB port.
56. • Universal serial bus (USB)
• New USB 3.1 standard port: Transfer speeds of 10 Gbps
• FireWire 800: Transfer speeds up to 800 Mbps
• Thunderbolt: Transfer speeds up to 20 Gbps
• Connectivity port
– Access to networks and the Internet
• Ethernet port
• Audio ports
– Connect headphones, microphones, speakers
• Video ports
– Connect monitors and multimedia devices
– HDMI
• Which port is the most common
port used to connect input and
output devices? Universal serial
bus (USB)
• A(n) port is where a peripheral
device can attach to a computer
so that data can be exchanged
between it and the operating
system.
57. Position your monitor correctly.
Purchase an adjustable chair.
Assume a proper position while
typing.
Take breaks from computer
tasks.
Ensure that the lighting is
adequate.
• Ergonomics is concerned
with the design and
arrangement of machines
and furniture to avoid
uncomfortable or unsafe
experiences.
58. • How do you use your computer? Assess needs
• What software do you run? Total your needed space
• Choose 3 computers that meet your requirements
• Find specs of each computer
• Which of the 3 computers did you choose and why?
59. • 25 Questions
• On MyITLab
• The Blue Text in this PPT are the questions and
answers. The answers are in boldface.
• Study those statements.
63. • Research Paper Rough Draft
• Reminder on Computer Purchase Assignment
• Computer Concepts Review
• The Great Debate
64. • Dropbox by end of class on February 15th
• Hard copy printed and handed in by end of
class on February 15th
• Rough Drafts scored either 0, 25, or 50 based
on completion of rubric tasks
• These points are extra credit towards the final
submission
65. • How do you use your computer? Assess needs
• What software do you run? Total your needed space
• Choose 3 computers that meet your requirements
• Find specs of each computer
• Which of the 3 computers did you choose and why?
– Due Wednesday
66. • Input, Process, Output Storage
• Bits & Bytes [the pizza] – Binary
• Types of computers – mainframe, supercomputer,
embedded, tablets
• Input & Output devices
• Processing, Memory, & Storage
• RAM vs. ROM
• Parts of the computer [internal & external]
• Ergonomics
67. • Each row will be assigned a part of the
computer
• Each row will work together to create a “sales
pitch” to convince me their part of the
computer is most important
• You can use my notes and any internet
research for your argument
• Elect a speaker to give the “sales pitch”
69. • Spend twenty minutes putting together your
argument
• Your argument should be explaining why your
part of the computer is better than the other
three
• Speakers will be called up one at a time
• 10 extra credit points on the Computer
Concepts exam to the team with the most
convincing argument
70. • 25 Questions
• On MyITLab
• The Blue Text in this PPT are the questions and
answers. The answers are in boldface.
• Study those statements.
– On Wednesday
74. • Hand in Research Paper Rough Draft
• Computer Concepts Exam
• PPT 1 Simulation and Grader Project
• PPT 4 Simulation
75. • Open, View, and Save Presentations
• Edit and Replace Text
• Format Slide Text
• Check Spelling and Use the Thesaurus
• Insert Slides and Modify Slide Layouts
• Insert and Format Pictures
• Organize Slides in Slide Sorter View
• Apply Slide Transitions and View Slide Shows
• Insert Headers and Footers and Print Handouts
• Add Notes Pages and Use Presenter View
76. • Insert Tables
• Modify Table Layouts
• Apply Table Styles
• Apply Animation Effects and Change Duration
• Modify Animation Timing and Use Animation
Painter
• Delay or Remove Animation
• Navigate Slide Shows
80. • Discuss Effective PPT Presentations
• Give out PPT Rubric and Presentation Rubric
• Access 1 Grader Project
• Access 1 Simulation
81. • One theme per slide
• Rehearse
• Know your purpose and audience
• Exhibit your Passion
• Build on your content
• Know Your Topic to a Strong Degree
82. • Keep eye contact
• Use facts
• Use readable font
• Don’t read from your slides
• Think about questions you may be asked
ahead of time
83. • Use research paper to create PPT
• Follow rubric in creating PPT
• 10 minute presentation of PPT later in the
semester
• Be prepared based on presentation rubric
84. • Create Databases
• Create Tables in Datasheet View
• Enter Data into Datasheets
• Create Tables in Design View
• Relate Tables
• Enter Data in Related Tables
• Import Data into Tables
• Filter and Sort Datasheets
• Format Datasheets
• Preview and Print Datasheets
89. • Create Queries with the Simple Query Wizard
• Add Text Criteria
• Add Calculated Fields to Tables
• Create Queries in Design View
• Add Comparison Operators
• Add Date and Time Criteria
• Group and Total Queries
• Add Calculated Fields to Queries
• Work with Logical Operators
• Add Wildcards to Query Criteria
90. • Ch 3 Skill 1 Use the Form Wizard
• Ch 4 Skill 1 Build Queries for Reports
95. • Create and Save Workbooks
• Enter Data and Merge and Center Titles
• Construct Addition and Subtraction Formulas
• Construct Multiplication and Division Formulas
• Adjust Column Widths and Apply Cell Styles
• Insert the SUM function
• AutoFill Formulas and Data
• Format, Edit, and Check Spelling
• Insert Footers and Adjust Page Settings
• Display Formulas and Print Worksheets
96. • Submit Research Paper to Dropbox by 9PM
• No lates will be accepted
97. • Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday, March 20th; enjoy Spring
Break
100. • Organize Worksheet Tabs
• Enter and Format Dates
• Clear Cell Contents and Formats
• Move Cell Contents and Use Paste Options
• Enter Data in Grouped Worksheets
• Insert Multiple Math Operators in Formulas
• Format Grouped Worksheets
• Insert, Hide, Delete, and Move Worksheets
• Create Summary Worksheets
• Create Clustered Bar Charts
108. • Insert the TODAY, NOW, and COUNT Functions
• Insert the IF Function
• Move Functions, Add Borders, and Rotate Text
• Apply Conditional Formatting
• Insert Sparklines
• Use Find and Replace
• Freeze and Unfreeze Panes
• Create and Sort Excel Tables
• Filter Excel Tables
• Convert Tables to Ranges and Adjust Worksheet Print
Settings
109. • PowerPoint assignment due at 9PM
• Complete all Excel MyITLab assignments
• Study for Excel Exam
110. • Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
113. • Areas of concern:
– IP, Privacy, E-Commerce, Abuse
– Ethics differ from Law
• Not clearly defined; like laws
• Ethics may differ by culture, family, religion, and social
experience
• Ethics are complex; different people = different views
114. • Embedded Computers [from Computer
Concepts unit]
• Artificial Intelligence
• Running joke to some
• Real issue to others
116. • Blocking Certain Websites Vary
– Government
– Work
– School
– Search Engine
– Global interactions; US different than others
117. • Driving Social Change
• Always Promoting an Agenda
• May or May Not Be Real
• Disobedience or Terrorism?
118. • Protecting your efforts on the web
• Not limited to computers
• Effects mobile devices
• Ongoing upgrades
119. • Protecting yourself on your personal computer
and mobile devices is a primary concern
• Your data [whether personal like bank account
or professional like work documents] can be
useful resources to hackers
• Use strategies to prevent issues and continue
to be educated about cybersecurity
120. • Topic 1 – Secure Passwords
– Check the strength of passwords
– Helps you determine if your passwords are strong or not
• Topic 2 – Secure User Accounts
– Prevents unwarranted access to your data/files
– Logins can deter access from family/friends
121. Which of the following is formally
defined as any criminal action
perpetrated primarily through the use
of a computer? Cybercrime
White-hat hackers break into systems
for non-malicious reasons such as to
test system security vulnerabilities.
A packet analyzer is a program that
can enable a hacker to do all of the
following EXCEPT launch a denial of
service (DoS) attack on your
computer.
All of the following were top
cybercrimes reported to the IC3
EXCEPT theft of services.
• Cybercrime, Cybercriminals, Common
types of cybercrimes
• Most financially damaging cybercrime for
individuals is identity theft
• Messaging, Malware and Mobile Anti-
Abuse Working Group (M3AAWG) Found
half of e-mail users have opened spam
• Types of hackers: White-hat (ethical
hackers), Black-hat hackers, Grey-hat
hackers
• Packet analyzer (sniffer)
• Keylogger
122. • Trojan horses—Appear to be useful
• Rootkits
• Zombies
• Denial-of-Service
– Legitimate users are denied access
to a computer system
– System shuts down
• DDoS
• A rootkit allows a hacker to gain access
to your computer and take almost
complete control of it without your
knowledge.
• A DDoS attack floods a computer with
requests until it shuts down and refuses
to answer any requests for information.
• A zombie is another person's computer
controlled by a hacker. True
123. • This is Microsoft DOS [not Denial of Service attack]
124. • Not limited to computers
• Widespread cybercrime: Spreading viruses
• Main purpose and Secondary objectives
• Sources of virus infection
• Classified by methods used to avoid
detection: Polymorphic viruses, Multipartite
viruses, Stealth viruses
• Creating and distributing computer
viruses is one of the most
widespread types of cybercrimes.
• All of the following activities may
infect your computer with a virus
EXCEPT printing a document.
• Which of the following classifications
of viruses can change its own code to
avoid detection? Polymorphic
• With regard to computer protection,
quarantining is defined as placing a
found virus in a secure area on the
hard drive.
• A(n) virus signature is the portion of
virus code that is unique to a
particular computer virus.
125. • Boot-sector viruses are often
transmitted by a flash drive
left in a USB port.
• A time bomb is a virus that is
triggered on a certain date.
• A macro virus is a virus that is
attached to documents such
as Word or Excel files.
• Currently, there are no
antivirus programs for mobile
devices. False
• A worm does NOT require
human interaction to spread
to other computers. True
126. • Malware has malicious intent
– Adware displays sponsored advertisements
– Spyware is an unwanted piggy-back program
• Transmits information
• Tracking cookies
• Keystroke logger
• Many antispyware packages are available
• Spam—junk e-mail
• Tactics to minimize spam
• Spyware is a program
that gathers
information about your
surfing habits without
your knowledge.
127. • Type of malware
• Attempts to convince
you something is wrong
… and to pay money to
fix it
• Firewall—hardware or
software
• Windows and OS X
include firewalls
• Security suites include
firewall software
• You can block logical ports from
invaders and make your
computer invisible to others on
the Internet by installing a
firewall.
• Configuring a firewall to
ignore all incoming
packets that request
access to a specific port
is known as logical port
blocking.
128. • Antivirus software
– Detects viruses and
protects your computer. Like Symantec,
Kaspersky, AVG, McAfee
• Need strong passwords. Password strength tests
• Operating systems have built-in password
protection
• Biometrics: Fingerprint, Iris pattern in eye, Voice
authentication, Face pattern recognition
• Provide a high level of security
• Rules for creating passwords
include all of the following
EXCEPT use a dictionary to find
a lengthy word that is easy to
remember.
129. • Protect your personal
Information. Backups
are copies of data
• Backup your data from:
Unauthorized access,
Tampering, Destruction
• Power surges
• Surge protector
– Replace every 2–3 years
– Use with all devices that
have solid-state
• Social engineering is any
technique that uses social skills
to generate human interaction
that entices individuals to reveal
sensitive information.
130. • Four main security concerns with mobile devices:
– Keeping them from being stolen
– Keeping data secure in case they are stolen
– Finding a device if it is stolen
– Remotely recovering and wiping data off a stolen device
131. • Topic 1 – Information Privacy
– Google yourself; you should be comfortable with the
information that is visible
• Topic 2 – Web Browsers
– Install software to check to see what is going on behind
the scenes when you visit websites
• Topic 3 – Encryption
– Serves as a protection tool when using the web, email, and
more
132. • Cookies are small text
files received when you
visit a website
• Help companies
determine the
effectiveness of their
marketing
• Do not search drive for
personal information
• May invade your privacy
• Pose no security threat
• Which of the following
statements about cookies is
NOT true? Cookies obtain your
personal information by
searching your hard drive.
• CAPTCHA is the wavy
hard-to-read letter and
number sequence that
you type to prove that
you are human to a
website.
133. • Phishing
– Luring people into revealing
information
• Pharming
– Malicious code planted on your
computer to gather information
• Guidelines to avoid
schemes
• When malicious code is planted
on your computer and alters
your browser's ability to find
web addresses, it is known as
pharming.
134. • Read pg. 557 in Tech in Action to answer
questions 1 & 2 within Topic 3 on Security
Assignment 2
• Wi-Fi Encryption
• Data Encryption
• Web Encryption
135. • A methodology using algorithms to modify data, text,
code, etc. to prevent the opportunity of hacking and
misuse of information
• Courses such as Cryptography devote a substantial
amount of time towards this process
• Encryption can exist as: Wi-Fi Encryption, Data Encryption,
and Web Encryption
• Encryption can be one of the most secure ways to protect
your computer and mobile device
136. • Wi-Fi Encryption is the encryption method you take to protect
outside access to your network [whether at home or not]
• Three common types are WEP, WPA, WPA2
• Wired Equivalent Privacy can be 64, 128, or 256 bit encryptions;
commonly used, but easily hacked
• Wi-Fi Protected Access is 256 bit encryption; created due to the
vulnerabilities of WEP
• Wi-Fi Protected Access II is an updated version of WPA and the
most secure encryption tool for Wi-Fi
137. • Focuses heavily on making text or
information sent via email or other online
transmit difficult to decipher [or read]
• Substitution ciphers are the most common
tool for this task
138. • Look for the “lock” – it means the most
secure websites
• Digital Certificates
– Like cookies; gives access based on
prior approval/visit [can expire]
• SSL Encryption
– Most common web encryption tool
139. • Twitter says:
– Secure Connection
– The connection to this site is encrypted and authenticated using a strong
protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong
cipher (AES_128_GCM).
• Instagram says:
– Secure Connection
– The connection to this site is encrypted and authenticated using a strong
protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong
cipher (CHACHA20_POLY1305).
• Your results may vary. A similar protocol, key exchange, and cipher are
perfectly fine, but often each site will have its own cipher.
140. • Hackers go after the Elderly due to their financial stability
and Young adults due to their available credit
• Google Images is a stronger tool than Google Search in
viewing your digital footprint
• Mobile devices are at the same risk as your personal
computers
• Using Wi-Fi is risky; look for Wi-Fi with a password to make
it a little more secure
144. • Review
• Best Advice for Security
• Zero Days
• Wi-Fi Group Assignment
• Security Assignment #1 and #2 Review
• Looking Forward
145. • Ethics vs. Law
• Two groups are Hacker targets
• Create secure passwords
• Secure your devices
• DDoS, DoS, and DOS
• Encryptions – Web, Wi-Fi, and Data
146. • Looking to steal info or identities
• Keyloggers
• Packet sniffers
• Three types of hackers
147. • Types of viruses
• Virus methods
• Virus purposes
• How to prevent viruses
153. • What are Zero Days?
– Vulnerabilities in the code that can be hacked
• What are Bug Bounties?
– Payment for identifying a zero day in the software/code
• You can either fix a Zero Day, pay someone to fix it, or
get hacked
155. • Wendy’s and Dunkin Donuts both offer Free Wi-Fi, but
one is a safer Wi-Fi option than the other
• Consider accessing the Wi-Fi in the general public, not on
campus (ie the store in your town)
• Teams will be split among the class with two captains
• Team captains will choose either Wendy’s or Dunkin
Donuts
• Each team will research their company’s Wi-Fi information
to determine: a) If it is a safe bet to use their company’s
Wi-Fi and b) If it is a safe bet to use the other team’s
company’s Wi-Fi
• There is a right answer; for one very important reason
156. • Hackers go after the Elderly due to their financial stability
and Young adults due to their available credit
• Google Images is a stronger tool than Google Search in
viewing your digital footprint
• Mobile devices are at the same risk as your personal
computers
• Using Wi-Fi is risky; look for Wi-Fi with a password to make
it a little more secure
169. • 3rd Party websites are accessing your
computer when you access them
• Same is true on a mobile device
• Phones store a lot of data you don’t want to
lose
170. • Five Ethical/Social Issues
• Security Assignment 1
• Security Assignment 2
• Study for Security Exam
171. • Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Wednesday
173. • Security Exam
• Chloe, Dena, Matilda, Mahen, Christine,
Shane, Alexia, Boyce Present
• In the event anyone does not present today
they will present on Monday
174. • Yes, the old man in front of the room is done
talking for today
• CLASS DISMISSED
• See you on Monday
186. • Once you finish the exam you are free to go
• Best of luck in the future!
Editor's Notes
Both Students Submit Same Work:
If another student submits your work, you will receive an F in the course.
This applies to any graded assignment.
Both parties will automatically receive an F. There are no exceptions.
SAM Cheating:
Download your personalized starting file. Make the changes. Upload your file for grading.
Uploading another student's file for grading, Copying and pasting from another student's file. Other actions may also be flagged.
SAM - reports the name of the student from whom the work was copied.
Protect Yourself:
Do not show your work to other students.
Do not give your work to other students.
Do not allow other students to use your account.
Do not allow other students to use your computer unless it is under a guest account.
It is a responsibility of all students to protect their files from unauthorized access and use.
TurnItIn:
Turnitin.com – reports the source of the plagiarized material.
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Input: Gathers data, allows entering data
Process: Manipulates, calculates, or organizes data
Output: Displays data and information
Storage: Saves data and information
Cybercrime is any criminal action perpetrated primarily through the use of a computer.
Cybercriminals are individuals who use computers, networks, and the Internet to perpetrate crime.
Four common categories of complaints received were FBI-related scams, identity theft, nonauction/non-delivery of merchandise, and advance fee fraud.
Although the top four complaints all relate to some type of fraud, other complaints received involved equally serious matters such as computer intrusions—hacking—child pornography, and blackmail.
Many victims of identity theft spend months, or even years, trying to repair their credit and eliminate fraudulent debts.
Identity theft occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account number, and credit card information and runs up debts in your name.
The nefarious acts cover a wide range of activities.
A survey by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) found that half of e-mail users in North America and Europe have opened spam.
A hacker is most commonly defined as anyone who unlawfully breaks into a computer system.
Hackers may be identified as:
White-hat hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses.
Black-hat hackers break into systems to destroy information or for illegal gain.
Grey-hat hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches.
A packet analyzer (sniffer) is a program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet.
A keylogger is a program that captures all keystrokes made on a computer.
A Trojan horse is a program that appears to be something useful or desirable, but does something malicious in the background without your knowledge.
Backdoor programs and rootkits are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge.
A computer that a hacker controls is referred to as a zombie. Zombies are often used to launch denial-of-service attacks on other computers.
In a denial-of-service attack, legitimate users are denied access to a system because a hacker is repeatedly making requests of that system through a computer the hacker has taken over as a zombie. A computer can handle only a certain number of requests for information at one time. When it is flooded with requests, it shuts down and refuses to answer any requests for information, even if the requests are from a legitimate user.
A distributed denial-of-service (DDoS) attack, launches DoS attacks from more than one zombie at the same time.
Viruses are not limited to computers; smartphones, tablet computers, and other devices can be infected.
Creating and disseminating viruses are two of the most widespread types of cybercrimes.
A virus’s main purpose is to replicate itself and copy its code into as many other host files as possible.
The majority of viruses have secondary objectives or side effects.
Downloading and running a file that’s attached to the e-mail are common ways to infect your computer.
Viruses can be classified by the methods they take to avoid detection:
A polymorphic virus changes its code to avoid detection. Most polymorphic viruses infect a particular type of file.
A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it.
Stealth viruses temporarily erase their code from the files where they reside and hide in the active memory of the computer.
Malware is software that has a malicious intent
Adware displays unsponsored advertisements
Spyware is an unwanted program that downloads with other software from the Internet and runs in the background.
Spyware transmits information about you.
Many spyware programs use tracking cookies.
A keystroke logger program monitors keystrokes.
Other anti-spyware programs are easy to install and update.
Spam is unwanted or junk e-mail.
There are several ways to help avoid spam:
Create a free e-mail address
Spam filters
Buy third-party programs
Reclassify e-mails that have been misidentified as spam
Scareware is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware.
You’re then directed to a website where you can buy fake removal or antivirus tools that provide little or no value.
Scareware is a social engineering technique because it uses people’s fear of computer viruses to convince them to part with their money.
A firewall is a software program or hardware device designed to protect computers from hackers.
Both Windows and OS X include reliable firewalls. The Windows Action Center is a good source of information about the security settings on your computer, including the status of your firewall.
Security suites such as Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security Suite also include firewall software.
Antivirus software is specifically designed to detect viruses and protect your computer and files from harm. Symantec, Kaspersky, AVG, and McAfee are among the companies that offer highly rated antivirus software packages.
Antivirus protection is also included in comprehensive Internet security packages such as Norton Internet Security, Kaspersky Internet Security, and McAfee Total Protection. These software packages also help protect you from threats other than computer viruses.
Strong passwords are difficult for someone to guess.
There are many password generators available for free, such as the Strong Password Generator.
You can use online password strength testers, such as the Password Meter, to evaluate your passwords.
To restrict access to your computer, Windows, OS X, and most other operating systems have built-in password (or passcode) protection for files as well as the entire desktop.
A biometric authentication device is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it to a digital code.
Because no two people have the same biometric characteristics, these devices provide a high level of security.
Other biometric devices, including voice authentication and facial recognition systems, are now widely offered in notebook computers, tablets, and smartphones.
The data on your computer faces three major threats:
Unauthorized access
Tampering
Destruction
Backups
Copies of files that you can use to replace the originals if they’re lost or damaged
Power surges occur when an electrical current is supplied in excess of normal voltage. Old or faulty wiring, downed power lines, malfunctions at electric company substations, and lightning strikes can all cause power surges.
A surge protector protects your computer.
Replace surge protectors every 2–3 years or after a major surge.
All electronic devices that have solid-state components, such as TVs, stereos, printers, and cell phones should be connected to a surge protector.
You have four main security concerns with mobile devices:
Keeping them from being stolen
Keeping data secure in case they are stolen
Finding a device if it is stolen
Remotely recovering and wiping data off a stolen device
Cookies are small text files that some websites automatically store on your hard drive when you visit them.
Companies use this information to determine the traffic flowing through their website and the effectiveness of their marketing strategy.
Cookies do not go through your hard drive in search of personal information.
The main concern is that advertisers will use this information indiscriminately, thus invading your privacy.
Cookies pose no security threat because it is virtually impossible to hide a virus or malicious software program in a cookie.
Phishing lures Internet users to reveal personal information.
Pharming occurs when malicious code is planted on your computer.
These guidelines help to avoid such schemes:
Never reply directly to any e-mail asking for personal information.
Don’t click on a link in an e-mail.
Check with the company asking for information.
Never give personal information over the Internet unless you know the site is secure.
Use phishing filters.
Use Internet security software that’s constantly being updated.
Ethics = unwritten rules; Law = written rules
Two groups are attacked by hackers – young adults [18 to 19 year olds] due to their available credit and elderly people due to their financial stability
DoS = denial-of-service attack
DDoS = distributed denial-of-service
DOS = Microsoft DOS
Secure passwords and securing devices; questions on Security Assignment #1
Web encryption secures your web browsing, data encryption prevents unwarranted access to information you send, and Wi-Fi encryption prevents unwarranted access to your system [internet connection]. The lock shows secure websites.
Hackers may be identified as:
White-hat hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses.
Black-hat hackers break into systems to destroy information or for illegal gain.
Grey-hat hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches.
A packet analyzer (sniffer) is a program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet.
A keylogger is a program that captures all keystrokes made on a computer.
Viruses are not limited to computers; smartphones, tablet computers, and other devices can be infected.
Creating and disseminating viruses are two of the most widespread types of cybercrimes.
A virus’s main purpose is to replicate itself and copy its code into as many other host files as possible.
The majority of viruses have secondary objectives or side effects.
Downloading and running a file that’s attached to the e-mail are common ways to infect your computer.
Viruses can be classified by the methods they take to avoid detection:
A polymorphic virus changes its code to avoid detection. Most polymorphic viruses infect a particular type of file.
A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it.
Stealth viruses temporarily erase their code from the files where they reside and hide in the active memory of the computer.
Antivirus software
Biometrics
Malware is software that has a malicious intent
Adware displays unsponsored advertisements
Spyware is an unwanted program that downloads with other software from the Internet and runs in the background.
Spyware transmits information about you.
Many spyware programs use tracking cookies.
A keystroke logger program monitors keystrokes.
Scareware is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware.
You’re then directed to a website where you can buy fake removal or antivirus tools that provide little or no value.
Scareware is a social engineering technique because it uses people’s fear of computer viruses to convince them to part with their money.
A firewall is a software program or hardware device designed to protect computers from hackers.
The data on your computer faces three major threats:
Unauthorized access
Tampering
Destruction
Backups
Copies of files that you can use to replace the originals if they’re lost or damaged
You have four main security concerns with mobile devices:
Keeping them from being stolen
Keeping data secure in case they are stolen
Finding a device if it is stolen
Remotely recovering and wiping data off a stolen device
Cookies are small text files that some websites automatically store on your hard drive when you visit them.
Companies use this information to determine the traffic flowing through their website and the effectiveness of their marketing strategy.
Cookies do not go through your hard drive in search of personal information.
The main concern is that advertisers will use this information indiscriminately, thus invading your privacy.
Cookies pose no security threat because it is virtually impossible to hide a virus or malicious software program in a cookie.
Phishing lures Internet users to reveal personal information.
Pharming occurs when malicious code is planted on your computer.
These guidelines help to avoid such schemes:
Never reply directly to any e-mail asking for personal information.
Don’t click on a link in an e-mail.
Check with the company asking for information.
Never give personal information over the Internet unless you know the site is secure.
Use phishing filters.
Use Internet security software that’s constantly being updated.
https://www.youtube.com/watch?v=dZfGTL2PY3E
https://www.youtube.com/watch?v=UPXctbdBth0&t=62s
A mobile device is at the same risk as a stationary device, but has one more opportunity for hackers to hack into your device [Bluetooth]. When using a mobile device you need to have features on your device that can prevent security issues [such as antivirus software], you need to be able to detect any issues that may occur, and react to them in an appropriate manner, such as wiping your device.
Your mobile devices can be accessed through the Wi-Fi, downloading Apps, and via Bluetooth.
Only download from trusted sources and refrain from downloading when on an unsafe network such as a Hotspot or Wi-Fi outside of the home or trusted network.
Yes, Apple products are more secure than other products, but not without issues/flaws.