2. Today’s Agenda
• Explain PowerPoint Assignment
• Assign Thesis Topics
• Introduce MU Library Resources and Google Scholar
• Introduce MLA Format Resources
• Introduce Scholarly Sources HW Assignments
• Introduce Word Equation Editor HW Assignment
• Explain Extra Credit Opportunities
3. PowerPoint Assignment
• Pick a thesis statement
• Research your topic
• Create a PowerPoint based on the skills taught in class and
in accordance with rubric that was handed out in class on
11/7/16
• Be sure to adhere to syllabus academic honesty policies
• Use skills taught today to help create a well researched
PowerPoint
5. CRAAP Test
• http://guides.monmouth.edu/c.php?g=63392&p=2705358
• Currency – source should be less than 5 years old for your papers
• Relevance – does it match your topic? If so, use it
• Authority – who wrote it? Are they published often?
• Accuracy – is the info you found true?
• Purpose – you want to choose unbiased/non opinion sources
• Feel free to watch the video at the link provided
6. Our Library Guide
• http://guides.monmouth.edu/IT100
• Use Journal Articles Tab
• Click the box next to Scholarly and Peer Reviewed
• Enter your search terms and click Search
• Select Last 5 Years under Publication Date
• Click on a result and click PDF Full Text [if this option doesn’t exist for that result
move on to another source]
• If you’ve read it and feel it helps your paper click Cite; scroll down and copy the MLA
citation
7. Writing Your Paper
• http://www.monmouth.edu/academics/css/writing/ResourcesForWriters.aspx
• The Writing Process: Writing a Thesis
• Research and Documentation: All MLA Topics and Research Tips
• These tips will help you developing your PPT and also if you decide to do the extra
credit paper
8. Google Scholar
• https://scholar.google.com/
• Only provides scholarly sources for your search terms
• May not be able to open all sources [try to stick with sources that list PDF or HTML
on the right hand side]
• Click Cite and highlight the MLA citation if you use the source for your paper
9. Helpful Hints
• Download all sources you seem interested in to read and decide if they are a good
source
• Copy citations for all sources you download. As you delete the sources you decide
not to use, delete their citation
• Pick sources that match your opinion
• Start your research and writing soon
10. MLA Info – Reviewing MLA Style
• Checklist for formatting a default Word document to match the
MLA style:
• Double-space the entire document
• Remove paragraph spacing from the entire document
• Increase the font size for the entire document to 12 points
• Indent the first line of each body paragraph .5 inch from the
left margin
• Add the page number (preceded by your last name) in the
upper-right corner of each page (you can omit this from the
first page)
11. MLA Info – Creating Citations and a Bibliography
• Steps for finalizing a bibliography to match MLA guidelines
for a Works Cited list:
1. Format the “Works Cited” heading to match the
formatting of the rest of the text in the document
2. Center the “Works Cited” heading.
3. Double-space the entire works cited list, including the
heading, and remove extra space after the paragraphs
4. Change the font size for the entire works cited list to 12
points
13. MLA Info – Additional Resources
• MLA Formatting and Style Guide:
https://owl.english.purdue.edu/owl/resource/747/01/
• Create a Cross Reference: https://support.office.com/en-
us/article/Create-a-cross-reference-300b208c-e45a-487a-880b-
a02767d9774b
• Create a Table of Figures: https://support.office.com/en-
us/article/Create-a-table-of-figures-c5ea59c5-487c-4fb2-bd48-
e34dd57f0ec1
14. How to Conduct Scholarly Research
• Source Evaluations:
• Google Scholar OK
• Wikipedia NOT OK
• Evaluation Test -
http://guides.monmouth.edu/c.php?g=63392&p=2705358
• Library and Other Resources:
• http://guides.monmouth.edu/IT100
• http://www.monmouth.edu/academics/css/writing/ResourcesFor
Writers.aspx
• http://library.monmouth.edu/main/
15. Scholarly Sources Homework
• For Scholarly Sources 1 & 2 you are required to find two scholarly sources to use for
your PowerPoint and answer questions. Remember to include the citation for the
articles.
• Use the process I just went through with you
• 1 source for each assignment. DON’T SUBMIT BOTH SOURCES IN ONE FILE.
• In theory you will use these 2 scholarly sources for your PowerPoint.
16. Word Equation Editor HW Assignment
• Insert Tab
• Equation
• Insert New Equation
• Use Symbols and Structures to replicate the formulas
• You may use Ink Equation
17. Extra Credit Opportunities for IT 150
•Write research paper based on your thesis
topic [Worth 100 Points] scored by the
associated rubric – Due 11/30/16
•Present PowerPoint after you complete Final
Exam [Worth 100 Points] scored by the
associated rubric
19. PPT Concepts for PPT Assignment
•We will cover Chs 1 & 4 in class
•But Chs 2 & 3 have helpful
concepts for the assignment
20. PPT 2 and 3 Concepts for PPT Presentation
•Chapter 2:
• Change Themes and
Variants [Skill 2]
• Change Font Colors
and Effects [Skill 3]
•Chapter 3:
• Insert Video Files
[Skill 9]
• Apply Video Styles
and Adjust Videos
[Skill 10]
21. Effective PowerPoint Presentations
• One theme per slide
• Rehearse
• Know your purpose and
audience
• Exhibit your Passion
• Build on your content
• Know Your Topic to a
Strong Degree
• Keep eye contact
• Use facts
• Use readable font
• Don’t read from your
slides
• Think about questions you
may be asked ahead of
time
23. Identity Theft and Hackers
Which of the following is formally
defined as any criminal action
perpetrated primarily through the use of
a computer? Cybercrime
White-hat hackers break into systems for
non-malicious reasons such as to test
system security vulnerabilities.
A packet analyzer is a program that can
enable a hacker to do all of the following
EXCEPT launch a denial of service (DoS)
attack on your computer.
All of the following were top cybercrimes
reported to the IC3 EXCEPT theft of
services.
• Cybercrime, Cybercriminals, Common types of
cybercrimes
• Most financially damaging cybercrime for
individuals is identity theft
• Messaging, Malware and Mobile Anti-Abuse
Working Group (M3AAWG) Found half of e-
mail users have opened spam
• Types of hackers: White-hat (ethical hackers),
Black-hat hackers, Grey-hat hackers
• Packet analyzer (sniffer)
• Keylogger
24. Hacking
• Trojan horses—Appear to be
useful
• Rootkits
• Zombies
• Denial-of-Service
• Legitimate users are denied
access to a computer system
• System shuts down
• DDoS
• A rootkit allows a hacker to gain
access to your computer and take
almost complete control of it
without your knowledge.
• A DDoS attack floods a computer
with requests until it shuts down
and refuses to answer any
requests for information.
• A zombie is another person's
computer controlled by a hacker.
True
25. Viruses
• Not limited to computers
• Widespread cybercrime: Spreading
viruses
• Main purpose and Secondary
objectives
• Sources of virus infection
• Classified by methods used to avoid
detection: Polymorphic viruses,
Multipartite viruses, Stealth viruses
• Creating and distributing computer
viruses is one of the most widespread
types of cybercrimes.
• All of the following activities may infect
your computer with a virus EXCEPT
printing a document.
• Which of the following classifications of
viruses can change its own code to avoid
detection? Polymorphic
• With regard to computer protection,
quarantining is defined as placing a found
virus in a secure area on the hard drive.
• A(n) virus signature is the portion of virus
code that is unique to a particular
computer virus.
26. Viruses cont.
• Boot-sector viruses are often
transmitted by a flash drive left in a USB
port.
• A time bomb is a virus that is triggered
on a certain date.
• A macro virus is a virus that is attached
to documents such as Word or Excel
files.
• Currently, there are no antivirus
programs for mobile devices. False
• A worm does NOT require human
interaction to spread to other
computers. True
27. Malware and SPAM
• Malware has malicious intent
• Adware displays sponsored advertisements
• Spyware is an unwanted piggy-back
program
• Transmits information
• Tracking cookies
• Keystroke logger
• Many antispyware packages are available
• Spam—junk e-mail
• Tactics to minimize spam
• Spyware is a program that gathers
information about your surfing habits
without your knowledge.
28. Cookies
• Cookies are small text files received
when you visit a website
• Help companies determine the
effectiveness of their marketing
• Do not search drive for personal
information
• May invade your privacy
• Pose no security threat
• Which of the following
statements about cookies
is NOT true? Cookies
obtain your personal
information by searching
your hard drive.
• CAPTCHA is the wavy hard-to-read
letter and number sequence that you
type to prove that you are human to
a website.
30. The Wi-Fi Struggle: Wendy’s vs. Dunkin Donuts
WENDY’s
• Free Wi-Fi
• User Agreement
• Privacy Policy
DUNKIN DONUTS
• Free Wi-Fi
• User Agreement
• Privacy Policy
31. The Wi-Fi Struggle: Wendy’s vs. Dunkin Donuts
• On paper Wendy’s and Dunkin Donuts both offer Free Wi-Fi, but one is a safer Wi-
Fi option than the other
• Consider accessing the Wi-Fi in the general public, not on campus (ie the store in
your town)
• Teams will be split among the class with two captains
• Team captains will choose either Wendy’s or Dunkin Donuts
• Each team will research their company’s Wi-Fi information to determine: a) If it is a
safe bet to use their company’s Wi-Fi and b) If it is a safe bet to use the other
team’s company’s Wi-Fi
• There is a right answer; for one very important reason
32. Homework
• Social Issue 5 Due December 12th at 8:00AM
• Security Exam on December 12th, STUDY!!!
• Check Twitter
• Check eCampus
34. Review from Last Class
• Hackers go after the Elderly due to their financial stability and
Young adults due to their available credit
• Google Images is a stronger tool than Google Search in viewing
your digital footprint
• Mobile devices are at the same risk as your personal computers
• Using Wi-Fi is risky; look for Wi-Fi with a password to make it a little
more secure
35. Zero Days Video Discussion
•What are Zero Days?
• Vulnerabilities in the code that can be hacked
•What are Bug Bounties?
• Payment for identifying a zero day in the
software/code
•You can either fix a Zero Day, pay someone to
fix it, or get hacked
36. Protect Yourself
• Protecting yourself on your personal computer and mobile devices is a primary
concern
• Your data [whether personal like bank account or professional like work documents]
can be useful resources to hackers
• Use strategies to prevent issues and continue to be educated about cybersecurity
37. Encrypt Me
• Types of Encryption
• Wi-Fi Encryption
• Data Encryption
• Web Encryption
38. Encrypt Me – Defining Encryption
• A methodology using algorithms to modify data, text, code, etc. to prevent the
opportunity of hacking and misuse of information
• Courses such as Cryptography devote a substantial amount of time towards this
process
• Encryption can exist as: Wi-Fi Encryption, Data Encryption, and Web Encryption
• Encryption can be one of the most secure ways to protect your computer and
mobile device
39. Encrypt Me – Wi-Fi Encryption
• Wi-Fi Encryption is the encryption method you take to protect outside access to your network
[whether at home or not]
• Three common types are WEP, WPA, WPA2
• Wired Equivalent Privacy can be 64, 128, or 256 bit encryptions; commonly used, but easily
hacked
• Wi-Fi Protected Access is 256 bit encryption; created due to the vulnerabilities of WEP
• Wi-Fi Protected Access II is an updated version of WPA and the most secure encryption tool for
Wi-Fi
40. Encrypt Me – Data Encryption
• Focuses heavily on making text or information sent via email or other online
transmit difficult to decipher [or read]
• Substitution ciphers are the most common tool for this task
41. Encrypt Me – Web Encryption
• Look for the “lock” – it means the most secure websites
• Digital Certificates
• Like cookies; gives access based on
prior approval/visit [can expire]
• SSL Encryption
• Most common web encryption tool
42. Encrypt Me – Web Encryption of Social Media
• Twitter says:
• Secure Connection
• The connection to this site is encrypted and authenticated using a
strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and
a strong cipher (AES_128_GCM).
• Instagram says:
• Secure Connection
• The connection to this site is encrypted and authenticated using a
strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and
a strong cipher (CHACHA20_POLY1305).
• Your results may vary. A similar protocol, key exchange, and cipher are
perfectly fine, but often each site will have its own cipher.
43. Phishing and Pharming
• Phishing
• Luring people into revealing
information
• Pharming
• Malicious code planted on
your computer to gather
information
• Guidelines to avoid schemes
• When malicious code is
planted on your computer
and alters your browser's
ability to find web
addresses, it is known as
pharming.
44. Scareware and Firewalls
• Type of malware
• Attempts to convince you something
is wrong … and to pay money to fix it
• Firewall—hardware or software
• Windows and OS X include firewalls
• Security suites include firewall
software
• You can block logical ports
from invaders and make
your computer invisible to
others on the Internet by
installing a firewall.
• Configuring a firewall to ignore all
incoming packets that request access
to a specific port is known as logical
port blocking.
45. Preventing Viruses
• Antivirus software
• Detects viruses and
protects your computer. Like
Symantec, Kaspersky, AVG, McAfee
• Need strong passwords. Password
strength tests
• Operating systems have built-in password
protection
• Biometrics: Fingerprint, Iris pattern in eye,
Voice authentication, Face pattern
recognition
• Provide a high level of security
• Rules for creating
passwords include all of
the following EXCEPT use a
dictionary to find a
lengthy word that is easy
to remember.
46. Protecting Data
• Protect your personal Information.
Backups are copies of data
• Backup your data from: Unauthorized
access, Tampering, Destruction
• Power surges
• Surge protector
• Replace every 2–3 years
• Use with all devices that have solid-
state components
• Social engineering is any
technique that uses social
skills to generate human
interaction that entices
individuals to reveal
sensitive information.
47. Preventing Theft
• Four main security concerns with mobile devices:
• Keeping them from being stolen
• Keeping data secure in case they are stolen
• Finding a device if it is stolen
• Remotely recovering and wiping data off a stolen
device
48. Security Exam on Monday
• Worth 110 Points
• Team gets 10 Extra Credit Points
• Will start with 4 questions on eCampus based on other content and video [worth
10 points]
• 25 questions on MyITLab based on the Yellow content in 11-22&29 Agenda [worth
100 points]
49. Homework
• Social Issue 5 Due December 12th at 8:00AM
• Security Exam on December 12th, STUDY!!!
• Check Twitter
• Check eCampus
53. 3rd Secret of Life
Don’t be afraid to make a fool out of yourself for a good cause
54. Today’s Agenda: Monday, December 19th, 2016
• Complete MyITLab Final Exam
• You may leave once you finish the entire Final Exam;
unless you’re doing the extra credit presentation
Editor's Notes
Cybercrime is any criminal action perpetrated primarily through the use of a computer.
Cybercriminals are individuals who use computers, networks, and the Internet to perpetrate crime.
Four common categories of complaints received were FBI-related scams, identity theft, nonauction/non-delivery of merchandise, and advance fee fraud.
Although the top four complaints all relate to some type of fraud, other complaints received involved equally serious matters such as computer intrusions—hacking—child pornography, and blackmail.
Many victims of identity theft spend months, or even years, trying to repair their credit and eliminate fraudulent debts.
Identity theft occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account number, and credit card information and runs up debts in your name.
The nefarious acts cover a wide range of activities.
A survey by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) found that half of e-mail users in North America and Europe have opened spam.
A hacker is most commonly defined as anyone who unlawfully breaks into a computer system.
Hackers may be identified as:
White-hat hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses.
Black-hat hackers break into systems to destroy information or for illegal gain.
Grey-hat hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches.
A packet analyzer (sniffer) is a program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet.
A keylogger is a program that captures all keystrokes made on a computer.
A Trojan horse is a program that appears to be something useful or desirable, but does something malicious in the background without your knowledge.
Backdoor programs and rootkits are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge.
A computer that a hacker controls is referred to as a zombie. Zombies are often used to launch denial-of-service attacks on other computers.
In a denial-of-service attack, legitimate users are denied access to a system because a hacker is repeatedly making requests of that system through a computer the hacker has taken over as a zombie. A computer can handle only a certain number of requests for information at one time. When it is flooded with requests, it shuts down and refuses to answer any requests for information, even if the requests are from a legitimate user.
A distributed denial-of-service (DDoS) attack, launches DoS attacks from more than one zombie at the same time.
Viruses are not limited to computers; smartphones, tablet computers, and other devices can be infected.
Creating and disseminating viruses are two of the most widespread types of cybercrimes.
A virus’s main purpose is to replicate itself and copy its code into as many other host files as possible.
The majority of viruses have secondary objectives or side effects.
Downloading and running a file that’s attached to the e-mail are common ways to infect your computer.
Viruses can be classified by the methods they take to avoid detection:
A polymorphic virus changes its code to avoid detection. Most polymorphic viruses infect a particular type of file.
A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it.
Stealth viruses temporarily erase their code from the files where they reside and hide in the active memory of the computer.
Malware is software that has a malicious intent
Adware displays unsponsored advertisements
Spyware is an unwanted program that downloads with other software from the Internet and runs in the background.
Spyware transmits information about you.
Many spyware programs use tracking cookies.
A keystroke logger program monitors keystrokes.
Other anti-spyware programs are easy to install and update.
Spam is unwanted or junk e-mail.
There are several ways to help avoid spam:
Create a free e-mail address
Spam filters
Buy third-party programs
Reclassify e-mails that have been misidentified as spam
Cookies are small text files that some websites automatically store on your hard drive when you visit them.
Companies use this information to determine the traffic flowing through their website and the effectiveness of their marketing strategy.
Cookies do not go through your hard drive in search of personal information.
The main concern is that advertisers will use this information indiscriminately, thus invading your privacy.
Cookies pose no security threat because it is virtually impossible to hide a virus or malicious software program in a cookie.
Phishing lures Internet users to reveal personal information.
Pharming occurs when malicious code is planted on your computer.
These guidelines help to avoid such schemes:
Never reply directly to any e-mail asking for personal information.
Don’t click on a link in an e-mail.
Check with the company asking for information.
Never give personal information over the Internet unless you know the site is secure.
Use phishing filters.
Use Internet security software that’s constantly being updated.
Scareware is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware.
You’re then directed to a website where you can buy fake removal or antivirus tools that provide little or no value.
Scareware is a social engineering technique because it uses people’s fear of computer viruses to convince them to part with their money.
A firewall is a software program or hardware device designed to protect computers from hackers.
Both Windows and OS X include reliable firewalls. The Windows Action Center is a good source of information about the security settings on your computer, including the status of your firewall.
Security suites such as Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security Suite also include firewall software.
Antivirus software is specifically designed to detect viruses and protect your computer and files from harm. Symantec, Kaspersky, AVG, and McAfee are among the companies that offer highly rated antivirus software packages.
Antivirus protection is also included in comprehensive Internet security packages such as Norton Internet Security, Kaspersky Internet Security, and McAfee Total Protection. These software packages also help protect you from threats other than computer viruses.
Strong passwords are difficult for someone to guess.
There are many password generators available for free, such as the Strong Password Generator.
You can use online password strength testers, such as the Password Meter, to evaluate your passwords.
To restrict access to your computer, Windows, OS X, and most other operating systems have built-in password (or passcode) protection for files as well as the entire desktop.
A biometric authentication device is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it to a digital code.
Because no two people have the same biometric characteristics, these devices provide a high level of security.
Other biometric devices, including voice authentication and facial recognition systems, are now widely offered in notebook computers, tablets, and smartphones.
The data on your computer faces three major threats:
Unauthorized access
Tampering
Destruction
Backups
Copies of files that you can use to replace the originals if they’re lost or damaged
Power surges occur when an electrical current is supplied in excess of normal voltage. Old or faulty wiring, downed power lines, malfunctions at electric company substations, and lightning strikes can all cause power surges.
A surge protector protects your computer.
Replace surge protectors every 2–3 years or after a major surge.
All electronic devices that have solid-state components, such as TVs, stereos, printers, and cell phones should be connected to a surge protector.
You have four main security concerns with mobile devices:
Keeping them from being stolen
Keeping data secure in case they are stolen
Finding a device if it is stolen
Remotely recovering and wiping data off a stolen device