SlideShare a Scribd company logo
1 of 54
IT 150 Info Tech for Business
Professor Marino
Today’s Agenda
• Explain PowerPoint Assignment
• Assign Thesis Topics
• Introduce MU Library Resources and Google Scholar
• Introduce MLA Format Resources
• Introduce Scholarly Sources HW Assignments
• Introduce Word Equation Editor HW Assignment
• Explain Extra Credit Opportunities
PowerPoint Assignment
• Pick a thesis statement
• Research your topic
• Create a PowerPoint based on the skills taught in class and
in accordance with rubric that was handed out in class on
11/7/16
• Be sure to adhere to syllabus academic honesty policies
• Use skills taught today to help create a well researched
PowerPoint
Thesis Topics
•Access Thesis Topics
•Review Topics
•Pick Your Topic
•Let Me Know Your Topic
CRAAP Test
• http://guides.monmouth.edu/c.php?g=63392&p=2705358
• Currency – source should be less than 5 years old for your papers
• Relevance – does it match your topic? If so, use it
• Authority – who wrote it? Are they published often?
• Accuracy – is the info you found true?
• Purpose – you want to choose unbiased/non opinion sources
• Feel free to watch the video at the link provided
Our Library Guide
• http://guides.monmouth.edu/IT100
• Use Journal Articles Tab
• Click the box next to Scholarly and Peer Reviewed
• Enter your search terms and click Search
• Select Last 5 Years under Publication Date
• Click on a result and click PDF Full Text [if this option doesn’t exist for that result
move on to another source]
• If you’ve read it and feel it helps your paper click Cite; scroll down and copy the MLA
citation
Writing Your Paper
• http://www.monmouth.edu/academics/css/writing/ResourcesForWriters.aspx
• The Writing Process: Writing a Thesis
• Research and Documentation: All MLA Topics and Research Tips
• These tips will help you developing your PPT and also if you decide to do the extra
credit paper
Google Scholar
• https://scholar.google.com/
• Only provides scholarly sources for your search terms
• May not be able to open all sources [try to stick with sources that list PDF or HTML
on the right hand side]
• Click Cite and highlight the MLA citation if you use the source for your paper
Helpful Hints
• Download all sources you seem interested in to read and decide if they are a good
source
• Copy citations for all sources you download. As you delete the sources you decide
not to use, delete their citation
• Pick sources that match your opinion
• Start your research and writing soon
MLA Info – Reviewing MLA Style
• Checklist for formatting a default Word document to match the
MLA style:
• Double-space the entire document
• Remove paragraph spacing from the entire document
• Increase the font size for the entire document to 12 points
• Indent the first line of each body paragraph .5 inch from the
left margin
• Add the page number (preceded by your last name) in the
upper-right corner of each page (you can omit this from the
first page)
MLA Info – Creating Citations and a Bibliography
• Steps for finalizing a bibliography to match MLA guidelines
for a Works Cited list:
1. Format the “Works Cited” heading to match the
formatting of the rest of the text in the document
2. Center the “Works Cited” heading.
3. Double-space the entire works cited list, including the
heading, and remove extra space after the paragraphs
4. Change the font size for the entire works cited list to 12
points
MLA Info – Citation Rules
MLA Info – Additional Resources
• MLA Formatting and Style Guide:
https://owl.english.purdue.edu/owl/resource/747/01/
• Create a Cross Reference: https://support.office.com/en-
us/article/Create-a-cross-reference-300b208c-e45a-487a-880b-
a02767d9774b
• Create a Table of Figures: https://support.office.com/en-
us/article/Create-a-table-of-figures-c5ea59c5-487c-4fb2-bd48-
e34dd57f0ec1
How to Conduct Scholarly Research
• Source Evaluations:
• Google Scholar OK
• Wikipedia NOT OK
• Evaluation Test -
http://guides.monmouth.edu/c.php?g=63392&p=2705358
• Library and Other Resources:
• http://guides.monmouth.edu/IT100
• http://www.monmouth.edu/academics/css/writing/ResourcesFor
Writers.aspx
• http://library.monmouth.edu/main/
Scholarly Sources Homework
• For Scholarly Sources 1 & 2 you are required to find two scholarly sources to use for
your PowerPoint and answer questions. Remember to include the citation for the
articles.
• Use the process I just went through with you
• 1 source for each assignment. DON’T SUBMIT BOTH SOURCES IN ONE FILE.
• In theory you will use these 2 scholarly sources for your PowerPoint.
Word Equation Editor HW Assignment
• Insert Tab
• Equation
• Insert New Equation
• Use Symbols and Structures to replicate the formulas
• You may use Ink Equation
Extra Credit Opportunities for IT 150
•Write research paper based on your thesis
topic [Worth 100 Points] scored by the
associated rubric – Due 11/30/16
•Present PowerPoint after you complete Final
Exam [Worth 100 Points] scored by the
associated rubric
IT 150-01
Information Technology
Effective PPT
Professor Marino
PPT Concepts for PPT Assignment
•We will cover Chs 1 & 4 in class
•But Chs 2 & 3 have helpful
concepts for the assignment
PPT 2 and 3 Concepts for PPT Presentation
•Chapter 2:
• Change Themes and
Variants [Skill 2]
• Change Font Colors
and Effects [Skill 3]
•Chapter 3:
• Insert Video Files
[Skill 9]
• Apply Video Styles
and Adjust Videos
[Skill 10]
Effective PowerPoint Presentations
• One theme per slide
• Rehearse
• Know your purpose and
audience
• Exhibit your Passion
• Build on your content
• Know Your Topic to a
Strong Degree
• Keep eye contact
• Use facts
• Use readable font
• Don’t read from your
slides
• Think about questions you
may be asked ahead of
time
IT 150-01
Security Unit
December 5th, 2016
Identity Theft and Hackers
Which of the following is formally
defined as any criminal action
perpetrated primarily through the use of
a computer? Cybercrime
White-hat hackers break into systems for
non-malicious reasons such as to test
system security vulnerabilities.
A packet analyzer is a program that can
enable a hacker to do all of the following
EXCEPT launch a denial of service (DoS)
attack on your computer.
All of the following were top cybercrimes
reported to the IC3 EXCEPT theft of
services.
• Cybercrime, Cybercriminals, Common types of
cybercrimes
• Most financially damaging cybercrime for
individuals is identity theft
• Messaging, Malware and Mobile Anti-Abuse
Working Group (M3AAWG) Found half of e-
mail users have opened spam
• Types of hackers: White-hat (ethical hackers),
Black-hat hackers, Grey-hat hackers
• Packet analyzer (sniffer)
• Keylogger
Hacking
• Trojan horses—Appear to be
useful
• Rootkits
• Zombies
• Denial-of-Service
• Legitimate users are denied
access to a computer system
• System shuts down
• DDoS
• A rootkit allows a hacker to gain
access to your computer and take
almost complete control of it
without your knowledge.
• A DDoS attack floods a computer
with requests until it shuts down
and refuses to answer any
requests for information.
• A zombie is another person's
computer controlled by a hacker.
True
Viruses
• Not limited to computers
• Widespread cybercrime: Spreading
viruses
• Main purpose and Secondary
objectives
• Sources of virus infection
• Classified by methods used to avoid
detection: Polymorphic viruses,
Multipartite viruses, Stealth viruses
• Creating and distributing computer
viruses is one of the most widespread
types of cybercrimes.
• All of the following activities may infect
your computer with a virus EXCEPT
printing a document.
• Which of the following classifications of
viruses can change its own code to avoid
detection? Polymorphic
• With regard to computer protection,
quarantining is defined as placing a found
virus in a secure area on the hard drive.
• A(n) virus signature is the portion of virus
code that is unique to a particular
computer virus.
Viruses cont.
• Boot-sector viruses are often
transmitted by a flash drive left in a USB
port.
• A time bomb is a virus that is triggered
on a certain date.
• A macro virus is a virus that is attached
to documents such as Word or Excel
files.
• Currently, there are no antivirus
programs for mobile devices. False
• A worm does NOT require human
interaction to spread to other
computers. True
Malware and SPAM
• Malware has malicious intent
• Adware displays sponsored advertisements
• Spyware is an unwanted piggy-back
program
• Transmits information
• Tracking cookies
• Keystroke logger
• Many antispyware packages are available
• Spam—junk e-mail
• Tactics to minimize spam
• Spyware is a program that gathers
information about your surfing habits
without your knowledge.
Cookies
• Cookies are small text files received
when you visit a website
• Help companies determine the
effectiveness of their marketing
• Do not search drive for personal
information
• May invade your privacy
• Pose no security threat
• Which of the following
statements about cookies
is NOT true? Cookies
obtain your personal
information by searching
your hard drive.
• CAPTCHA is the wavy hard-to-read
letter and number sequence that you
type to prove that you are human to
a website.
Zero Days Video – Watch at Home
The Wi-Fi Struggle: Wendy’s vs. Dunkin Donuts
WENDY’s
• Free Wi-Fi
• User Agreement
• Privacy Policy
DUNKIN DONUTS
• Free Wi-Fi
• User Agreement
• Privacy Policy
The Wi-Fi Struggle: Wendy’s vs. Dunkin Donuts
• On paper Wendy’s and Dunkin Donuts both offer Free Wi-Fi, but one is a safer Wi-
Fi option than the other
• Consider accessing the Wi-Fi in the general public, not on campus (ie the store in
your town)
• Teams will be split among the class with two captains
• Team captains will choose either Wendy’s or Dunkin Donuts
• Each team will research their company’s Wi-Fi information to determine: a) If it is a
safe bet to use their company’s Wi-Fi and b) If it is a safe bet to use the other
team’s company’s Wi-Fi
• There is a right answer; for one very important reason
Homework
• Social Issue 5 Due December 12th at 8:00AM
• Security Exam on December 12th, STUDY!!!
• Check Twitter
• Check eCampus
IT 150-01
Security Unit
December 7th, 2016
Review from Last Class
• Hackers go after the Elderly due to their financial stability and
Young adults due to their available credit
• Google Images is a stronger tool than Google Search in viewing
your digital footprint
• Mobile devices are at the same risk as your personal computers
• Using Wi-Fi is risky; look for Wi-Fi with a password to make it a little
more secure
Zero Days Video Discussion
•What are Zero Days?
• Vulnerabilities in the code that can be hacked
•What are Bug Bounties?
• Payment for identifying a zero day in the
software/code
•You can either fix a Zero Day, pay someone to
fix it, or get hacked
Protect Yourself
• Protecting yourself on your personal computer and mobile devices is a primary
concern
• Your data [whether personal like bank account or professional like work documents]
can be useful resources to hackers
• Use strategies to prevent issues and continue to be educated about cybersecurity
Encrypt Me
• Types of Encryption
• Wi-Fi Encryption
• Data Encryption
• Web Encryption
Encrypt Me – Defining Encryption
• A methodology using algorithms to modify data, text, code, etc. to prevent the
opportunity of hacking and misuse of information
• Courses such as Cryptography devote a substantial amount of time towards this
process
• Encryption can exist as: Wi-Fi Encryption, Data Encryption, and Web Encryption
• Encryption can be one of the most secure ways to protect your computer and
mobile device
Encrypt Me – Wi-Fi Encryption
• Wi-Fi Encryption is the encryption method you take to protect outside access to your network
[whether at home or not]
• Three common types are WEP, WPA, WPA2
• Wired Equivalent Privacy can be 64, 128, or 256 bit encryptions; commonly used, but easily
hacked
• Wi-Fi Protected Access is 256 bit encryption; created due to the vulnerabilities of WEP
• Wi-Fi Protected Access II is an updated version of WPA and the most secure encryption tool for
Wi-Fi
Encrypt Me – Data Encryption
• Focuses heavily on making text or information sent via email or other online
transmit difficult to decipher [or read]
• Substitution ciphers are the most common tool for this task
Encrypt Me – Web Encryption
• Look for the “lock” – it means the most secure websites
• Digital Certificates
• Like cookies; gives access based on
prior approval/visit [can expire]
• SSL Encryption
• Most common web encryption tool
Encrypt Me – Web Encryption of Social Media
• Twitter says:
• Secure Connection
• The connection to this site is encrypted and authenticated using a
strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and
a strong cipher (AES_128_GCM).
• Instagram says:
• Secure Connection
• The connection to this site is encrypted and authenticated using a
strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and
a strong cipher (CHACHA20_POLY1305).
• Your results may vary. A similar protocol, key exchange, and cipher are
perfectly fine, but often each site will have its own cipher.
Phishing and Pharming
• Phishing
• Luring people into revealing
information
• Pharming
• Malicious code planted on
your computer to gather
information
• Guidelines to avoid schemes
• When malicious code is
planted on your computer
and alters your browser's
ability to find web
addresses, it is known as
pharming.
Scareware and Firewalls
• Type of malware
• Attempts to convince you something
is wrong … and to pay money to fix it
• Firewall—hardware or software
• Windows and OS X include firewalls
• Security suites include firewall
software
• You can block logical ports
from invaders and make
your computer invisible to
others on the Internet by
installing a firewall.
• Configuring a firewall to ignore all
incoming packets that request access
to a specific port is known as logical
port blocking.
Preventing Viruses
• Antivirus software
• Detects viruses and
protects your computer. Like
Symantec, Kaspersky, AVG, McAfee
• Need strong passwords. Password
strength tests
• Operating systems have built-in password
protection
• Biometrics: Fingerprint, Iris pattern in eye,
Voice authentication, Face pattern
recognition
• Provide a high level of security
• Rules for creating
passwords include all of
the following EXCEPT use a
dictionary to find a
lengthy word that is easy
to remember.
Protecting Data
• Protect your personal Information.
Backups are copies of data
• Backup your data from: Unauthorized
access, Tampering, Destruction
• Power surges
• Surge protector
• Replace every 2–3 years
• Use with all devices that have solid-
state components
• Social engineering is any
technique that uses social
skills to generate human
interaction that entices
individuals to reveal
sensitive information.
Preventing Theft
• Four main security concerns with mobile devices:
• Keeping them from being stolen
• Keeping data secure in case they are stolen
• Finding a device if it is stolen
• Remotely recovering and wiping data off a stolen
device
Security Exam on Monday
• Worth 110 Points
• Team gets 10 Extra Credit Points
• Will start with 4 questions on eCampus based on other content and video [worth
10 points]
• 25 questions on MyITLab based on the Yellow content in 11-22&29 Agenda [worth
100 points]
Homework
• Social Issue 5 Due December 12th at 8:00AM
• Security Exam on December 12th, STUDY!!!
• Check Twitter
• Check eCampus
IT 150-01
Information Technology
Final Exam
Professor Marino
1st Secret of Life
2nd Secret of Life
People Change People
3rd Secret of Life
Don’t be afraid to make a fool out of yourself for a good cause
Today’s Agenda: Monday, December 19th, 2016
• Complete MyITLab Final Exam
• You may leave once you finish the entire Final Exam;
unless you’re doing the extra credit presentation

More Related Content

Similar to IT 150 Professor Marino's Class Covers Cybersecurity, Research Skills

Organising and Managing Research
Organising and Managing ResearchOrganising and Managing Research
Organising and Managing ResearchDr. Vinayak Bharadi
 
Using Web-based Tools in Brightspace, with an Eye on Accessibility accessibly
Using Web-based Tools in Brightspace, with an Eye on Accessibility accessiblyUsing Web-based Tools in Brightspace, with an Eye on Accessibility accessibly
Using Web-based Tools in Brightspace, with an Eye on Accessibility accessiblyD2L Barry
 
Comm 1130 technical_communication_march2012-alcock
Comm 1130 technical_communication_march2012-alcockComm 1130 technical_communication_march2012-alcock
Comm 1130 technical_communication_march2012-alcockMelanie Parlette-Stewart
 
"Hands Off! Best Practices for Code Hand Offs"
"Hands Off!  Best Practices for Code Hand Offs""Hands Off!  Best Practices for Code Hand Offs"
"Hands Off! Best Practices for Code Hand Offs"Naomi Dushay
 
Tips and Tricks to Optimize your Digital Resources
Tips and Tricks to Optimize your Digital ResourcesTips and Tricks to Optimize your Digital Resources
Tips and Tricks to Optimize your Digital ResourcesHeather Greer Klein
 
Routine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search SkillsRoutine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search SkillsIdowu Adegbilero-Iwari
 
Making and sharing content online
Making and sharing content onlineMaking and sharing content online
Making and sharing content onlineHelen Webster
 
DITA Quick Start Webinar: Defining Your Style Sheet Requirements
DITA Quick Start Webinar: Defining Your Style Sheet RequirementsDITA Quick Start Webinar: Defining Your Style Sheet Requirements
DITA Quick Start Webinar: Defining Your Style Sheet RequirementsSuite Solutions
 
Using Web 2.0 Tools inside Brightspace with an Eye on Accessibility
Using Web 2.0 Tools inside Brightspace with an Eye on AccessibilityUsing Web 2.0 Tools inside Brightspace with an Eye on Accessibility
Using Web 2.0 Tools inside Brightspace with an Eye on AccessibilityD2L
 
How to get started in Open Source!
How to get started in Open Source!How to get started in Open Source!
How to get started in Open Source!Pradeep Singh
 
Technical writing
Technical writingTechnical writing
Technical writingDenny Walthers
 
Community IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT Innovators
 
CMS 120: Introduction to Building a Website
CMS 120: Introduction to Building a WebsiteCMS 120: Introduction to Building a Website
CMS 120: Introduction to Building a WebsiteMontana State University
 
Tips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud ShaonTips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud ShaonCefalo
 
Developers Best Practices
Developers Best PracticesDevelopers Best Practices
Developers Best Practicesaqib javaid
 
Microsoft Word Reference Manager for Researchers Part I
Microsoft Word Reference Manager for Researchers Part IMicrosoft Word Reference Manager for Researchers Part I
Microsoft Word Reference Manager for Researchers Part IOmisile Kehinde Olugbenga
 
Tips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering CareerTips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering CareerFerdous Mahmud Shaon
 
Part of the DLM story: Get your Database under Source Control - SQL In The City
Part of the DLM story: Get your Database under Source Control - SQL In The City Part of the DLM story: Get your Database under Source Control - SQL In The City
Part of the DLM story: Get your Database under Source Control - SQL In The City Red Gate Software
 

Similar to IT 150 Professor Marino's Class Covers Cybersecurity, Research Skills (20)

Organising and Managing Research
Organising and Managing ResearchOrganising and Managing Research
Organising and Managing Research
 
Using Web-based Tools in Brightspace, with an Eye on Accessibility accessibly
Using Web-based Tools in Brightspace, with an Eye on Accessibility accessiblyUsing Web-based Tools in Brightspace, with an Eye on Accessibility accessibly
Using Web-based Tools in Brightspace, with an Eye on Accessibility accessibly
 
CMS Crash Course!
CMS Crash Course!CMS Crash Course!
CMS Crash Course!
 
Comm 1130 technical_communication_march2012-alcock
Comm 1130 technical_communication_march2012-alcockComm 1130 technical_communication_march2012-alcock
Comm 1130 technical_communication_march2012-alcock
 
"Hands Off! Best Practices for Code Hand Offs"
"Hands Off!  Best Practices for Code Hand Offs""Hands Off!  Best Practices for Code Hand Offs"
"Hands Off! Best Practices for Code Hand Offs"
 
Tips and Tricks to Optimize your Digital Resources
Tips and Tricks to Optimize your Digital ResourcesTips and Tricks to Optimize your Digital Resources
Tips and Tricks to Optimize your Digital Resources
 
Routine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search SkillsRoutine Maintenance of Computer Systems and Basic Internet Search Skills
Routine Maintenance of Computer Systems and Basic Internet Search Skills
 
Making and sharing content online
Making and sharing content onlineMaking and sharing content online
Making and sharing content online
 
DITA Quick Start Webinar: Defining Your Style Sheet Requirements
DITA Quick Start Webinar: Defining Your Style Sheet RequirementsDITA Quick Start Webinar: Defining Your Style Sheet Requirements
DITA Quick Start Webinar: Defining Your Style Sheet Requirements
 
Using Web 2.0 Tools inside Brightspace with an Eye on Accessibility
Using Web 2.0 Tools inside Brightspace with an Eye on AccessibilityUsing Web 2.0 Tools inside Brightspace with an Eye on Accessibility
Using Web 2.0 Tools inside Brightspace with an Eye on Accessibility
 
How to get started in Open Source!
How to get started in Open Source!How to get started in Open Source!
How to get started in Open Source!
 
How to do b tech be projects or any academic projects
How to do b tech be projects or any academic projectsHow to do b tech be projects or any academic projects
How to do b tech be projects or any academic projects
 
Technical writing
Technical writingTechnical writing
Technical writing
 
Community IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePointCommunity IT innovators Webinar - Taking another look at SharePoint
Community IT innovators Webinar - Taking another look at SharePoint
 
CMS 120: Introduction to Building a Website
CMS 120: Introduction to Building a WebsiteCMS 120: Introduction to Building a Website
CMS 120: Introduction to Building a Website
 
Tips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud ShaonTips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
Tips to kick-start your Software Engineering Career - Ferdous Mahmud Shaon
 
Developers Best Practices
Developers Best PracticesDevelopers Best Practices
Developers Best Practices
 
Microsoft Word Reference Manager for Researchers Part I
Microsoft Word Reference Manager for Researchers Part IMicrosoft Word Reference Manager for Researchers Part I
Microsoft Word Reference Manager for Researchers Part I
 
Tips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering CareerTips to Kick-start your Software Engineering Career
Tips to Kick-start your Software Engineering Career
 
Part of the DLM story: Get your Database under Source Control - SQL In The City
Part of the DLM story: Get your Database under Source Control - SQL In The City Part of the DLM story: Get your Database under Source Control - SQL In The City
Part of the DLM story: Get your Database under Source Control - SQL In The City
 

More from MattMarino13

1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptx1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptxMattMarino13
 
1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptx1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptxMattMarino13
 
BITM3730 11-14.pptx
BITM3730 11-14.pptxBITM3730 11-14.pptx
BITM3730 11-14.pptxMattMarino13
 
01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptx01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptxMattMarino13
 
02slide_accessible.pptx
02slide_accessible.pptx02slide_accessible.pptx
02slide_accessible.pptxMattMarino13
 
Hoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptxHoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptxMattMarino13
 
AndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptxAndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptxMattMarino13
 
9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptx9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptxMattMarino13
 
krajewski_om12 _01.pptx
krajewski_om12 _01.pptxkrajewski_om12 _01.pptx
krajewski_om12 _01.pptxMattMarino13
 
CapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptxCapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptxMattMarino13
 
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptxProject Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptxMattMarino13
 
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptxProject Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptxMattMarino13
 
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...MattMarino13
 
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...MattMarino13
 
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...MattMarino13
 
1-23-19 Agenda.pptx
1-23-19 Agenda.pptx1-23-19 Agenda.pptx
1-23-19 Agenda.pptxMattMarino13
 
EDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptxEDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptxMattMarino13
 
Agenda January 20th 2016.pptx
Agenda January 20th 2016.pptxAgenda January 20th 2016.pptx
Agenda January 20th 2016.pptxMattMarino13
 
BITM3730 8-29.pptx
BITM3730 8-29.pptxBITM3730 8-29.pptx
BITM3730 8-29.pptxMattMarino13
 
BITM3730 8-30.pptx
BITM3730 8-30.pptxBITM3730 8-30.pptx
BITM3730 8-30.pptxMattMarino13
 

More from MattMarino13 (20)

1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptx1-22-24 INFO 2106.pptx
1-22-24 INFO 2106.pptx
 
1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptx1-24-24 INFO 3205.pptx
1-24-24 INFO 3205.pptx
 
BITM3730 11-14.pptx
BITM3730 11-14.pptxBITM3730 11-14.pptx
BITM3730 11-14.pptx
 
01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptx01_Felke-Morris_Lecture_ppt_ch01.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptx
 
02slide_accessible.pptx
02slide_accessible.pptx02slide_accessible.pptx
02slide_accessible.pptx
 
Hoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptxHoisington_Android_4e_PPT_CH01.pptx
Hoisington_Android_4e_PPT_CH01.pptx
 
AndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptxAndroidHTP3_AppA.pptx
AndroidHTP3_AppA.pptx
 
9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptx9780357132302_Langley11e_ch1_LEAP.pptx
9780357132302_Langley11e_ch1_LEAP.pptx
 
krajewski_om12 _01.pptx
krajewski_om12 _01.pptxkrajewski_om12 _01.pptx
krajewski_om12 _01.pptx
 
CapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptxCapsimOpsIntroPPT.Marino.pptx
CapsimOpsIntroPPT.Marino.pptx
 
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptxProject Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
 
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptxProject Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
 
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
 
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
 
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
 
1-23-19 Agenda.pptx
1-23-19 Agenda.pptx1-23-19 Agenda.pptx
1-23-19 Agenda.pptx
 
EDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptxEDF 8289 Marino PPT.pptx
EDF 8289 Marino PPT.pptx
 
Agenda January 20th 2016.pptx
Agenda January 20th 2016.pptxAgenda January 20th 2016.pptx
Agenda January 20th 2016.pptx
 
BITM3730 8-29.pptx
BITM3730 8-29.pptxBITM3730 8-29.pptx
BITM3730 8-29.pptx
 
BITM3730 8-30.pptx
BITM3730 8-30.pptxBITM3730 8-30.pptx
BITM3730 8-30.pptx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Dr. Mazin Mohamed alkathiri
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...Pooja Nehwal
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

IT 150 Professor Marino's Class Covers Cybersecurity, Research Skills

  • 1. IT 150 Info Tech for Business Professor Marino
  • 2. Today’s Agenda • Explain PowerPoint Assignment • Assign Thesis Topics • Introduce MU Library Resources and Google Scholar • Introduce MLA Format Resources • Introduce Scholarly Sources HW Assignments • Introduce Word Equation Editor HW Assignment • Explain Extra Credit Opportunities
  • 3. PowerPoint Assignment • Pick a thesis statement • Research your topic • Create a PowerPoint based on the skills taught in class and in accordance with rubric that was handed out in class on 11/7/16 • Be sure to adhere to syllabus academic honesty policies • Use skills taught today to help create a well researched PowerPoint
  • 4. Thesis Topics •Access Thesis Topics •Review Topics •Pick Your Topic •Let Me Know Your Topic
  • 5. CRAAP Test • http://guides.monmouth.edu/c.php?g=63392&p=2705358 • Currency – source should be less than 5 years old for your papers • Relevance – does it match your topic? If so, use it • Authority – who wrote it? Are they published often? • Accuracy – is the info you found true? • Purpose – you want to choose unbiased/non opinion sources • Feel free to watch the video at the link provided
  • 6. Our Library Guide • http://guides.monmouth.edu/IT100 • Use Journal Articles Tab • Click the box next to Scholarly and Peer Reviewed • Enter your search terms and click Search • Select Last 5 Years under Publication Date • Click on a result and click PDF Full Text [if this option doesn’t exist for that result move on to another source] • If you’ve read it and feel it helps your paper click Cite; scroll down and copy the MLA citation
  • 7. Writing Your Paper • http://www.monmouth.edu/academics/css/writing/ResourcesForWriters.aspx • The Writing Process: Writing a Thesis • Research and Documentation: All MLA Topics and Research Tips • These tips will help you developing your PPT and also if you decide to do the extra credit paper
  • 8. Google Scholar • https://scholar.google.com/ • Only provides scholarly sources for your search terms • May not be able to open all sources [try to stick with sources that list PDF or HTML on the right hand side] • Click Cite and highlight the MLA citation if you use the source for your paper
  • 9. Helpful Hints • Download all sources you seem interested in to read and decide if they are a good source • Copy citations for all sources you download. As you delete the sources you decide not to use, delete their citation • Pick sources that match your opinion • Start your research and writing soon
  • 10. MLA Info – Reviewing MLA Style • Checklist for formatting a default Word document to match the MLA style: • Double-space the entire document • Remove paragraph spacing from the entire document • Increase the font size for the entire document to 12 points • Indent the first line of each body paragraph .5 inch from the left margin • Add the page number (preceded by your last name) in the upper-right corner of each page (you can omit this from the first page)
  • 11. MLA Info – Creating Citations and a Bibliography • Steps for finalizing a bibliography to match MLA guidelines for a Works Cited list: 1. Format the “Works Cited” heading to match the formatting of the rest of the text in the document 2. Center the “Works Cited” heading. 3. Double-space the entire works cited list, including the heading, and remove extra space after the paragraphs 4. Change the font size for the entire works cited list to 12 points
  • 12. MLA Info – Citation Rules
  • 13. MLA Info – Additional Resources • MLA Formatting and Style Guide: https://owl.english.purdue.edu/owl/resource/747/01/ • Create a Cross Reference: https://support.office.com/en- us/article/Create-a-cross-reference-300b208c-e45a-487a-880b- a02767d9774b • Create a Table of Figures: https://support.office.com/en- us/article/Create-a-table-of-figures-c5ea59c5-487c-4fb2-bd48- e34dd57f0ec1
  • 14. How to Conduct Scholarly Research • Source Evaluations: • Google Scholar OK • Wikipedia NOT OK • Evaluation Test - http://guides.monmouth.edu/c.php?g=63392&p=2705358 • Library and Other Resources: • http://guides.monmouth.edu/IT100 • http://www.monmouth.edu/academics/css/writing/ResourcesFor Writers.aspx • http://library.monmouth.edu/main/
  • 15. Scholarly Sources Homework • For Scholarly Sources 1 & 2 you are required to find two scholarly sources to use for your PowerPoint and answer questions. Remember to include the citation for the articles. • Use the process I just went through with you • 1 source for each assignment. DON’T SUBMIT BOTH SOURCES IN ONE FILE. • In theory you will use these 2 scholarly sources for your PowerPoint.
  • 16. Word Equation Editor HW Assignment • Insert Tab • Equation • Insert New Equation • Use Symbols and Structures to replicate the formulas • You may use Ink Equation
  • 17. Extra Credit Opportunities for IT 150 •Write research paper based on your thesis topic [Worth 100 Points] scored by the associated rubric – Due 11/30/16 •Present PowerPoint after you complete Final Exam [Worth 100 Points] scored by the associated rubric
  • 19. PPT Concepts for PPT Assignment •We will cover Chs 1 & 4 in class •But Chs 2 & 3 have helpful concepts for the assignment
  • 20. PPT 2 and 3 Concepts for PPT Presentation •Chapter 2: • Change Themes and Variants [Skill 2] • Change Font Colors and Effects [Skill 3] •Chapter 3: • Insert Video Files [Skill 9] • Apply Video Styles and Adjust Videos [Skill 10]
  • 21. Effective PowerPoint Presentations • One theme per slide • Rehearse • Know your purpose and audience • Exhibit your Passion • Build on your content • Know Your Topic to a Strong Degree • Keep eye contact • Use facts • Use readable font • Don’t read from your slides • Think about questions you may be asked ahead of time
  • 23. Identity Theft and Hackers Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? Cybercrime White-hat hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT launch a denial of service (DoS) attack on your computer. All of the following were top cybercrimes reported to the IC3 EXCEPT theft of services. • Cybercrime, Cybercriminals, Common types of cybercrimes • Most financially damaging cybercrime for individuals is identity theft • Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Found half of e- mail users have opened spam • Types of hackers: White-hat (ethical hackers), Black-hat hackers, Grey-hat hackers • Packet analyzer (sniffer) • Keylogger
  • 24. Hacking • Trojan horses—Appear to be useful • Rootkits • Zombies • Denial-of-Service • Legitimate users are denied access to a computer system • System shuts down • DDoS • A rootkit allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. • A DDoS attack floods a computer with requests until it shuts down and refuses to answer any requests for information. • A zombie is another person's computer controlled by a hacker. True
  • 25. Viruses • Not limited to computers • Widespread cybercrime: Spreading viruses • Main purpose and Secondary objectives • Sources of virus infection • Classified by methods used to avoid detection: Polymorphic viruses, Multipartite viruses, Stealth viruses • Creating and distributing computer viruses is one of the most widespread types of cybercrimes. • All of the following activities may infect your computer with a virus EXCEPT printing a document. • Which of the following classifications of viruses can change its own code to avoid detection? Polymorphic • With regard to computer protection, quarantining is defined as placing a found virus in a secure area on the hard drive. • A(n) virus signature is the portion of virus code that is unique to a particular computer virus.
  • 26. Viruses cont. • Boot-sector viruses are often transmitted by a flash drive left in a USB port. • A time bomb is a virus that is triggered on a certain date. • A macro virus is a virus that is attached to documents such as Word or Excel files. • Currently, there are no antivirus programs for mobile devices. False • A worm does NOT require human interaction to spread to other computers. True
  • 27. Malware and SPAM • Malware has malicious intent • Adware displays sponsored advertisements • Spyware is an unwanted piggy-back program • Transmits information • Tracking cookies • Keystroke logger • Many antispyware packages are available • Spam—junk e-mail • Tactics to minimize spam • Spyware is a program that gathers information about your surfing habits without your knowledge.
  • 28. Cookies • Cookies are small text files received when you visit a website • Help companies determine the effectiveness of their marketing • Do not search drive for personal information • May invade your privacy • Pose no security threat • Which of the following statements about cookies is NOT true? Cookies obtain your personal information by searching your hard drive. • CAPTCHA is the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website.
  • 29. Zero Days Video – Watch at Home
  • 30. The Wi-Fi Struggle: Wendy’s vs. Dunkin Donuts WENDY’s • Free Wi-Fi • User Agreement • Privacy Policy DUNKIN DONUTS • Free Wi-Fi • User Agreement • Privacy Policy
  • 31. The Wi-Fi Struggle: Wendy’s vs. Dunkin Donuts • On paper Wendy’s and Dunkin Donuts both offer Free Wi-Fi, but one is a safer Wi- Fi option than the other • Consider accessing the Wi-Fi in the general public, not on campus (ie the store in your town) • Teams will be split among the class with two captains • Team captains will choose either Wendy’s or Dunkin Donuts • Each team will research their company’s Wi-Fi information to determine: a) If it is a safe bet to use their company’s Wi-Fi and b) If it is a safe bet to use the other team’s company’s Wi-Fi • There is a right answer; for one very important reason
  • 32. Homework • Social Issue 5 Due December 12th at 8:00AM • Security Exam on December 12th, STUDY!!! • Check Twitter • Check eCampus
  • 34. Review from Last Class • Hackers go after the Elderly due to their financial stability and Young adults due to their available credit • Google Images is a stronger tool than Google Search in viewing your digital footprint • Mobile devices are at the same risk as your personal computers • Using Wi-Fi is risky; look for Wi-Fi with a password to make it a little more secure
  • 35. Zero Days Video Discussion •What are Zero Days? • Vulnerabilities in the code that can be hacked •What are Bug Bounties? • Payment for identifying a zero day in the software/code •You can either fix a Zero Day, pay someone to fix it, or get hacked
  • 36. Protect Yourself • Protecting yourself on your personal computer and mobile devices is a primary concern • Your data [whether personal like bank account or professional like work documents] can be useful resources to hackers • Use strategies to prevent issues and continue to be educated about cybersecurity
  • 37. Encrypt Me • Types of Encryption • Wi-Fi Encryption • Data Encryption • Web Encryption
  • 38. Encrypt Me – Defining Encryption • A methodology using algorithms to modify data, text, code, etc. to prevent the opportunity of hacking and misuse of information • Courses such as Cryptography devote a substantial amount of time towards this process • Encryption can exist as: Wi-Fi Encryption, Data Encryption, and Web Encryption • Encryption can be one of the most secure ways to protect your computer and mobile device
  • 39. Encrypt Me – Wi-Fi Encryption • Wi-Fi Encryption is the encryption method you take to protect outside access to your network [whether at home or not] • Three common types are WEP, WPA, WPA2 • Wired Equivalent Privacy can be 64, 128, or 256 bit encryptions; commonly used, but easily hacked • Wi-Fi Protected Access is 256 bit encryption; created due to the vulnerabilities of WEP • Wi-Fi Protected Access II is an updated version of WPA and the most secure encryption tool for Wi-Fi
  • 40. Encrypt Me – Data Encryption • Focuses heavily on making text or information sent via email or other online transmit difficult to decipher [or read] • Substitution ciphers are the most common tool for this task
  • 41. Encrypt Me – Web Encryption • Look for the “lock” – it means the most secure websites • Digital Certificates • Like cookies; gives access based on prior approval/visit [can expire] • SSL Encryption • Most common web encryption tool
  • 42. Encrypt Me – Web Encryption of Social Media • Twitter says: • Secure Connection • The connection to this site is encrypted and authenticated using a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (AES_128_GCM). • Instagram says: • Secure Connection • The connection to this site is encrypted and authenticated using a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA), and a strong cipher (CHACHA20_POLY1305). • Your results may vary. A similar protocol, key exchange, and cipher are perfectly fine, but often each site will have its own cipher.
  • 43. Phishing and Pharming • Phishing • Luring people into revealing information • Pharming • Malicious code planted on your computer to gather information • Guidelines to avoid schemes • When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as pharming.
  • 44. Scareware and Firewalls • Type of malware • Attempts to convince you something is wrong … and to pay money to fix it • Firewall—hardware or software • Windows and OS X include firewalls • Security suites include firewall software • You can block logical ports from invaders and make your computer invisible to others on the Internet by installing a firewall. • Configuring a firewall to ignore all incoming packets that request access to a specific port is known as logical port blocking.
  • 45. Preventing Viruses • Antivirus software • Detects viruses and protects your computer. Like Symantec, Kaspersky, AVG, McAfee • Need strong passwords. Password strength tests • Operating systems have built-in password protection • Biometrics: Fingerprint, Iris pattern in eye, Voice authentication, Face pattern recognition • Provide a high level of security • Rules for creating passwords include all of the following EXCEPT use a dictionary to find a lengthy word that is easy to remember.
  • 46. Protecting Data • Protect your personal Information. Backups are copies of data • Backup your data from: Unauthorized access, Tampering, Destruction • Power surges • Surge protector • Replace every 2–3 years • Use with all devices that have solid- state components • Social engineering is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
  • 47. Preventing Theft • Four main security concerns with mobile devices: • Keeping them from being stolen • Keeping data secure in case they are stolen • Finding a device if it is stolen • Remotely recovering and wiping data off a stolen device
  • 48. Security Exam on Monday • Worth 110 Points • Team gets 10 Extra Credit Points • Will start with 4 questions on eCampus based on other content and video [worth 10 points] • 25 questions on MyITLab based on the Yellow content in 11-22&29 Agenda [worth 100 points]
  • 49. Homework • Social Issue 5 Due December 12th at 8:00AM • Security Exam on December 12th, STUDY!!! • Check Twitter • Check eCampus
  • 50. IT 150-01 Information Technology Final Exam Professor Marino
  • 52. 2nd Secret of Life People Change People
  • 53. 3rd Secret of Life Don’t be afraid to make a fool out of yourself for a good cause
  • 54. Today’s Agenda: Monday, December 19th, 2016 • Complete MyITLab Final Exam • You may leave once you finish the entire Final Exam; unless you’re doing the extra credit presentation

Editor's Notes

  1. Cybercrime is any criminal action perpetrated primarily through the use of a computer. Cybercriminals are individuals who use computers, networks, and the Internet to perpetrate crime. Four common categories of complaints received were FBI-related scams, identity theft, nonauction/non-delivery of merchandise, and advance fee fraud. Although the top four complaints all relate to some type of fraud, other complaints received involved equally serious matters such as computer intrusions—hacking—child pornography, and blackmail. Many victims of identity theft spend months, or even years, trying to repair their credit and eliminate fraudulent debts. Identity theft occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account number, and credit card information and runs up debts in your name. The nefarious acts cover a wide range of activities. A survey by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) found that half of e-mail users in North America and Europe have opened spam. A hacker is most commonly defined as anyone who unlawfully breaks into a computer system. Hackers may be identified as: White-hat hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses. Black-hat hackers break into systems to destroy information or for illegal gain. Grey-hat hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches. A packet analyzer (sniffer) is a program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet. A keylogger is a program that captures all keystrokes made on a computer.
  2. A Trojan horse is a program that appears to be something useful or desirable, but does something malicious in the background without your knowledge. Backdoor programs and rootkits are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. A computer that a hacker controls is referred to as a zombie. Zombies are often used to launch denial-of-service attacks on other computers. In a denial-of-service attack, legitimate users are denied access to a system because a hacker is repeatedly making requests of that system through a computer the hacker has taken over as a zombie. A computer can handle only a certain number of requests for information at one time. When it is flooded with requests, it shuts down and refuses to answer any requests for information, even if the requests are from a legitimate user. A distributed denial-of-service (DDoS) attack, launches DoS attacks from more than one zombie at the same time.
  3. Viruses are not limited to computers; smartphones, tablet computers, and other devices can be infected. Creating and disseminating viruses are two of the most widespread types of cybercrimes. A virus’s main purpose is to replicate itself and copy its code into as many other host files as possible. The majority of viruses have secondary objectives or side effects. Downloading and running a file that’s attached to the e-mail are common ways to infect your computer. Viruses can be classified by the methods they take to avoid detection: A polymorphic virus changes its code to avoid detection. Most polymorphic viruses infect a particular type of file. A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. Stealth viruses temporarily erase their code from the files where they reside and hide in the active memory of the computer.
  4. Malware is software that has a malicious intent Adware displays unsponsored advertisements Spyware is an unwanted program that downloads with other software from the Internet and runs in the background. Spyware transmits information about you. Many spyware programs use tracking cookies. A keystroke logger program monitors keystrokes. Other anti-spyware programs are easy to install and update. Spam is unwanted or junk e-mail. There are several ways to help avoid spam: Create a free e-mail address Spam filters Buy third-party programs Reclassify e-mails that have been misidentified as spam
  5. Cookies are small text files that some websites automatically store on your hard drive when you visit them. Companies use this information to determine the traffic flowing through their website and the effectiveness of their marketing strategy. Cookies do not go through your hard drive in search of personal information. The main concern is that advertisers will use this information indiscriminately, thus invading your privacy. Cookies pose no security threat because it is virtually impossible to hide a virus or malicious software program in a cookie.
  6. Phishing lures Internet users to reveal personal information. Pharming occurs when malicious code is planted on your computer. These guidelines help to avoid such schemes: Never reply directly to any e-mail asking for personal information. Don’t click on a link in an e-mail. Check with the company asking for information. Never give personal information over the Internet unless you know the site is secure. Use phishing filters. Use Internet security software that’s constantly being updated.
  7. Scareware is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware. You’re then directed to a website where you can buy fake removal or antivirus tools that provide little or no value. Scareware is a social engineering technique because it uses people’s fear of computer viruses to convince them to part with their money. A firewall is a software program or hardware device designed to protect computers from hackers. Both Windows and OS X include reliable firewalls. The Windows Action Center is a good source of information about the security settings on your computer, including the status of your firewall. Security suites such as Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security Suite also include firewall software.
  8. Antivirus software is specifically designed to detect viruses and protect your computer and files from harm. Symantec, Kaspersky, AVG, and McAfee are among the companies that offer highly rated antivirus software packages. Antivirus protection is also included in comprehensive Internet security packages such as Norton Internet Security, Kaspersky Internet Security, and McAfee Total Protection. These software packages also help protect you from threats other than computer viruses. Strong passwords are difficult for someone to guess. There are many password generators available for free, such as the Strong Password Generator. You can use online password strength testers, such as the Password Meter, to evaluate your passwords. To restrict access to your computer, Windows, OS X, and most other operating systems have built-in password (or passcode) protection for files as well as the entire desktop. A biometric authentication device is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it to a digital code. Because no two people have the same biometric characteristics, these devices provide a high level of security. Other biometric devices, including voice authentication and facial recognition systems, are now widely offered in notebook computers, tablets, and smartphones.
  9. The data on your computer faces three major threats: Unauthorized access Tampering Destruction Backups Copies of files that you can use to replace the originals if they’re lost or damaged Power surges occur when an electrical current is supplied in excess of normal voltage. Old or faulty wiring, downed power lines, malfunctions at electric company substations, and lightning strikes can all cause power surges. A surge protector protects your computer. Replace surge protectors every 2–3 years or after a major surge. All electronic devices that have solid-state components, such as TVs, stereos, printers, and cell phones should be connected to a surge protector.
  10. You have four main security concerns with mobile devices: Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device
  11. https://www.youtube.com/watch?v=iwiEm96nqcQ
  12. https://www.youtube.com/watch?v=WSdAdqRoYSw