Spyware</li></li></ul><li>The good<br />Always run up to date definitions for your antivirus and spyware software.<br /><ul><li>Make sure your Firewall is turned on. Consider purchasing a Firewall protection at the router too.
Use safe and secure sites when making online purchases. Look for the https compared to just http. The s at the end provides some security.
Use safe and secure passwords and usernames. Do not give out birthday, name, and other personal information on the internet.
Always turn off your computer at the end of the night.</li></li></ul><li>The Bad<br />According to Wikipedia on electronic spam, “In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.”9 (wikipedia, 2011)<br />http://en.wikipedia.org/wiki/Spam_%28electronic%29<br />
The Bad<br />Fox News.com said “BOSTON - Spanish police have arrested three men accused of masterminding one of the biggest computer crimes to date -- infecting more than 13 million PCs with a virus that stole credit card numbers and other data.”(Reuters, 2010)<br />“Mariposa was programed to secretly take control of infected machines, recruiting them as "slaves" in an army known as a "botnet." It would steal login credentials and record every key stroke on an infected computer and send the data to a "command and control center," where the ringleaders stored it.”(Reuters, 2010)<br />http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-network-arrested/ Click on this link to read more.<br />
The Bad<br /><ul><li>Malicious software is a common variation of a virus also known as Malware. There are two types of Malware, worms and Trojan horses. The most notorious worm was Melissa which quickly spread and caused serious harm to millions of computers.
Tech Faq says “The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical “Trojan Horse” that the Ancient Greeks set upon the city of Troy.” (TECH FAQ,2011)
http://www.tech-faq.com/trojan-virus.html</li></li></ul><li>The bad<br />Protect yourself from the bad things such as spam, viruses, and malware by……..<br /><ul><li>Always scan any attachments, downloads, and software. Never open email attachments from unknown sources.
Never start your computer with removable media in the drives.
Install a personal firewall program and consider a firewall at the router too.
Back up your files and set your antivirus program to scan automatically.</li></li></ul><li>The Ugly<br />Phishing is a term used when someone is attempting to acquire your private information such as social security number, bank account number, …etc to conduct fraud. Many times the attempts appear through an email acting like they are your bank or credit card company asking you to verify your information because it might have been compromised. Sometimes these phishing solicitations are over the phone.<br /><ul><li>Never give out any private information via email or over the phone.</li></li></ul><li>The Ugly<br /><ul><li>Spy software known as Spyware is deadly. Spyware can come in different forms from hackers being able to hack and see your desktop to them recording your every key stroke.
Employers are legally allowed to “record” your internet activities. They can see what web site you visited, get copies of emails, and every keystroke.
To protect yourself from Spyware you should not only have antispyware on your computer, but you should get a credit report once a year to monitor possible identity theft.</li></li></ul><li>The Ugly<br />
ReFeRENCES<br />G.Wolfgang. (n.d.). Clint Eastwood [picture]. Retrieved May 14, 2011, from GoneMovie.com: http://www.gonemovies.com/WWW/XsFilms/SnelPlaatjes/GoodBlondie2.asp<br />History Channel Cyber Security Greg Evan Talks Spyware [video]. (n.d.). Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=aH-5kcx_J3A <br />ICA. (n.d.). Retrieved May 15, 2011, from Clint Eastwood [picture]: http://www.ica.org.uk/18793/Film/The-Good-The-Bad-The-Ugly.html<br />Reuters. (2010, March 3). Accused Masterminds of world's Largest Computer Virus Network Arrested. Retrieved May 14, 2011, from Fox News.com: http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-network-arrested/<br />
References<br />Shelly, G.&.(2010). Security Issues, Ethics, and Emerging Technologies in Education. In G.&. Shelly, Integrating Technology and Digital Media in the Classroom (pp.469-516). Boston: Course Technology, Cengage Learning.<br />Spam (electronic). (n.d.). Retrieved May 14, 2011, from Wikipedia: http://en.wikipedia.org/wiki/Spam_%28electronic%29<br />The Good, The Bad & The Ugly [sound clip]. (n.d.). Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=1hYV-JSjpyU<br />Trojan Virus. (n.d.). Retrieved May 15, 2011, from TECH FAQ: http://www.tech-faq.com/trojan-virus.html<br />