UIT11e Ch02 PPT
UIT11e Ch02 PPT
UIT11e Ch02 PPT
Chapter 2
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter 2 Topics
2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, E-Commerce,
& Social Networking
2.6 The Intrusive Internet: Snooping, Spamming, Spoofing, Phishing, Pharming, Cookies, & Spyware
2
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 2A: The Internet & the Web
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.1 Connecting to
Using Information Technology, 11e
the Internet
Narrowband, Broadband,
& Access Providers
5
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
However you connect to the Internet, the bandwidth will determine the speed
of your connection.
6
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Physical connection to Internet—wired or wireless?
• Telephone [dial-up] modem
• High-speed phone line—DSL, T1/T3
Using Information Technology, 11e
• Cable modem
• Wireless—satellite and other through-the-air links
7
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Data Transmission Speeds
• Originally measured in bits per second (bps)
• 8 bits are needed to send one character, such as A or a
Using Information Technology, 11e
8
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Narrowband (Dial-Up Modem): Low speed but inexpensive
• Telephone line = narrowband, or low bandwidth, low speed
• Dial-up connection—use of telephone modem to connect to Internet
(used mostly in rural areas on POTS, or plain old telephone system)
Using Information Technology, 11e
• Telephone Modems
• Can be either internal or external
• Maximum speed of 56 Kbps
• Most ISPs offer local access numbers
9
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Telephone (Dial-Up) Modem
Using Information Technology, 11e
Panel 2.3
Page 55
10
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
High-Speed Phone Lines
• Is always on
• Need to live no farther than 4.5 miles from phone company switching office
• Not always available in rural areas
• T1 line—very expensive
• Traditional trunk line, fiber optic or copper; carries 24 normal telephone
circuits
• Transmission rate of 1.5 ̶ 6 Mbps (T3 = 6 – 47 Mbps)
• The “last mile” can still be a problem
• Generally used by large organizations 11
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
High-Speed Phone Lines
• Cable modem
• TV cable system with Internet connection; company usually supplies cable
modem
• Is always on
Using Information Technology, 11e
• Receives data at up to
100 Mbps; sends at
about 2-8 Mbps
12
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Basic DSL/Cable-PC system
Using Information Technology, 11e
Panel 2.4
Page 57
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Satellite Wireless Connections
14
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Other Wireless: Wi-Fi, 3G, & 4G
• Typically used with laptops and tablets that have Wi-Fi hardware
• 3G = “third generation”; uses existing cellphone system; handles voice, email,
multimedia
• 4G = “fourth generation”; faster than 3G; built specifically for Internet traffic –
but not standard yet
• Both 3G and 4G used mostly in smartphones
15
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Access Providers (ISPs)
16
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.2 How Does the Internet
Using Information Technology, 11e
Work?
17
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• The Internet is basically a huge network that connects
hundreds of thousands of smaller networks.
• Central to this arrangement are client/server networks
Using Information Technology, 11e
Clien
t
18
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Connections: POP & IXPs
(continued)
19
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Connections: Backbone, & Internet2
• Internet Backbone
• High-speed, high-capacity data transmission lines, usually
fiber optic
• Uses the newest technology
Using Information Technology, 11e
20
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
How the Internet works
Using Information Technology, 11e
Panel 2.5
Page 59
21
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Internet Communications: Protocols, Packets,
& IP Addresses
• Handshaking & Authentication: Connecting to your ISP’s point of presence
(POP)
• Handshaking—fastest transmission speed established
• Authentication—correct password & user name
• Protocols
Using Information Technology, 11e
22
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
IP (Internet Protocol) Addresses
24
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
25
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Face of the Web: Browsers, Websites,
& Web Pages
The World Wide Web brought multimedia to the Internet.
• The web and the Internet are not the same; the web is multimedia-based,
and the Internet is not. The Internet is the infrastructure that supports the web.
• A browser is software that gets you to websites and their individual web
Using Information Technology, 11e
pages and displays the content in such a way that the content appears
mostly the same regardless of the computer, operating system, and display
monitor.
Examples = Internet Explorer
Mozilla FireFox
Apple Macintosh’s Safari
Google’s Chrome
Microsoft’s Bing
26
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Website
• The location on a particular computer (server) that has a unique address;
example = www.barnesandnoble.com, www.mcgraw-hill.com
• The website (server) could be anywhere — not necessarily at company
Using Information Technology, 11e
headquarters
• Web Page
• A document on the web that can include text, pictures, sound, and video
• The first page on a website is the Home page
• The Home page contains links to other pages on the website (and often
other websites)
27
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
How the Browser Finds Thing: URLs
• It consists of
• The web protocol, http://
• The domain name of the web server
• The directory name or folder on that server
• The file within the directory, including optional extension
28
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Nuts & Bolts of the Web: HTML &
Hyperlinks
• TCP/IP— As explained (p. 60), general Internet Protocol
• HTTP—Protocol Used to Access World Wide Web
• Hypertext Markup Language (HTML)
Using Information Technology, 11e
29
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Your Browser to Get around the Web
• Web browsers interpret HTML and allow you to move around the
Internet and the web
• Come preinstalled on most PCs, but you can download others
• 5 basic elements
Using Information Technology, 11e
• URL (address)bar
• Menu bar
• Toolbar
• Workspace
• Status bar
(displays current status of the
web age; 100% = fully loaded)
30
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Browser’s Home Page
• The page you see when you open your web
browser
• You can change the Home Page on your browser
Using Information Technology, 11e
31
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Navigation
• History List
• A list of websites you visited since you opened up your browser for this session
• Allows you to easily return to a particular site
Using Information Technology, 11e
• Bookmark
• Allows you to store the URL from a site on your computer so you can find it again
in another browser session
• To save the URL for a site, click on “Favorites” in Internet Explorer, “Bookmarks”
in Mozilla Firefox, or the star icon in the URL address bar in Chrome
32
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Interactivity with a web page
• Click on hyperlinks to transfer to another page
• Click on a radio button to choose an option
• Type text in a text box
Using Information Technology, 11e
33
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Web portals: Starting points for finding information
• A portal is gateway website that offers a broad array of resources and
services, online shopping malls, email support, community forums, stock
quotes, travel info, and links to other categories
Using Information Technology, 11e
34
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Search Services & Search Engines
• Databases of search engines are compiled using software programs called spiders
(crawler, bots, agents)
• Spiders crawl through the World Wide Web
• Follow links from one page to another
• Index the words on that site
• A search never covers the entire web
• Search engines differ in what they cover
35
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Four Web Search Tools
2. Subject Directories
• Created and maintained by human editors, not electronic spiders
• Allow you to search for information by selecting lists of categories or topics
• Example sites are Beaucoup!, LookSmart, Open Directory Project, and
Yahoo! Directory
(continued) 36
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
3. Metasearch Engines
▪ Allows you to search several search engines simultaneously
▪ Examples are Yippy!, Dogpile, Mamma, MetaCrawler, and Webcrawler
4. Specialized Search Engines
Using Information Technology, 11e
▪ Help locate specialized subject matter, such as info on movies, health, jobs
▪ Examples are Career.com. WebMD, Expedia, U.S. Census Bureau
37
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Smart Searching: Three General Strategies
38
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Wikis & Wikipedia
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Multimedia Search Tools
40
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tagging
41
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 2B: The Riches & Risks of Internet Use
Using Information Technology, 11e
42
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.4 Email, Instant
Using Information Technology, 11e
44
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
Page 77
45
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Two ways to send & receive email:
1. Email Program
• Enables you to send email by running email software on your computer that interacts
with an email server at your Internet access provider
• Incoming mail is stored on the server in an electronic mailbox
Using Information Technology, 11e
• Upon access (your ID and password), mail is sent to your software’s inbox
• Examples: Microsoft Outlook, Apple Mail
2. Web-Based Email
• You send and receive messages by interacting via a browser with a website
• Advantage: You can easily send and receive messages while traveling, using any
computer or equipped mobile device
• Examples: Yahoo! Mail and Gmail (Google)
• Disadvantages are ads and email hacking
46
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Using email
Get an email address from your ISP, following this format:
Using Information Technology, 11e
47
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Tips for Using Email
1. Use the address-book feature to
store email addresses
2. Use folders to organize email
Using Information Technology, 11e
48
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Email Attachments
• A copy of a file or document that you send attached to an email to one or
more people
• Recipients must have compatible software to open the attachment; for
Using Information Technology, 11e
example, if they don’t have Excel, they probably can’t read the
spreadsheet you sent them.
• Be careful about opening attachments:
• Many viruses hide in them; scan them with antivirus software
• Know who has sent the attachment before you open it
49
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Netiquette: Appropriate Online Behavior
51
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Discussion Groups
• Mailing Lists:
• One-way (to make announcements) or two-way (for discussions) email subscription lists
• Email discussion groups on special-interest topics, in which all subscribers receive email
messages sent to the group’s email address
Using Information Technology, 11e
• Newsgroups:
• Giant electronic bulletin board for written discussions about specific subjects
• To participate you need a newsreader program
• Message Boards:
• Special-interest discussion groups without newsreaders
• Accessed through a web browser
• A collection of messages on a particular topic is called a thread
52
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
FTP (File Transfer Protocol)
Internet to your PC
• FTP sites offer many free files
• FTP sites may be either public or proprietary
• You can download using your web browser or FTP client
programs, such as Fetch, Cute, FileZilla, and SmartFTP
53
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
2.5 The Online
Using Information Technology, 11e
Gold Mine
Telephony, Multimedia, Webcasting, Blogs,
E-Commerce, & Social Networking
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Telephony: The Internet Telephone
• With no PC, dial a special phone number to packetize your call for
a standard telephone
• Use with a PC that has a sound card, microphone, Internet
connection with modem & ISP, and internet telephone software
such as Skype and Vonage
• Also allows videoconferencing
55
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Multimedia on the Web
(continued) 56
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Animation
• The rapid sequencing of still images to create the appearance of motion
• Used in video games and web images that seem to move, such as banners
• Video & Audio
Using Information Technology, 11e
57
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
The Web Automatically Comes to You
58
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• XML and RSS have led to blogs and blogosphere.
• Blogs (weblogs) are frequently updated sites on the web
intended for public consumption that contain a writer’s
Using Information Technology, 11e
59
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
E-Commerce: B2B, B2C, & C2C
• Web 2.0 refers to the web viewed as a medium in which interactive experience, in
the form of blogs, wikis, forums, social networking, and so on, plays a more
important role than simply accessing information.
• The move toward a more social, collaborative, interactive, and responsive web; has
led to the “social web,” giving rise to:
Using Information Technology, 11e
• Social networking sites: Online communities that allow members to keep track
of friends and share photos, videos, music, stories, and ideas (e.g., Facebook,
LinkedIn).
• Media-sharing sites: Online social networks in which members share media
such as photos, videos, music, ideas (e.g., YouTube, Flicker, Shutterfly).
• Social-network aggregators: Collect content from all of a user’s various social
network profiles into one place, then allow him or her to track friends and share
other social network activities (e.g., Mugshot, Readr). 61
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Web 3.0: Computer-Generated Information
• Two ideas might form the basis for Web 3.0— semantic markup
and a personal browser.
• Semantic markup: Data interchange formats that will allow machines to
understand the meaning—or “semantics”—of information on the web.
• The Web 3.0 browser will probably act as a personal assistant because
every user will have a unique Internet profile based on his or her browsing
history. The more you use the Web, the more your browser learns about
you and the less specific you'll need to be with your questions.
62
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Snooping
• Email is not private
• Corporate management has the
Using Information Technology, 11e
64
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Spam: Electronic Junk Mail
• Unsolicited email that takes up your time.
• Delete it without opening the message.
Using Information Technology, 11e
65
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Spoofing
• Using fake email sender names so the message appears to be from a
different source, so you will trust it.
• If you don’t know the sender, don’t open it.
• Phishing
Using Information Technology, 11e
Phishing examples
Using Information Technology, 11e
https://wiki.library.ucsb.edu/display/SYSPUB/Latest+Phishing+Attempts
67
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cookies
69
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Adware, or pop-up generator, is a
kind of spyware that tracks web
surfing or online buying so that
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Malware
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
How to Reduce Malware Risks
• Download virus protection software, such as McAfee VirusScan ( www.mcafee.com ) or Norton AntiVirus (
www.symantec.com/nav ); then follow instructions for installing it on your machine. (Don’t use antivirus
software from companies you know nothing about.)
• Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after that.
Also scan any new CDs and drives before using them.
• Don’t open, download, or execute any files, email messages, or email attachments if the source is unknown
Using Information Technology, 11e
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Passwords
• Never choose a real word or variations of your or your family’s name, address, phone
number, Social Security number, license plate, or birth date.
• Don’t use passwords that can be easily guessed, such as “12345” or “password.”
• Avoid any word that appears in a dictionary. Instead, mix letters, numbers, and punctuation marks in
an oddball sequence of no fewer than eight characters, such as 2b/orNOT2b% and Alfred!E!
Using Information Technology, 11e
Newman7. Or choose a password that is memorable but shift the position of your fingers on the
keyboard, so that, for instance, TIMBERWOLVES becomes YO,NRTEP;BRD when you move your
fingers one position right. For sensitive sites, such as financial accounts, create long passwords, such
as 15-character passwords.
• Don’t use the same password for multiple sites, so that if someone obtains the password to one
account, that person won’t have access to your entire online life.
• Don’t write passwords on sticky notes or in a notebook or tape them under your keyboard. Don’t carry
the passwords in your wallet. If you have to write down all your passwords, find a safe place to put
the paper, or use a software password manager, such as Kaspersky Password Manager, RoboForm
Everywhere, or Last Pass Premium.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.