Unit 1 Competency 2 - Demonstrate responsible use of technology.

Suggested Objective a: Identify Techniques to Prevent and Combat Computer Viruses, Worms, Trojan Horses, Spoofing, Identity Theft, and Unauthorized Computer Access

 Computer Virus Spreads to Humans

As a computer user, it is important that you do everything you can to prevent computer viruses and other bad "software" from infecting your computer.  There are many people who create viruses, worms, and trojan horses just to see if they "can do it."  Others do create these things for a mean or illegal intent like identity theft.  Let's investigate ways to protect yourself and your computer from unauthorized access.

How to Prevent and Remove Viruses and Other Malware Links to an external site. - this website from Microsoft explains what a computer virus, Trojan horse and worm are; how to recognize symptoms of these items; and what to do if your computer is infected.  Please click the link for this site and read the posted information.  Pay careful attention and take notes as necessary.

Antivirus Protection and How to Avoid Viruses Links to an external site. - this is another Microsoft site with great information.  Take a look.

Spoofing is when you pretend to be someone you are not.  According to Wise Geek Links to an external site., spoofing includes the use of caller ID, email, and URLs (Uniform Resource Locateors).    Click the link Links to an external site.to learn more about spoofing.  It takes many forms, and this site Links to an external site.explains them very well.  Take notes!

Identity theft affects millions of people.  Thieves will generally try to use your identity to obtain goods and services wrongfully.  The FTC Links to an external site.has a website with a short video that provides tips Links to an external site.for protecting your identity.  Click the link Links to an external site.to visit the site and view the video.

Consumer.gov Links to an external site.explains what identity theft is and why it is important for you to care about this crime.  It further explains what a thief can do with your personal information.  Click the link Links to an external site.to visit the Consumer.gov site Links to an external site.and read the information and watch the short video.

Computer Hope Links to an external site.explains that unauthorized acces is "gaining access to a website, a software program, a server, or some other type of system usually require a password Links to an external site. and username Links to an external site.. If the username or password entered is incorrect, an Unauthorized Access message is shown. This means the user attempted to access the system and the authorization (username or password) was not valid and access was not granted."  Copied from http://www.computerhope.com/jargon/u/unauacce.htm Links to an external site. on August 25, 2014.

Computer Hope provides information for How to Prevent Unauthorized Computer Access Links to an external site..  Click the link Links to an external site.to view information to protect yourself and your computer.  Steps include keeping patches and updates current and having good passwords.  Learn more by reading the article Links to an external site..

Animationmovie on Computer Viruses, Worms, and Other Dangers in the Internet Links to an external site.

Difference between Viruses, Worms, and Trojans Links to an external site.

Computer Basics:  Protecting Your Computer Links to an external site.

 

Suggested Objective b: Discuss Ways Software Manufacturers Protect Against Software Piracy

 P - Is for Piracy

 

Software piracy is the obtaining of computer software illegally.  This costs money and ethically wrong.  Let's look at what software piracy is and ways to prevent it.

Four Steps to Stop Software Piracy at Your Company Links to an external site. - this article Links to an external site.is a little dated.  However, the four steps mentioned are still very relevant in today's world.  Read closely and make notes of the steps and other important information.

 

Software Piracy by David Stone Links to an external site. in Urbana, Illinois, provides an introduction to software piracy.  He provides issues regarding software piracy and ways to deal with or minimize piracy.  Within his writing are links to provide for information for Safeguarding Your Technology:  Practical Guidelines for Electronic Education Information Security, Acceptable Use Policy, Computer Crime Squard, and more. 

 

Tips to Protect Your Software from Piracy Links to an external site.

 Software Piracy - Computer Security Tips - NAPS - TV Links to an external site.

 

Suggested Objective c:  Define Encryption and Explain Its Relevancy to Technology Systems

 Computer Security

What is encryption?  According to Microsoft, it "is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it." Copied from http://windows.microsoft.com/en-us/windows/what-is-encryption#1TC=windows-7 Links to an external site.on August 26, 2014.

How Encryption Works Links to an external site. is an article from How Stuff Works Links to an external site..  It details what encryption is and how it works.  Click the link to view the article and note the importance of using encryption for information.  There is a video to view as well to watch and understanding.

What Is Encryption? Links to an external site. from McAfee Links to an external site., the Internet security software company, explains the importance of using encryption software to protect identity.  The site provides tips for looking for the lock symbol and checking privacy settings.  Even some of the social media sites have encryption protection available.

Finally, Teach-ICT Links to an external site. relates encryption to technology.  An explanation is given for why we do not use encryption all the time. 

What Is Encryption? Links to an external site.

Computer and Internet Help:  What Is an Encryption? Links to an external site.