. http://www.shuilongs.com/cios/cios145secfiv.html


[UAS Logo] U NIVERSITY OF A LASKA
S OUTHEAST break bar
SITKA CAMPUS
CIOS 145
Elaine Craddick-Patt

Assignments Section Five

Security and Ethics

Security Tips | Copyrights and Citings | Ethics | Final Assignment

Security Tips

This section is an introduction to the basic concepts of computer privacy and security. The following is a list of security tips. Choose two that you think you can realistically begin to try to incorporate into your daily computing. Tell the instructor any changes, downloads, precautions or adjustments you have made.
  1. Understand how email viruses can be sent
    Virii(or virusses) can be sent through email. But they cannot be in plain text. Here are the known ways to send virii through email:
    1. With an attached executable. This can only hurt you if you if you execute it. Names will be disguised like Windows96up.exe or Freestuff.exe.
    2. As an HTML mail-message, linking to a gif/jpeg file, which has a virus in it. Text-only mail-readers will not be hurt by this.
    3. Mail with an attached Word/Excel file. This can only hurt you, if you open it in the corresponding program. It will have a macro in it, that actually has a virus.
  2. Choose a Secure Password
    Try to choose a unique, secure password for everything that you do. Follow these guidelines:
    1. Choose a long password of at least 6-8 characters.
    2. Use at least one letter, one number and one punctuation symbol.
    3. Use mixed case characters (i.e., PaSsWORd).
    4. Never use any word found in any dictionary.
    5. Don't use any information which someone could readily obtain about you (i.e., your name, company, phone number, birthday, etc.).
    6. Don't use the same password for your e-mail or Internet account.
    7. If you write your password down keep in it a safe place. (You'd be amazed how many people keep their passwords on post-it notes by their computer).
  3. Use an Anti-Virus Program
  4. Consider Downloading and Using a Firewall
  5. Always Keep Current with Security Issues

Copyrights and Citings


Ethics


If you are interested in pursuing more about privacy and security, try these sites:

Final Assignment

In a single page summarize your thoughts about whether or not the Internet will ever be regulated and how. That is, will the contents placed on the Web ever truly be limited and controlled?

email your answers to: ecpatt@ptialaska.netThe Facilitator
ecpatt@ptialaska.net


Back a page Class Menu Up to the top of this page Next section
[blue bar]

Internet Concepts and Applications
Assignments : Cyberspace | Email | World Wide Web | Security and Ethics | Feedback

UAS-S Classroom Menu
The Enhanced Java and Frames Classroom
CIOS: 145: Internet Concepts and Applications
CIOS: 171: Web Programming I | 271: Web Programming II
CIOS: S293: Advanced Internet | F246: Advanced Internet
CIOS: 153: Web Publishing Concepts/Applications | 255: Web Publishing Concepts/Applications/HTML II
Continuing Education Workshops: CE-Web Page Making

Shui Long's Cavern
Search Engines | CAVERN MAIN PAGE | Weekly News
What Is The Cavern? | Technical Notes | The Challenge | The Reward | Communication | Who Is Shui Long?
Eclectic InterLinks | Homepage InterChange | Knowledge | Library | The Metzler Gallery | Power Navigating
CAVERN INDEX | JAVA CAVERN


SLC Shui Long's Cavern copyright Shui Long's Cavern copyright

This website is maintained by Shui Long, and was
[blue bar]

counter