Docstoc

chapter2

Document Sample
chapter2 Powered By Docstoc
					Douglas Simpson                                                                      07/21/2005
Introduction To The World Wide Web
IMD101 A
T/R 8:00 AM




What is the new controversy surrounding TIVO?

Janet Jackson’s unveiling of her breast during prime time and the ability of the TiVo device to
record, rewind and pause such unacceptable programming blurps.




CHAPTER 2

1) What is the acceptable use policy (AUP)?
   Acceptable Use Policy (AUP)

   Locate the AUP for your Internet account. Have you ever violated the terms of your
   AUP without realizing it?
   After studying the Comcast AUP, I have been using the service within its guidelines.

   Are there any restrictions you do not understand or to which you object?
   I do not agree that they should have the right to change the policy without notifying its
   users of the change. I also have an issue with the way companies operate concerning the
   Privacy Act. Our legislators passed new laws making it sound like they did us a favor. But our
   privacy is still in the hands of the corporations. They should not be able to sell or share our
   information without our permission. Instead, it is backwards. We have to write the companies
   requesting them to safeguard our private information and trust that they are doing what the
   law requires.

2) Explain how a computer virus, a Trojan horse, and a worm differ from each other.
   A virus is a computer program that is able to replicate itself via files that are moved from one
   computer to another. A Trojan horse is a program that slips into a computer system
   undercover of another program. To be a true Trojan horse, the program must do something
   undocumented that the user would not approve of. A worm is similar to a virus, but depends
   only on active network connections, not downloadable or transferred files.

3) The Melissa virus used an innovative strategy for tricking people into opening e-mail
   attachments. How did Melissa fool users?
   The Melissa Virus was a fast spreading MS Word macro virus. It tricked the recipient into
   opening the attachment by using the subject line “Important Message From <sender>.” The
   message body read, “Here is that document you asked for…don’t show anyone else;-).”
   Melissa used a list.doc that exposed the address book of the recipient to propagate itself. The
   recipient believed it was a message from someone they knew.

4) What is an RTF file?
   RTF stands for Rich Text Format. It is an ASCII text alternative to Word’s usual .doc file
   format.

   Can an RTF file contain a macro virus?
   No. When documents are saved in RTF format, macros cannot be saved.

   Should Microsoft make RTF the default file format for Word? Explain why or why not?
   I do not believe that would be a solution. Word documents have become very popular to use
   in transmitting graphics, photos, and other information. These files are very large when
   converted to RTF format. In addition, we need to create a more responsible user population.
   The more educated we are about viruses and how they work we can all take precautions to
   protect ourselves.

5) Suppose you know and trust someone who sends you a Word file in an e-mail
   attachment. Can you be sure he or she isn’t sending you a file containing a macro virus?
   No you cannot. Most Word documents infected with macro viruses are sent to other users
   unbeknown to the sender. We need to be cautious with all attachments.

6) What is normal.dot?
   It is a Word document template.

   Explain how normal.dot is used to spread macro viruses.
   A virus can be attached to the normal.dot template. Then as a user creates a Word document
   that uses that template, it is sent to another user. Upon receiving the document the new
   systems overwrites the old template. Now the new system is infected also. The virus
   continues to propagate every time this template is used.

7) Explain how HTML-enabled e-mail clients can spread worms without the use of e-mail
   attachments.
   If the messages have content to trigger scripts, they too can be susceptible to malicious
   attacks.

8) Explain why it is difficult for antivirus software to recognize the Klez virus.
   The Klez virus uses a large number of different subject headers, message bodies, and
   attachment names. It is a blended threat spreading via e-mail and open networks.

12) Who should assume responsibility for the online security of home computers?
    If I had to single out one specific group it would be the Internet Service Providers. They are
    the first point of contact with new home users that could be uneducated in the procedures for
    virus protection. However, I believe it has to be a combined effort from all sources. With the
     recent introduction of blended viruses we are getting attacked from all directions. We need
    protection provided from as many sources as possible. At the time of contracting a service
    from a Internet provider, there was mandatory software installation for virus protection, it
    would help limit computer s in the private sector from infection.

13) Which is safer to use online: a check, a credit card, or money order? Explain your
    answer.
    A credit card is the safest form of payment. Using a personal check provides the recipient
    with critical information including your signature. With a credit card purchase you always
    have a line of defense. You can complain to the credit card company to assist with the
    resolution of the matter.

14) If you care about keeping personal data private, what should you do before you enter
    any personal information on a Web page?
    You should always read the site’s Privacy Policy. Be sure to understand how they are going
    to use your information.

15) The Online Personal Privacy Act of 2002 distinguishes two kinds of personally
    identifiable information (PII): sensitive PII and nonsensitive PII. How are these two
    types of PII treated differently under the law? Give seven examples of sensitive PII.
    Examples of nonsensitive PII is name, residence address, birthday or certificate number,
    e-mail address, phone number. The FTC finds that these are allowable because of the
    likelihood of personal contacts. Sensitive PII are defined as specific financial data, health
    data, ethnicity, religious affiliation, sexual orientation, political affiliation, and social
    security number. While PIIs could be awarded up to $200 in civil penalties, the FTC would
    allow a minimum fine of $5,000 in damages for miss-use of SPIIs.

17) According to Internet Fraud Watch, what online activity is responsible for the largest
    number of consumer complaints?
    Online Auctions

18) If you are thinking of participating in an online auction, what four safeguards should
    you look for on the auction site?
    Before participating in an online auction you should do some homework and investigate the
    site. Make sure they post fraud warnings and offer the following: 1) Escrow services for
    expensive items. 2) Feedback areas. 3) Easy-to-follow complaint procedures. 4) A policy for
    removing problem vendors.

19) Visit PayPal and find out how it works. What do you need to set up a PayPal account?
    PayPal is a secure transaction service provider. PayPal is how individuals and businesses
    send and receive money online. In order to obtain an account on PayPal, you will need the
    following: Credit Card, Debit Card or Bank Account. The site requires an email address and
    phone number. You also need to be willing to provide personal information such as name,
    address, and agree to an AUP.

    How many members does it have?
    56 million member accounts in 45 countries. PayPal signs up nearly 68,000 new members
    each day.
20) When can someone be sued for libel?
    When a written or pictorial statement damages a person or an organization.

   Why is it relatively safe to criticize a politician?
   In 1988 the US Supreme Court held that public figures can be publicly ridiculed, even if it
   borders on libel.



21) Is it safe to criticize a person or company in a personal e-mail message to a friend?
    Care should be taken criticizing anyone that is not considered a public figure. If the person or
    company can prove libel and wants to spend the money taking the case to court you could be
    sued.

   Is it safer to make the same comments in a personal phone call?
   No. Someone could be listening and recording the conversation.

   Or a written letter?
   No. It could provide the documented proof.

   How about posting the statements on a Web site if you don’t give out the URL?
   I wouldn’t. There are companies constantly monitoring Web sites for this kind of actions.
   Even if the URL is not given out, there are ways of finding out who and when it was posted.
   Computers leave trails.

22) What is the maximal penalty for making a threat of bodily harm that crosses state
    lines?
    $250,000 fine and five years in jail.

23) What law makes a business liable for harassment in the workplace?
    Title VII of the 1964 Civil Rights Act

   What steps are companies taking to protect themselves against harassment lawsuits?
   Companies have installed pornography filters, e-mail monitors on their servers, and
   employees are subject to more stringent AUPs.

24) What is the legal definition of software piracy?
    Software piracy is the willful reproduction or distribution of one or more copies of a
    computer program that prohibits such reproductions or distributions.

    Do you have to profit from your activities in order to be guilty of software piracy?
    You do not have to profit from piracy in order to be found guilty of the act.

26) When is it legal for a private individual to make a copy of a CD?
    When they legally own the original copy and they intend to use it for their personal use only.
    The Audio Home Recording Act of 1992 protects consumers from lawsuits as long as these
    conditions are met.

    Is it illegal to make copies of audio CDs by using a CD-R drive?
    No. Not as long as they are only used for personal use and you have purchased the original.

27) What is the Recording Industry Association of America, and what is it doing to combat
    the illegal distribution of MP3 files?
    The RIAA is a trade association whose members create, manufacture, or distribute
    approximately 90% of all audio recordings produced in the US. The RIAA is taking
    aggressive steps to curb the illegal sales of pirated music by taking people to court and suing
    them. They are going after big offenders but warns no one is off limits if the are committing
    these crimes.

28) Explain the difference between plagiarism and copyright infringement.
    Copyright violations occur when you reproduce a substantial subset of a written work
    verbatim. Plagiarism is the presentation of the ideas of a published work in one’s own words
    but without proper attribution.

29) Does the first amendment give you the right to download pornography?
    Yes. As long as it falls in the guidelines of lawful material.

   Can your employer legally override your First Amendment rights in its AUP?
   Yes your employer can.

   Can your employer legally monitor all of your online activities?
   Yes. For the employer’s own protection against harassment lawsuits, it can set the standard
   of conduct for its office personnel.

   Can employers censor objectionable Web sites on workplace computers?
   Yes they can. Pornography filters and monitoring e-mail servers is just a couple of ways
   they can try to protect themselves and their employees.

				
DOCUMENT INFO
Shared By:
Categories:
Stats:
views:13
posted:5/14/2010
language:English
pages:5