Name Kayley Cartwright Class time: 12PM
KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: “A Gift of Fire”
Sections read: 5.1,5.2,5.3
1. (Knowledge)Tell three interesting elements of this chapter:
a. In the early days of computing, a hacker was a creative programmer who wrote very elegant or clever programs. A “good hack” was an especially clever piece of code (Baase p.254).
b. Beginning roughly in the mid-1990s, the intricate interconnectedness of the Web and the increased use of the Internet for e-mail and other communications, for sensitive information, and for economic transactions made hacking more dangerous and damaging – and more attractive to criminal gangs (Baase p.257).
c. In several major thefts of data from retailers, the databases included unencrypted credit-card numbers, and other security numbers read from the magnetic strips on the cards (Baase p.278).
2. (Comprehension) Summarize what is being discussed within this chapter?
With the increase of the technology and the use of the Internet there is also an increased risk of crime. The Internet allow us to make purchases, connect with people from all over the world, and do many other interesting things. When we make purchases on the Internet we share our personal information and credit card information. The same when we connect with family and friends we share personal information and personal photos. With this information out there it is easier for hackers and criminals to access it and assume our identity. Many sites have created and added many new features to alert customers when the site believes that fraud and identity theft might have occurred.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
“When a thief steals a credit-card number, we can get a new account with a new number, but if a hacker gets a copy of the file with our digitalized thumbprint or retina scan, we cannot get a new one. Identity theft might become easier to prevent, but much worse for a victim when it occurs” (Baase p.282). The latest technology that has become convenient and easy to use is cloud computing. Cloud computing allows its users to share their information, data, music and photos to many devices that are hooked up to the clouds and have access to Wi-Fi. Although it becomes easier to share our information from many computers, phones, and tablets there is also an increase in the worry of data theft. This article provides more information about cloud computing and theft risks: http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
“Financial institutions have added procedures to authenticate customers, making it more difficult for a thief armed with a stolen account number and other commonly used identifying information to withdraw money from an account. Some financial institutions store an identification number for the customer’s home computer or laptop and then verify the machine used when the customer logs on (Baase p.279).” These precautions are very important when it comes to online banking and paying bills on the Internet with a credit card. Although many people think that only using their password will keep them safe on the Internet that is not true especially if the password is very simple. Many people connect identity theft with the Internet but the same theft of a bank account can happen with an online account or by retrieving the account number from a check or paystub. Many precautions need to be made whether we use the Internet or paper accounts.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
“If you send a change-of-address notification to your credit-card company, the company will probably send a conformation to both your old and new addresses. Thieves who plan to use a stolen credit-card number for a long time do not want the owner of the card to see fraudulent charges on the bill and close the account (Baase p.279).” Thieves are creative when it comes to carrying out their plan of attack. Many companies know this and have created many new precautions and ways to alert customers of many possible fraudulent charges. Crime occurs in many offenses on the Internet the main crimes that come to mind are identity theft and fraudulent charges.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
Crime on the Internet is a relevant topic in today’s society. Technology is always changing and evolving whether it be sharing information on a cloud of using a new social networking site there are many risks that users need to be aware of. After reading chapter 5 I will be making sure that all may accounts and their information remain safe and secure.
References
Baase, Sara. A Gift of Fire. 3rd. Upper Saddle River, NJ: Pearson Prentice Hall, 2008. 1-34. Print.
http://www.nbcbayarea.com/blogs/press-here/The-Future-of-Cloud-Computing-5-Rainbows-5-Thunderheads-131515353.html
No comments:
Post a Comment