Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Https www microsoft com en us digitalliteracy curriculum4 aspx

20/11/2021 Client: muhammad11 Deadline: 2 Day

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 1/23

By Kathy Sole, Ashford University

Learning Objectives

After reading this module, you should be able to

Describe three ways you leave an electronic trail when you go online with your computer or other device.

Module 6 Digital Privacy and Security

Ingram Publishing/Thinkstock

(http://content.thuzelearning.com/books/Sole.2605. 16.2/sections/mod06intro#mod06intro)

Introduction (http://content.thuzelearning.com/books/Sole.2605.

16.2/sections/mod6.1#mod6.1)

6.1 Leaving a Trail on the Web

(http://content.thuzelearning.com/books/Sole.2605. 16.2/sections/mod6.2#mod6.2)

6.2 Remaining Safe and Secure Online

(http://content.thuzelearning.com/books/Sole.2605. 16.2/sections/mod6.3#mod6.3)

6.3 Other Actions You Can Take to Protect

Your Privacy

(http://content.thuzelearning.com/books/Sole.2605. 16.2/sections/mod06summary#mod06summary)

Summary & Resources

https://content.ashford.edu/books/Sole.2605.16.2/sections/mod06intro#mod06intro
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod6.1#mod6.1
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod6.2#mod6.2
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod6.3#mod6.3
https://content.ashford.edu/books/Sole.2605.16.2/sections/mod06summary#mod06summary
1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 2/23

Name four types of websites of which you should be especially cautious online and explain at least four ways you can minimize your risks on them. Explain the primary types of security software you should have installed on your computer to protect yourself and your data. Identify steps you can take to protect your privacy, safety, and security when using a shared computer and receiving spam.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 3/23

Patrick Lux/Stringer/Getty Images News

Ill-intentioned computer hackers work to steal others’ personal, account, and credit card information, so it’s important to protect yourself by taking the simple precautions outlined in this module.

Introduction: Understanding Online Bene�its and Risks

Computer technology allows us to instantaneously touch base with family and friends, hear their voices, and even see their faces when they are hundreds or thousands of miles away. We have the entire world’s library of information at our �ingertips, and we can earn a college degree without moving away from home or spending hours traveling to and from a classroom. Unfortunately, there is a dark side to this technology, as well. The Internet has been used to spew hate speech, display horri�ic images of death and terror, and allow criminals opportunities to take advantage of well- meaning people.

At 24, Maddie is one of the younger students at Ashford. She grew up with computers and has used them all her life. From the LeapPad educational toys her parents bought her when she was a toddler, to the DVD player she and her siblings used to watch movies in the backseat of the car, to the iPod she used as a teenager to listen to music, Maddie has always used electronic devices for entertainment. She does not think much about the computers she has around her; they are an everyday part of her life. However, because she takes them for granted, she is not always aware of online dangers. Without realizing it, she sometimes behaves in ways that make her vulnerable to having her personal information captured and perhaps having her identity stolen, her bank account emptied, and her credit ruined.

While you may not be able to protect yourself from every crime, you don’t have to make it easy for thieves to take advantage of you. It’s similar to how you can’t be 100% sure your car will not be stolen, but you should avoid leaving the car unlocked with keys in the ignition and shopping bags on the front seat. Don’t make it easy for thieves to steal information from your computer or your other digital devices, either. In this module, we discuss how you leave information about yourself online. We will also give you some simple precautions you can take to help ensure you are not the next cybercrime victim.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 4/23

When you shop online, connect with friends on social media, log in to a sports website to catch up on the latest scores, or search for information on the web, you leave an electronic trail that others may be able to follow to discover where you have been and what you did there. This trail constitutes your digital footprint; it is digital data that you leave behind, and it is often permanent. Even if you think you erased or deleted �iles or turned off your computer, the data remains and can often be retrieved. Like �ingerprints, digital footprints are unique to every device, so it is possible to trace computer, tablet, and cell phone activity. Therefore, you should act as though everything you share online is permanent.

How do you leave this trail, and how do others follow it? How can they use what they learn to harm you? We examine these issues in this section, along with privacy, safety, and security issues to keep in mind when you go on online. We will also share with you some steps you can take to protect yourself and your data.

When you use electronic technology, digital footprints are created in two ways: (a) by your computer itself, through its IP address, and (b) by the websites you choose to visit, which generate a browser history and what are called cookies. Let’s look at these two methods and examine the pros and cons of digital footprints.

Your Trail of IP Addresses and Domain Names

Every computer has an Internet protocol address or IP address. The IP address is a series of numbers such as 192.168.0.1 that is assigned by an Internet service provider or private network administrator. The IP address does not indicate who is using the device, but when you open a browser and enter the web, the IP address and location of your computer are sent to every website you visit. In this way your movements on the web can be tracked. This tracking may offer you some bene�its. For example, websites may recognize you if you have visited before and streamline your online shopping experience. Or your IP address may help investigators �ind your electronic device if it is lost or stolen.

Every website is also assigned an IP address, which speci�ies where on the web the site is located. For example, the Ashford University website has the IP address of 199.73.44.51. Because it is easier to remember names than a series of numbers, the website is also given a domain name (also called the host), and the IP address is linked to that domain

6.1 Leaving a Trail on the Web

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 5/23

Bloomberg/Contributor/Getty Images

Every website you visit becomes part of your digital footprint.

name. To �ind out what your IP address is, follow the instructions in A Closer Look: What Is Your Computer IP Address?.

Domain names have two parts: the web extension and the web page name. The web extension indicates the type of organization or institution the website represents or the country designation, such as .us (United States). For example, the domain name for Ashford’s website is www.ashford.edu (http://www.ashford.edu) . In this domain name, the web page name is “w w w.ashford” and the web extension is “.edu” (see Table 6.1). When you use a web browser to �ind a website, you can locate that website by using either the domain name or the IP address. Like snow�lakes, no two domain names or IP addresses are the same, so every website has a record of every computer that has visited.

Table 6.1: Common web extensions

Web extension

Meaning

.com Commercial website; commonly used to show a business on the web

.edu An educational organization, usually a college or university

.gov Government entities in the United States

.mil Used by U.S. military units

.org Organization; often used by nonpro�it organizations or trade groups

.biz Used by many small businesses on the web

.info A resource site on the web

.net Usually an Internet service provider or other company involved in the web; also used by some businesses

A Closer Look: What Is Your Computer IP Address?

Retrieve the IP address of the computer you are using (and the domain name server or ISP associated with that IP address) by logging on to http://www.ip-tracker.org (http://www.ip-tracker.org) . When the web page opens, your computer IP address will appear in the box above the red box labeled “Lookup IP Address With IP Lookup.” Click the red box, and a new page should appear that displays two smaller red boxes that display IP lookup location information for your IP Address and extra IP lookup �inder information. Scroll down to view how much information is on the Internet about the computer you are using. You can also look up a website and obtain its IP address at http://www.ip-tracker.org/locator/ip- lookup.php (http://www.ip-tracker.org/locator/ip-lookup.php) .

Re�lection Questions

1. What new information did you learn from this exercise about electronic tracking? What surprised you most about the information you found?

2. What types of information have you shared on the Internet that might be harmful to you if it was tracked back to your computer IP address and shared publicly?

http://www.ashford.edu/
http://www.ip-tracker.org/
http://www.ip-tracker.org/locator/ip-lookup.php
1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 6/23

The Trail of URLs in Your Computer History

In addition to an IP address, every website also has a web address. This web address, also called a uniform resource locator (URL), indicates the path someone would follow to locate a speci�ic page on a website. Like your home address, the web address is necessary for someone to locate information on the World Wide Web.

When you visit a website, its URL is recorded in your computer browser history �iles. You can see some of this historical record yourself by clicking the down arrow at the end of the address bar at the top of any page of your web browser. Law enforcement of�icials and investigators often obtain court orders to search the computers of crime suspects for evidence. They can often retrieve the entire history �ile on the computer and determine what websites users of that computer have visited.

Let’s look at some examples of the way a URL is structured. Figure 6.1 is an example of the URL for a page on the Ashford University website that discusses transfer credits.

Figure 6.1: The structure of a URL

While it might look like a random assortment of letters, a URL is really a detailed path to a speci�ic �ile or web page.

URLs can sometimes be quite long, but the �ive main elements of the URL for web documents are the same as the Ashford example. For instance, if someone wanted to learn how to become an elementary school teacher in California, the California Commission on Teacher Credentialing has posted that information at this URL: http://www.ctc.ca.gov/credentials/teach-elementary.html (http://www.ctc.ca.gov/credentials/teach- elementary.html) . The elements of this URL are explained in Table 6.2. Note: A URL is not case sensitive, which means you can type it either in all caps or in lowercase letters. For consistency, however, we suggest you always type it in lowercase letters.

Table 6.2: The elements of the web address or URL for http://www.ctc.ca.gov/credentials/teach- elementary.html

Element Description

http:// Indicates the protocol to be used to access a �ile, usually hypertext transfer protocol (http). This protocol (or https:// for secure sites) tells you that this information is on the World Wide Web.

www. A reference to the World Wide Web. Note: This abbreviation is optional; sometimes domain names do not include it.

.ctc California Commission on Teacher Credentialing (a division of the domain).

.ca State of California domain/host name.

.gov/ Web extension for a government website.

credentials/teach -elementary.html

The path to the speci�ic page where the elementary school credentialing information is located.

http://www.ctc.ca.gov/credentials/teach-elementary.html
1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 7/23

Figure 6.2: Computer temporary Internet �iles

Accessing this window (on Microsoft computers) allows you to delete cookies from your computer hard drive, which can help maintain privacy online.

From Microsoft.

Adapted from Digital Literacy Standard Curriculum Version 4. (2015). Retrieved June 02, 2016, from https://www.microsoft.com/en- us/DigitalLiteracy/curriculum4.aspx#interenetwww (https://www.microsoft.com/en-us/DigitalLiteracy/curriculum4.aspx#interenetwww)

The Trail of Browser Cookies

When your computer browser accesses a website for the �irst time, the website sends back its IP address and other information to help the browser navigate the site and perform certain functions. The browser creates a small text �ile, called a browser cookie or a tracking cookie, that contains information such as your computer IP address, which website pages you viewed, and how long you stayed on each page.

Cookies can often be very helpful to you. They make using the web easier in many ways. Some cookies, for example, store information so that if you leave a web page and return later, you can pick up where you left off browsing the site, without having to start over. If you are on a secure website (https://), however, the site will create another type of cookie so that when you close your browser or the website is inactive for a certain period of time, the site will be closed to protect your data. You must then log in and enter your password again to continue.

Cookies come in several different forms. Some are temporary and usually are deleted when you leave the website. Examples of these and other temporary Internet �iles are shown in Figure 6.2. Temporary cookies are used for situations such as helping you with online shopping. For example, when you select an item from a website to purchase and add it to your shopping cart, a cookie allows you to save the item while you continue shopping the site for additional products. That way, you do not have to go through a separate checkout process for each item (WiseGEEK, 2015). Temporary cookies are also used by some websites to display items you have previously viewed, so you can �ind them again if you wish. Although these cookies may be temporary, they still leave an electronic trail. If you do not purchase an item you viewed, you might get an e-mail from the retailer the next day asking if you would consider purchasing the item and perhaps even offering you a discount.

Most cookies, however, are not temporary; they are permanently stored on your computer hard drive. If you delete them, they will be created again if you go back to that website in the future. This type of cookie is typically stored on your computer hard drive, with a matching �ile kept on the website computer system. Permanent cookies allow a website to remember your name and password the next time you log in or to store your credit card information and retain your billing and shipping address for purchases. Permanent cookies also allow retailers to create an account for you and show you a history of all items you have purchased from them.

By themselves, cookies are not harmful. As we have seen, they can make it easier for you to use the web. However, be cautious about cookies because you may not know what information is being collected and how it may be used. For example, some websites do not stop collecting information about you, even when you sign out of your account. They use a technique called cookie pro�iling to “follow you around” and gather information wherever you go on the web. They may sell this information to a third party, called a data aggregator, which makes money by collecting and compiling data and information about people from the web and selling it to others. Aggregators can create a pro�ile of you and your buying habits over months or even years. The pro�ile may include information about your age, income, and even your sexual orientation, with amazing accuracy. Marketers then use the pro�ile to create pop-up ads on your browser to display products that may be of interest to you (“Cookie Pro�iling,”

https://www.microsoft.com/en-us/DigitalLiteracy/curriculum4.aspx#interenetwww
1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 8/23

2013). As discussed in A Closer Look: See Your Electronic Trail, you might �ind clear evidence of this once you start looking for it.

Cybercriminals can also steal cookies to acquire your credit card information, Social Security number, user names, passwords, and bank information. Permanent cookies also can accumulate on your hard drive and slow down your computer system. If your computer does not seem to be responding as fast as it used to, you might try clearing temporary Internet �iles. For instructions, refer to the Solving Computer Technical Problems section in Module 3.

Remember that if you delete permanent cookies, your actions may clear your stored passwords, credit card information, or the options you previously chose for speci�ic websites. You will then have to reenter this information when you visit these websites again. It is always important to save your log-ins and passwords somewhere, such as in a hard-copy printout or a specialized password management software program.

Privacy Online

A Closer Look: See Your Electronic Trail

Want to see your cookies in action? Try this experiment: Just for fun, browse for a hotel in a vacation spot you would like to visit. Try a couple of websites such as Travelocity and Expedia and compare prices for a few different hotels. Then, if you have one, open your Facebook account. Do you notice any hotel advertisements?

As an alternative, go online and search two or three websites for an automobile or major appliance such as a washer or dryer, refrigerator, or stove. Spend a few minutes comparing the features of two or three models you like. Then wait a day and go online again. Do you notice ads on your browser for the item you shopped or one similar to it? These activities demonstrate that, from following your online trail, marketers have learned you are interested in a particular locale or product. They then usually try to encourage you to book the lodging or buy the product with their advertisements.

Re�lection Questions

1. Do you �ind these ads useful, or do they bother you? Explain your reasoning. 2. Some browsers and security software allow you to block pop-up ads. What might be some

advantages and disadvantages of doing so? 3. Do you think dynamic pricing strategies are fair or unfair to consumers? Explain your answer.

Share an example of an instance in which you noticed a dynamic pricing strategy or have been encouraged to purchase because of it.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a5… 9/23

Caia Images/SuperStock

When you are researching, working, or perusing websites, approach certain sites cautiously to avoid being scammed.

When online, your safety and security can be put at risk both by what you do and what you fail to do. In this section, we discuss actions you can take to protect your personal safety and security on the Internet, and we recommend some software we believe is an essential investment for your safety, security, and peace of mind. Let’s begin by looking at speci�ic types of websites where you should be especially careful.

Websites to Approach Cautiously

People who are looking to perpetrate a scam—a way to get money from another person by deceiving them—or to inappropriately access someone’s personal information or engage in another illegal activity tend to be attracted to websites that have large numbers of users and where personal information is readily available. For this reason, you need to be especially cautious when you access the following types of sites, which are some of the most common targets for fraud and criminal activity.

Dating Websites Online dating sites are extremely popular today, and many people have successfully found a romantic partner online. However, users should be cautious about how much personal information they disclose about themselves on these sites. The Privacy Rights Clearinghouse (http://www.privacyrights.org (http://www.privacyrights.org) ), a nationally recognized consumer education group that advocates for online privacy, warns that users have no right to privacy or con�identiality for any information or photos they have posted and that the dating sites may sell this information to others for advertising or marketing purposes. User information can also be subpoenaed and used in insurance claims, lawsuits, and divorce and child custody proceedings. Make sure you read the privacy policies, terms, and conditions carefully (Privacy Rights Clearinghouse, 2015).

6.2 Remaining Safe and Secure Online

http://www.privacyrights.org/
1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 10/23

Gary A. Conner/age fotostock/SuperStock

Online classi�ied ad sites such as Craigslist are great tools for �inding jobs, housing opportunities, or goods and services. However, these sites can also be full of scammers who post fake ads. Be aware of what to look out for when using these sites.

Dating websites are also very attractive to sexual predators, felons, and stalkers, who use them to search for potential victims. The U.S. Department of State receives thousands of complaints per year from people who have been scammed out of money online—some by potential romantic partners. Someone, for example, can create a false identity, spend time gaining your trust or “falling in love with you” online, and then ask for money for some type of emergency. Many of these scammers are in countries outside of the United States, so recovering lost money is almost impossible. Always trust your instincts if you are uncomfortable meeting someone or do not think they are being entirely honest with you. Don’t provide your full name, address, or phone number until you feel safe about your prospective date, and always make sure you arrange to meet people in a public place during the day, not in the evening (Privacy Rights Clearinghouse, 2015).

Visit http://www.onlinedatingsafetytips.com/Top10Scams.cfm (http://www.onlinedatingsafetytips.com/Top10Scams.cfm) for more information about common Internet dating scams.

Classi�ied Advertising Websites For decades, people have sold unwanted items through classi�ied ads. For the most part, these transactions are an excellent way to connect buyers and sellers. Whether the advertisement has been placed in a newspaper or online through a website such as Craigslist, you are meeting strangers, in person, in your home. So you must be especially carefully. Scams as a result of fake job postings and sale of stolen or counterfeit goods and crimes ranging from threats to assaults, property damage, and theft have all resulted from such situations. Problems with these websites often result because these are private transactions between individuals and do not have the same protection from fraud and loss as do transactions through commercial stores and reputable retail websites. They also do not have the protection from secure online payment websites and credit card companies.

In February 2015 Fox News in Connecticut (FOX CT) reported the Better Business Bureau guidelines shown in Table 6.3 to protect consumers from the dangers associated with classi�ied ads (Schwartz, 2015).

You can learn more about classi�ied ad fraud at http://www.craigslist.org/about/scams (http://www.craigslist.org/about/scams) .

Table 6.3: Do’s and don’ts for online classi�ied ads

Do Don’t

Talk with the person �irst on the phone before meeting with him or her. It is a red �lag if the other person refuses to speak with you by phone before the transaction.

Don’t agree to offers that involve shipping; criminals often send or receive stolen or counterfeit merchandise or illegal materials in this manner.

Meet in a public place, if possible, and trust your instincts if something seems suspicious.

Don’t go alone. Take someone else with you if you can.

http://www.onlinedatingsafetytips.com/Top10Scams.cfm
http://www.craigslist.org/about/scams
1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 11/23

Do Don’t

Accept payment in cash only. Don’t accept cashier’s checks, certi�ied checks, or money orders. They may be counterfeit, and wire transfer or preloaded debit cards may not be legitimate.

Always check a company’s website or call to con�irm a job opening before meeting with someone for a potential job interview.

Don’t assume that all job opening notices are legitimate. They may be fake notices that are fronts for other purposes.

Always drive by and view any property you are interested in buying or renting before you agree to the transaction.

Don’t buy or rent property sight unseen. Criminals have been known to post photos of property that belongs to someone else.

Gaming Websites Many people enjoy playing interactive games such as Words With Friends or popular games produced by companies such as PopCap, Y8, Pogo, or Zynga. These games can be played against people you know or whom you have never met who just happen to be online when you want to play. Some of these games include gambling—with real money changing hands; others are just for fun. In a massively multiplayer online game (MMO or MMOG) and a massively multiplayer online role playing game (MMORPG), you may play against a large online community of anonymous strangers and have unmoderated discussions, which pose a danger of inadvertently giving away personal information about yourself (Get Safe Online, 2015). Some of the hidden dangers of such sites are outlined here.

Until they download a particular game, many people are unaware that a game contains violent or sexual content. If you have children who can access your computer, you can set parental controls on your Windows or Mac OS X operating system to prevent access to sites that have such games. Most of these websites allow you to assume a false identity. So you never know if you are online with a sexual predator or other person who is interested in more than just playing games. Do not download “cheats” (offers to buy programs or �iles that claim to give you an advantage over other players). They may contain malware or computer viruses. Play only authorized versions of a game, which you have purchased from a reputable source and for which you have a software license. Do not use pirated copies of games, which are illegal, can incur criminal penalties, and may contain malware. Play online games only when you have updated antispyware and antivirus software running and an effective �irewall—which is a network security software system that protects the computer network from harmful information from other computers or the Internet—on your computer. Choose a user name that does not reveal any personal information, and don’t put any revealing personal information on your game pro�ile. Use strong passwords that make it dif�icult for hackers to �igure out. Use the tips in Strategies for Success: Tips for Creating Strong Passwords to create your passwords. Watch out for scams and cons that can occur when online game players try to sell or buy items outside the computer game, in the real world (Get Safe Online, 2015).

Strategies for Success: Tips for Creating Strong Passwords

Computer hackers who learn your password can access your bank accounts, medical records, and other personal information. You can never completely guarantee that your information will be secure, and most likely you will not use all the information shown in Table 6.4 to protect yourself.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 12/23

However, the more mistakes in the “Don’ts” column that you avoid and the more suggestions under the “Instead” column you use, the greater password security you will have (Lemos, 2015).

Table 6.4: Do’s and don’ts for creating strong passwords

Don’ts Instead. . .

Don’t use short, 3- to 5-letter passwords.

The longer the password the better. Use from 6 to 12 characters in your passwords.

Don’t use common words or phrases such as password or iloveyou as your password.

Avoid real words, if possible. If you use an actual word, make it unusual or one that is unique to you.

Don’t use all letters. Use a combination of letters, numbers, and symbols and special characters such as & or %.

Don’t use consecutive, easy- to-guess letter or number combinations such as abcdef, 123456, or abc123.

Make your passwords random; mix up letters, numbers, and symbols into a random sequence.

Don’t use the same password for multiple websites. If you duplicate passwords, you run the risk of having more of your personal information stolen.

Have different passwords for different websites.

Don’t use a personal password at work.

Use different personal and work passwords. It is bad enough if someone steals your personal information, but don’t run the risk that the thief could access your employer’s computer system as well.

Don’t use words related to yourself such as your address, phone number, or birthday.

After trying easy-to-guess passwords, hackers often use public information about you for clues to your passwords. Use the tips in this table instead.

Don’t use simple passwords so you can memorize them.

If you keep passwords simple to easily remember them, you also make them easy to hack. Instead, use a variety of complex passwords, create a list of them, and keep the list in a secure place at home or online on a secure password management program such as Norton Identity Safe, Dashlane, LastPass, or RoboForm.

Don’t use the same password for �inancial information that you use for social media, games, and shopping.

Develop a three-tier password system: (a) longer, more complex passwords for �inancial data, (b) a different set of long, complex passwords for social media and games, and (c) a third set of somewhat easier passwords for other websites.

Don’t use names of family members or pets as passwords.

Use a line from a song you like, and make your password the �irst letter of each word, substituting numbers for some of the words. Thus, the Beatles’ song “Yellow Submarine” might become waliays25ys.

Don’t use the same passwords forever.

Change your passwords every few months.

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 13/23

Re�lection Questions

1. Have you used any of the strategies listed? If so, which ones worked best for you? 2. What strategies have you developed that have worked for you, other than those listed?

Also, be especially cautious of �inancial loss or theft when purchasing game elements using real cash. The cost of buying “extras” with online games can add up quickly and substantially. Last, but certainly not least, be careful of developing an online gaming addiction. One of the biggest dangers of these games is that you can waste many hours playing and actually become addicted to them and avoid other important aspects of your life (Get Safe Online, 2015).

Pornographic Websites Pornography can be de�ined as visual or printed materials that contain explicit displays or descriptions of sexual organs or activities intended to stimulate erotic feelings or sexual excitement. Because the Internet is international, no one set of laws applies everywhere to the publication, distribution, purchase, or possession of Internet pornography. In the United States, the public, lawmakers, and the courts have battled for decades over clearly de�ining what is pornographic and whether pornography is protected by the First Amendment to the U.S. Constitution as free speech or is obscene and not protected.

Child pornography, however, is treated severely under both federal and state laws and is not protected under First Amendment rights. Federal laws consider child pornography to be a form of child sexual exploitation and de�ine it as any visual depiction of sexually explicit conduct involving a minor (someone younger than 18 years old). Federal law prohibits any person from producing, distributing, importing, receiving, or possessing any image of child pornography. Violation of these laws is punishable by �ines and a prison sentence that can range from a minimum of 5 years to life imprisonment (U.S. Department of Justice, 2015).

To control access to pornographic material on your computer, you can purchase software applications called antipornography �ilters. Examples include NetDogSoft’s Anti-Porn Filter, which attempts to block sites of this nature from appearing on your computer. Some safety and security software also allow you to set parental controls on your computers and phone to control access to certain material, and computer operating systems have privacy settings and parental control features that can help. However, it is important to realize that no �ilter is 100% effective in blocking pornography.

Computer Threats

As a public space, the web can be a very useful way to �ind information, shop, �ind entertainment, and stay connected with family and friends. However, it can also be a mine�ield with hidden dangers you must be aware of and protect yourself against. In addition to privacy issues and the dangers of identity theft, other safety and security threats are common in today’s electronic world. In this section, we discuss other types of threats that exist when you use digital

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 14/23

J.r. Bale/Hemera/Thinkstock

Installing security software isn’t enough to protect your computer. You have to take the time to update the software and scan it regularly.

devices and actions you can take to protect yourself and your data to minimize your chances of becoming a victim.

Some of the hazards you encounter might simply result in inconvenience or temporarily crash your computer or mobile device. Others, however, can permanently damage your computing devices or seriously harm you, your family, your reputation, or your �inances. The best defenses are knowledge and preventive action.

Maddie knew about the possibility of some of the threats we discuss here. So she purchased security software when she bought her computer. However, the software recommended that she regularly install updates and scan her computer to ensure that she was protected from new, recently discovered threats. These tasks were time-consuming, so Maddie put them off. The night before a paper was due in one of her online classes, she downloaded information from the web that contained a nasty computer virus. The virus infected her computer system, and her word processing software would not work. Luckily, Maddie had made a backup version of her paper a few days before, and a friend let her borrow a computer for the evening. However, Maddie pulled an all- nighter to re-create 3 days’ worth of work she had done on the paper so she could submit it on time. Maddie learned the hard way about the importance of performing regular maintenance on her computer to reduce her vulnerability to threats.

Luckily, as fast as clever computer hackers and other malicious people devise ways to threaten your online safety and security, equally clever people �ind ways to combat these threats. Let’s examine the types of electronic threats that exist and ways you can prevent them or minimize your risk of exposure to them. In this section we refer primarily to computers, but it is important to remember that you are vulnerable to the same threats we discuss here when you download applications, or apps, for any of your mobile electronic devices.

Malware/Spyware Malware, also called spyware, is a secret program that runs in the background when you are on your computer. It gathers information about you and then shares it with others without your permission. Tracking cookies, which we discussed earlier in this module, might be considered a type of spyware because they monitor your activity. The information spyware collects about you might be used to track your movements on the web and then used later to decide what type of pop-up ads to send to you. However, it can go beyond simple monitoring and be dangerous to your personal and computer safety and security. Some spyware or malware can change your computer settings, interfere with your ability to control your computer, or install new software on your computer that you have not authorized. Spyware can also redirect your browser’s home page and adjust the settings so it is dif�icult for you to change it back. It can also cause computer crashes.

You can protect yourself from most malware/spyware by making sure you have a �irewall on your network router that protects your computer from others trying to get in and by installing a comprehensive security program on your computer. Some popular security software packages are programs such as Norton Security, McAfee Internet Security, and Kaspersky Total Security. These packages often include protection against multiple threats to your computer, including various types of malware/spyware and computer viruses discussed in the next section. Once you have installed this software, make sure to set the program to automatically install updates at least weekly, and perform a full computer system scan every month to make sure you continue to be protected. You can learn more about malware/spyware and how to protect your computer from the Microsoft Safety & Security Center at

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 15/23

Ullstein bild/Getty Images

Computer viruses can spread through links or attachments in e-mail or instant messages, so do not click on anything that looks unfamiliar or that is received from someone you don’t know.

https://www.microsoft.com/en-us/safety/pc-security/spyware-whatis.aspx (https://www.microsoft.com/en- us/safety/pc-security/spyware-whatis.aspx) .

Computer Virus We all know what a human virus is, which is why we cringe when someone sneezes too close to us. A computer virus can be equally damaging, and you should take precautions to protect your computer. Hundreds of thousands of viruses exist, and your computer can become infected when you download software, open e-mail, or copy an infected �ile to your computer. A computer virus can corrupt or delete data on your computer, use your e-mail program to send messages containing a virus to people on your e-mail contact list, or even erase all the �iles on your computer hard drive. You can often recognize you have a computer virus when your computer does not operate normally and performs strange, unwanted actions such as typing rows of the same letter or opening web pages or programs on its own.

Computer viruses are often spread through attachments or links in e-mail messages or through instant messaging. Never open an attachment on an e-mail from someone you do not know or an attachment you do not expect, and do not click on a message or a link in an e-mail from someone who is unfamiliar to you. Viruses can also be disguised as funny images, greeting cards, or audio and video �iles and can be hidden in free software or other �iles you download from the Internet.

If you accidentally open a �ile or a link containing a virus, you will usually be protected if you have up-to-date antivirus software installed on your computer. McAfee, Kaspersky, Avira, Norton, Bitdefender, Webroot, and ESET are some highly regarded antivirus software programs that are available for both the Mac OS X and the Windows computer operating systems. They may also be bundled together with malware/spyware protection software. Be sure to research any software you use or purchase beforehand to determine how well it is rated and whether it is recommended by

websites or people you trust.

Having a virus on your computer is not an acceptable excuse for turning your assignments in late. So make sure you install a strong antivirus software program to protect your computer if you accidentally open a �ile that contains a virus.

Trojan Horse A Trojan horse is a type of malware that disguises itself as one type of program but is actually a different type of program. For example, the software may claim to be a game, but when you install it on your computer it does damage, such as erasing your hard drive. Trojan horses can infect other �iles throughout your computer and even send important information over the Internet and allow the creator of the Trojan horse to control your computer, slow its activity, or crash the machine.

Unlike a virus, a Trojan horse does not reproduce itself on its own. The creator of the Trojan horse must convince you to download and consciously or unconsciously install the program. This is usually done when you open an e- mail attachment that contains the malware or download a �ile that is unsafe. A good malware software security program installed on your computer will protect against most Trojan horses. However, remember to open e-mails or e-mail attachments and download �iles only from trusted sources.

https://www.microsoft.com/en-us/safety/pc-security/spyware-whatis.aspx
1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 16/23

Stuart Jenner/iStock/Thinkstock

Computer worms are another type of threat to your computer. What is at least one step you can take to avoid getting a computer worm?

Computer Worm A computer worm is another type of malware that scans your computer for security holes. These security holes can be created when a new threat appears and you have not updated your security software. The worm enters the computer through one of these holes and reproduces itself, infecting other programs on your computer. A worm has the ability to copy itself from machine to machine. It uses up computer processing time and often carries payloads of other malware that damage your computer or your �iles. It can go throughout a computer network, including the Internet, and infect hundreds of thousands of computers.

In 2001 a worm called Code Red was predicted to do so much damage that it was feared the Internet would grind to a halt (Brain & Fenlon, 2015). Luckily, this did not occur, but imagine if a worm attacked a cell phone network today. The danger of this is real, and you should be sure to protect all your electronic devices, including your cell phone, from malicious attacks. Discuss security software options with your Internet service provider or cell phone provider.

Phishing Scheme Earlier in this module, we discussed phishing as one of the top �ive social media scams. Phishing schemes can take place through e-mail, as well. For example, someone may e-mail you and offer to send you money if you send them a “good faith” deposit �irst. Or someone may claim to be from the fraud department of your credit card company and ask you to reply to the e-mail with some personal information. E-mail antispam �ilters (discussed later in this module) may catch e-mail messages coming from phishers. But the U.S. Computer Emergency Readiness Team says the best way for you to beat phishers at their own game is to be wary and never give out your personal or �inancial information online (Brain & Fenlon, 2015).

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 17/23

Jupiterimages/Stockbyte/Thinkstock

Despite the possible threats online, the Internet is a great place to learn, shop, and connect with people around the world.

If you want to use all the wonderful opportunities on the Internet to learn, shop, connect with family and friends, and share your ideas with people around the world, you must accept some loss of privacy. For example, if you want to make an online purchase, you must enter your credit card information into a website.

Millions of people purchase goods and services online, do their banking online, post photos of their family, and do a multitude of other things on the web every day with no problems. How do they use the Internet and still protect their privacy and their most sensitive personal information —such as their Social Security number, bank account and credit card numbers, log-in identi�ications, and passwords—from unauthorized people and organizations? The answer is by taking simple, basic precautions, some of which are listed here.

On the home page of the browsers you use, search the settings or menu for “Safety,” “Privacy,” or “Preferences” to locate instructions to modify the degree of privacy you want for Internet browsing or the type of content you will accept from a website. Download programs only from websites you trust. If you are not sure, search the name of the program on the web to see if anyone has reported it contains spyware or is a scam. Always read all the security warnings, license agreements, and privacy statements included with any software you download; make sure you can accept all conditions. When you purchase anything online or use a website that requires you to enter any �inancial information, make sure that website has a URL that begins with ht t ps : // (a secure website). Such websites may also have a padlock icon at the bottom of the page. Never click “Agree” or “OK” to close a window. Instead, click the “X” in the corner of the window or press Alt+F4 on your

6.3 Other Actions You Can Take to Protect Your Privacy

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 18/23

Britt/iStock/Thinkstock

With two thirds of all e-mail being spam, it’s necessary to �ind ways to avoid these unsolicited and potentially dangerous messages.

keyboard. Be careful of “free” music and �ile-sharing programs. Make sure you understand what conditions or additional software are included with the free program.

Privacy on Shared Computers

When you use a computer at work or at a public library, make sure you have permission to use it for your intended purpose and remember that the computer owner has the right to access all data and information on that computer. To ensure privacy, even on your own personal computer, two good rules of thumb are to never share personal identi�ication information or �inancial information in an e-mail and never write anything you would be embarrassed to have someone �ind and read later. As the old saying goes, “It’s better to be safe than sorry.”

Dealing With Spam

E-mail is the most popular form of online communication, but not all electronic messages involve subjects you want to read about. The computer security software company Kaspersky recently reported that 66.76% of all e- mail messages in 2014 were spam (Vergelis, Shcherbakova, & Demidova, 2015). Spam is an unsolicited and undesired or illegal e-mail message.

Not all spam is a computer threat. Many of the e-mails categorized as spam are legitimate and legal advertisements for products and services. However, they are e-mail messages that you did not request or are for products or services you may not want, and they intrude on your privacy. Their biggest threats are that they �ill up your e-mail inbox and take a great deal of your time to review each time you check your e-mail. These spam e-mail messages arrive daily often because marketers have sold your e-mail address to third parties, who use these addresses to search for new customers.

Some spam might appear to be from a legitimate company but was actually sent by someone else; it may contain destructive malware/spyware or a computer virus. A new form of these destructive e-mail messages appear to be sent from smartphones or from your cell phone company but are actually fake cellular company messages and may carry malware or viruses.

The following are some tips to help you avoid getting malware/spyware or computer viruses through your e-mail and to minimize the unwanted and intrusive e-mail messages that clog your inbox.

Go to the Help menu on your e-mail program and search using the word “privacy” to �ind your e-mail privacy options. Review these options and determine the degree of privacy you want to set for your e-mail program. Go back to the Help menu on your e-mail program and search using the term “junk e-mail” to learn how to change the program’s �ilters to recognize potential spam and download it to your junk mail folder instead of your e-mail inbox. Make sure to check this folder frequently for any mail that should not have been sent to the junk folder. Right-click such messages, select “junk e-mail,” and add the sender to your “safe sender” list so the message will go to your inbox in the future. Do not try to unsubscribe from spam or junk mail. These messages are often sent randomly. By unsubscribing, you con�irm to the sender that yours is a legitimate e-mail account. This can create more

1/16/2020 Print

https://content.ashford.edu/print/Sole.2605.16.2?sections=mod06,mod06intro,mod6.1,mod6.2,mod6.3,mod06summary&content=all&clientToken=5a… 19/23

spam for you, or your address may be sent to third parties and you may receive e-mail from them. Do not click on attachments in unsolicited e-mails unless you are sure they are safe. Do not click on links inside e-mails. Instead, type the URL directly into your browser. If the link is not safe, your browser should alert you to that fact. Consider having a free, disposable e-mail address you can use for sur�ing the Internet without having messages sent back to your home e-mail address. You can obtain free e-mail accounts on Yahoo! and Gmail for this purpose.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Top Quality Assignments
Coursework Assignment Help
Writing Factory
Engineering Guru
Quality Assignments
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$18 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$21 Chat With Writer
Coursework Assignment Help

ONLINE

Coursework Assignment Help

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$39 Chat With Writer
Writing Factory

ONLINE

Writing Factory

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$39 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$43 Chat With Writer
Quality Assignments

ONLINE

Quality Assignments

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$28 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Converting a linear program to canonical form - Bending experiment lab report - Environmental impact of polycarbonate - Maison carree construction materials - Anglia ruskin e mail - Forklift licence shepparton tafe - Discussion Board - Project 2 - Hr case study scenarios worksheet answers - Mechanism of preparation of m nitrobenzoic acid from methyl benzoate - I love my momma lunch money lewis - Visual basic dasturlash tili - Southernization by lynda shaffer answers - How to calculate discount on notes payable - An inconvenient truth questions and answers - Periodic inventory by three methods example - Exploring statistics tales of distributions pdf - 158 quarter sessions road westleigh - Https course apexlearning com public cpop - Add and subtract in scientific notation - Lord mayor's distress relief fund - Empty chair technique questions - Is the bayeux tapestry a primary source - If you know about history take it - Walt disney mission statement 2014 - Harvard process analytics simulation answers - How to make single phase induction motor self starting - Molar mass of calcium carbide - Bill drayton net worth - South wales gliding club - Ig_2 - Kukkiwon dan certificate fees - Rough Draft Quantitative Research Critique and Ethical Considerations - The suit short story summary - Financial statement family court - Women in Leadership Roles - L/min to kg/s air - Prentice hall literature review and assess answers - Societies in the world discussion - San andreas movie worksheet - Assignment 4: Draft Introduction - Rebecca j donatelle health the basics pdf - Brave new world script - Zero crossing detector using 741 - Journalist nellie crossword clue - Scg cement price in myanmar - Is dirt a renewable resource - Electrophilic aromatic substitution nitration of methyl benzoate lab report - Which of the following is true regarding data analysis - Module 03 Course Project - Medicaid and the Middle Class - Mod 1 Peer Review - No-no boy essay 9AM - Paws and claws gornal - Tom bohlman lexus of albuquerque - Is butane an ideal gas - Ethical theories in western philosophy - Florida Agriculture - 4 pages due by 10 hours - PCA for data mining - Sc1040 week 1 assignment worksheet - Penn foster biology research paper example - World war 2 quiz - Acc 202 milestone 1 - Determining the molar mass of a gas lab answers - Apple company background information - Conservation of energy at the skate park answer key - Greenwich goals and objectives - Street law 9th edition - Features of an informative text - Power Point with strong reference - Charlotte's web chapter 19 summary - Dr jaime dy liacco clinic address - Theodore boone kid lawyer sparknotes - Stauff accumulator charge kit - Kotter Change Management Model - Corporate leadership council talent management - Galvanic cell experiment lab report - Ethical decision making paper - Comparison between glycolysis and gluconeogenesis - Before the flood movie worksheet answer key - Rhombus in real life - Discussion - Construction closeout documents list - Business research management - Virtual villagers origins mysterious vial - 1.1 kg in grams - One child book summary - Hw2 - Https www procon org debate topics php - Kriss kross puzzle maker - Definition of accountability in nursing - Prestige auto parts taren point - Calculus - Mystery and melancholy of a street - What is the company's total contribution margin under variable costing - Google corporate strategy case study - Article notes - Agent based software development - Constant speed propeller run up check - Deliverable 6 - Using Business Visuals