Business Driven Technology Plug-In T1 - Personal Productivity Using It
Business Driven Technology Plug-In T1 - Personal Productivity Using It
Business Driven Technology Plug-In T1 - Personal Productivity Using It
LEARNING OUTCOMES
1. Describe the four steps you can use to create a strong password.
Create strong passwords that you can remember. A strong password is one that is at least
eight characters, includes a combination of letters, numbers, and symbols and is easy for
you to remember, but difficult for others to guess. The easiest way to create a strong
password that you will not have to write down is to come up with a passphrase.
Keep your passwords a secret.
Manage your passwords. A strong password is one you change every few months.
Monitor your accounts.
3. Explain why you would use Microsoft’s backup and recovery utility.
The Backup Utility in Windows XP helps protect data if a hard disk fails or files are accidentally
erased due to hardware or storage media failure. The Recovery Console is used to perform
many tasks without starting Windows XP, including starting and stopping services, reading and
writing information on a local disk drive, and formatting drives.
5. Explain spam and phishing and identify three ways that you can prevent each.
Spam is received junk e-mail. Tips to stop spam include:
Delete junk e-mail messages without opening them.
Do not reply to spam.
Phishing is a type of deception designed to steal your identity. In phishing scams, scam artists
try to get you to disclose valuable personal data, such as credit card numbers, passwords,
account data, or other information, by convincing you to provide it under false pretenses. Tips
to stop phishing include:
Report suspicious e-mail.
Be wary of clicking on links in e-mail.
Type addresses directly into your browser or use personal bookmarks.
Check the security certificate when you are entering personal or financial information
into a Web site.
Do not enter personal or financial information into pop-up windows.
7. Identify three things you can do to maintain your computer and keep it running smoothly.
Free disk space.
Speed up access to data.
Detect and repair disk errors.
CLASSROOM EXERCISE
When you contemplate the possibilities, the concept of Cabir gets pretty scary. The number of
computer users who are already targets of virus infections pales in comparison to the number of
mobile phone users out there.
Ask students…
1. How many use Bluetooth?
2. How many know what Bluetooth is?
3. How many check for cell phone security updates?
4. How many install some type of security software on their phone?
Internet Resources:
How Cell-phone Viruses Work
The 10 Biggest Security Risks You Don't Know About
Cell phone virus- handy viruses - anti-virus software
The search giant is using data from the Stop Badware Coalition to flag sites that are potentially
host to malicious software. Google, along with Sun Microsystems and Chinese PC maker
Lenovo, announced support for the group.
People who attempt to go to a Web site that has been identified as risky by the coalition are
taken to a warning page.
"Warning--the site you are about to visit may harm your computer!" the page states in
bold type, then suggesting users can "learn more about malware and how to protect
yourself at StopBadware.org."
The interrupt page suggests that users can try returning to the search page and choosing a
different result, trying another search or they can continue to the potentially malicious site.
Windows Vista
Not all students have Microsoft Vista unless they bought a new laptop or PC recently. Chances
are you (the instructor) may not have it either, as many schools have been reluctant to migrate
(as of this writing). It may be worth taking a straw poll in class to see how many students are
using Windows XP and how many have Vista. For those that have Vista, ask how they would
rate their experience (good, fair, great).
For those students who have yet to upgrade, you might want to have students tour the
Microsoft Vista Web site for a closer look. http://www.microsoft.com/windowsvista/
Project Purpose: To begin to understand the various types and choices of backup software
available.
Potential Responses: Although there is no right or wrong answer here, students responses
should be pragmatic to their needs and budget. Some of the more popular utilities that
students should find are: Norton Ghost, Keepsafe, and AutoSave.
Project Purpose: To begin to understand one tool to assist in eradicating spyware and adware.
Potential Responses: Although there is no right or wrong answer here, this exercise should
provoke some interesting results. Some students may be familiar with this utility and use it
regularly. However, for those students who have never use this tool or any other anti-spyware
or adware, they will be amazed at the amount of malicious software hiding on their system.
3. Firewall Utilities
Potential Responses: Although there is no right or wrong answer here, this exercise should be
monitored so that firewalls don’t block student’s basic Internet access, including Web surfing
and e-mail retrieval.
Project Purpose: To begin to understand the different types of online resources to use for
personal computer safety.
Potential Responses: There is no right or wrong answer with this exercise; however, it would
be worth noting which students found vulnerabilities and with what product/utility.
Project Purpose: To begin to understand how an online free virus scan operates.
Potential Responses: There is no right or wrong answer with this exercise; however, it would
be worth noting which students found vulnerabilities using the PC-cillin product.
N/A