Performance Task The Power of the Web and Internet Objectives: At the end of the exercise,...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Performance Task The Power of the Web and Internet Objectives: At the end of the exercise, the students should be able to: Resolve a network and Internet failure based on privacy and security. Requirements: Internet Connection Media Editing Tools Instructions: (3 items x 20 points) 1. Assess real-life issues about network and internet failure. 2. Provide logical resolutions in no less than five (5) sentences. 3. The resolution must include the following: O Summary of the problem O O Internet privacy technique/network technologies to be used The benefits of applying your resolution Issue #1 An April 2020 piece from The New York Times alleged that the popular video conferencing site Zoom engaged in undisclosed data mining during user conversations. The coverage asserted that when a person signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedIn profiles. The incident happened via a subscription-based tool called LinkedIn Sales Navigator that Zoom offered customers to assist with their marketing needs. Moreover, when someone signs into a Zoom meeting with an anonymous name, the tool still connects that person to their LinkedIn profile. Thus, the person had their real name revealed to a fellow user despite efforts to keep it private. Resolution: Source: https://cybernews.com/privacy/6-examples-of-online-privacy-violation/ Issue #2 According to Webroot, a cybersecurity solutions provider, around 1.5 million new phishing sites are created monthly. A study by Verizon found that more than 30% of phishing messages get opened by targeted users, and 15% of people successfully phished will be targeted again (and could be victims again) within the year. To convince you to reveal personal information such as passwords and credit card details, phishing emails and text messages may look like they're from a company you know or trust. They may look like they are from a bank, a credit card company, or a message from your friend on Facebook. Source: https://mb.com.ph/2020/08/13/work-from-home-pinoys-are-under-attack/ Resolution: Issue # 3 The Philippine National Police (PNP) is going after a con artist posing on Facebook as its chief, Gen. Camilo Cascolan, and warned the public of a modus using his name. PNP spokesperson Col. Ysmael Yu said the police zeroed in on a cyber con artist who misrepresented Cascolan in an internet-based scam. Using stolen identity data, the poser, who was not identified, created a fake social network account with the name "Camilo P. Cascolan" on Facebook to further bolster his criminal misrepresentation and impersonation scheme. Investigators of the PNP anti-cybercrime group (ACG) have identified the owner and creator of the fake account and have called the attention of Facebook over the fake account's violations, particularly to facilitate criminal activity. Resolution: Source: https://www.pna.gov.ph/articles/1116188 Performance Task The Power of the Web and Internet Objectives: At the end of the exercise, the students should be able to: Resolve a network and Internet failure based on privacy and security. Requirements: Internet Connection Media Editing Tools Instructions: (3 items x 20 points) 1. Assess real-life issues about network and internet failure. 2. Provide logical resolutions in no less than five (5) sentences. 3. The resolution must include the following: O Summary of the problem O O Internet privacy technique/network technologies to be used The benefits of applying your resolution Issue #1 An April 2020 piece from The New York Times alleged that the popular video conferencing site Zoom engaged in undisclosed data mining during user conversations. The coverage asserted that when a person signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedIn profiles. The incident happened via a subscription-based tool called LinkedIn Sales Navigator that Zoom offered customers to assist with their marketing needs. Moreover, when someone signs into a Zoom meeting with an anonymous name, the tool still connects that person to their LinkedIn profile. Thus, the person had their real name revealed to a fellow user despite efforts to keep it private. Resolution: Source: https://cybernews.com/privacy/6-examples-of-online-privacy-violation/ Issue #2 According to Webroot, a cybersecurity solutions provider, around 1.5 million new phishing sites are created monthly. A study by Verizon found that more than 30% of phishing messages get opened by targeted users, and 15% of people successfully phished will be targeted again (and could be victims again) within the year. To convince you to reveal personal information such as passwords and credit card details, phishing emails and text messages may look like they're from a company you know or trust. They may look like they are from a bank, a credit card company, or a message from your friend on Facebook. Source: https://mb.com.ph/2020/08/13/work-from-home-pinoys-are-under-attack/ Resolution: Issue # 3 The Philippine National Police (PNP) is going after a con artist posing on Facebook as its chief, Gen. Camilo Cascolan, and warned the public of a modus using his name. PNP spokesperson Col. Ysmael Yu said the police zeroed in on a cyber con artist who misrepresented Cascolan in an internet-based scam. Using stolen identity data, the poser, who was not identified, created a fake social network account with the name "Camilo P. Cascolan" on Facebook to further bolster his criminal misrepresentation and impersonation scheme. Investigators of the PNP anti-cybercrime group (ACG) have identified the owner and creator of the fake account and have called the attention of Facebook over the fake account's violations, particularly to facilitate criminal activity. Resolution: Source: https://www.pna.gov.ph/articles/1116188
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Case Study: Quick Fix Dental Practice Technology requirements Application must be built using Visual Studio 2019 or Visual Studio 2017, professional or enterprise. The community edition is not...
-
Stock Valuation While it comes to investing, picking the right stock plays a crucial role. Careful research and patience are needed. One needs to check several aspects of the company before...
-
A satellite has a mass of 5850 kg and is in a circular orbit 4.1 105 m above the surface of a planet. The period of the orbit is 2.00 hours. The radius of the planet is 4.15 106 m. What would be...
-
Interpersonal conflict arises due to differences in perceptions, values, integrity, and no clear description of roles. True False
-
A 2.3-kg ball dropped from a height of \(2.0 \mathrm{~m}\) onto a steel plate rigidly attached to the ground bounces back to a height of \(1.7 \mathrm{~m}\). (a) What is the impulse delivered to the...
-
June production generated the following activity in Auto Chassis Companys Work in process inventory account: Additionally, Auto has completed Jobs 142 and 143, with total costs of $38,000 and...
-
Try replacing Batch Normalization with SELU, and make the necessary adjustments to ensure the network self - normalizes ( i . e . , standardize the input features, use LeCun normal initialization,...
-
In the IS-LM model, in the special case where money demand is completely interest insensitive and the LM curve in vertical, an increase in the quantity of money will A. increase income but leave the...
-
Analyze tariffs and other trade barriers. Discuss determinants of foreign exchange rates. Identify firms' strategic responses to deal with foreign exchange movements.
-
An 12-floor apartment building has 15 electrical circuits per apartment. There are 8 apartments per floor. How many electrical circuits are there in the building
-
3. A sturdy ramp is an asymmetric 2-sided construction, with ramps going upward from either side. The overall 'double ramp' appears triangular from a 'side view' (see the diagram below). The ramp up...
-
There are several ways to address risk. The particular way an individual or firm chooses will depend on their risk tolerance and strategic objectives. Give real-life examples of mitigating a risk,...
-
CMS declined to create a rebuttable presumption that a transaction is fair market value. CMS's conclusion? What are the practical and policy implications of CMS's decision in this regard?
-
Q1. A sample of 45 customers who drive luxury cars showed that their average distance driven between oil changes was 3187 miles with a sample standard deviation of 42.40 miles. Another sample of 40...
-
If there is an unrealized holding gain on available-for-sale investments, it is reported as?
-
A firm with a book value of $15.60 per share and 100 percent dividend payout is expected to have a return on common equity of 15percent per year indefinitely in the future. Its cost of equity capital...
-
If a firm has a P/E ratio of 12 and a profit margin on sales of 6 percent, what is its price-to-sales (P/S) ratio likely to be?
-
At the end of 2009, you forecast that a firm's free cash flow for 2010 will be $430 million. If you forecast that free cash flow will grow at 5% per year there after, what is the enterprise value?...
-
Prove that the boosted right-handed spinor \(\psi_{\mathrm{R}}(\boldsymbol{p})\) is related to the corresponding rest spinor by Eq. (14.21).
-
Use the \(\gamma\)-matrices in the Weyl representation to show that the Dirac equation (14.31) is equivalent to Eq. (14.25). Data from Eq. 14.31 Data from Eq. 14.25 (y"Pu-m)(p) = (iy" - m)(p) = 0
-
Prove the identity \((\sigma \cdot \boldsymbol{p})^{2}=\mathrm{I}^{(2)} p^{2}\), where \(\sigma=\left(\sigma_{1}, \sigma_{2}, \sigma_{3} ight)\) are the Pauli matrices, \(\boldsymbol{p}\) is the...
Study smarter with the SolutionInn App