Question: Performance Task The Power of the Web and Internet Objectives: At the end of the exercise, the students should be able to: Resolve a


Performance Task The Power of the Web and Internet Objectives: At theend of the exercise, the students should be able to: Resolve a

Performance Task The Power of the Web and Internet Objectives: At the end of the exercise, the students should be able to: Resolve a network and Internet failure based on privacy and security. Requirements: Internet Connection Media Editing Tools Instructions: (3 items x 20 points) 1. Assess real-life issues about network and internet failure. 2. Provide logical resolutions in no less than five (5) sentences. 3. The resolution must include the following: O Summary of the problem O O Internet privacy technique/network technologies to be used The benefits of applying your resolution Issue #1 An April 2020 piece from The New York Times alleged that the popular video conferencing site Zoom engaged in undisclosed data mining during user conversations. The coverage asserted that when a person signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedIn profiles. The incident happened via a subscription-based tool called LinkedIn Sales Navigator that Zoom offered customers to assist with their marketing needs. Moreover, when someone signs into a Zoom meeting with an anonymous name, the tool still connects that person to their LinkedIn profile. Thus, the person had their real name revealed to a fellow user despite efforts to keep it private. Resolution: Source: https://cybernews.com/privacy/6-examples-of-online-privacy-violation/ Issue #2 According to Webroot, a cybersecurity solutions provider, around 1.5 million new phishing sites are created monthly. A study by Verizon found that more than 30% of phishing messages get opened by targeted users, and 15% of people successfully phished will be targeted again (and could be victims again) within the year. To convince you to reveal personal information such as passwords and credit card details, phishing emails and text messages may look like they're from a company you know or trust. They may look like they are from a bank, a credit card company, or a message from your friend on Facebook. Source: https://mb.com.ph/2020/08/13/work-from-home-pinoys-are-under-attack/ Resolution: Issue #3 The Philippine National Police (PNP) is going after a con artist posing on Facebook as its chief, Gen. Camilo Cascolan, and warned the public of a modus using his name. PNP spokesperson Col. Ysmael Yu said the police zeroed in on a cyber con artist who misrepresented Cascolan in an internet-based scam. Using stolen identity data, the poser, who was not identified, created a fake social network account with the name "Camilo P. Cascolan" on Facebook to further bolster his criminal misrepresentation and impersonation scheme. Investigators of the PNP anti-cybercrime group (ACG) have identified the owner and creator of the fake account and have called the attention of Facebook over the fake account's violations, particularly to facilitate criminal activity. Resolution: Source: https://www.pna.gov.ph/articles/1116188

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!