Performance Task The Power of the Web and Internet Objectives: At the end of the exercise,...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Performance Task The Power of the Web and Internet Objectives: At the end of the exercise, the students should be able to: Resolve a network and Internet failure based on privacy and security. Requirements: Internet Connection Media Editing Tools Instructions: (3 items x 20 points) 1. Assess real-life issues about network and internet failure. 2. Provide logical resolutions in no less than five (5) sentences. 3. The resolution must include the following: O Summary of the problem O O Internet privacy technique/network technologies to be used The benefits of applying your resolution Issue #1 An April 2020 piece from The New York Times alleged that the popular video conferencing site Zoom engaged in undisclosed data mining during user conversations. The coverage asserted that when a person signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedIn profiles. The incident happened via a subscription-based tool called LinkedIn Sales Navigator that Zoom offered customers to assist with their marketing needs. Moreover, when someone signs into a Zoom meeting with an anonymous name, the tool still connects that person to their LinkedIn profile. Thus, the person had their real name revealed to a fellow user despite efforts to keep it private. Resolution: Source: https://cybernews.com/privacy/6-examples-of-online-privacy-violation/ Issue #2 According to Webroot, a cybersecurity solutions provider, around 1.5 million new phishing sites are created monthly. A study by Verizon found that more than 30% of phishing messages get opened by targeted users, and 15% of people successfully phished will be targeted again (and could be victims again) within the year. To convince you to reveal personal information such as passwords and credit card details, phishing emails and text messages may look like they're from a company you know or trust. They may look like they are from a bank, a credit card company, or a message from your friend on Facebook. Source: https://mb.com.ph/2020/08/13/work-from-home-pinoys-are-under-attack/ Resolution: Issue #3 The Philippine National Police (PNP) is going after a con artist posing on Facebook as its chief, Gen. Camilo Cascolan, and warned the public of a modus using his name. PNP spokesperson Col. Ysmael Yu said the police zeroed in on a cyber con artist who misrepresented Cascolan in an internet-based scam. Using stolen identity data, the poser, who was not identified, created a fake social network account with the name "Camilo P. Cascolan" on Facebook to further bolster his criminal misrepresentation and impersonation scheme. Investigators of the PNP anti-cybercrime group (ACG) have identified the owner and creator of the fake account and have called the attention of Facebook over the fake account's violations, particularly to facilitate criminal activity. Resolution: Source: https://www.pna.gov.ph/articles/1116188 Performance Task The Power of the Web and Internet Objectives: At the end of the exercise, the students should be able to: Resolve a network and Internet failure based on privacy and security. Requirements: Internet Connection Media Editing Tools Instructions: (3 items x 20 points) 1. Assess real-life issues about network and internet failure. 2. Provide logical resolutions in no less than five (5) sentences. 3. The resolution must include the following: O Summary of the problem O O Internet privacy technique/network technologies to be used The benefits of applying your resolution Issue #1 An April 2020 piece from The New York Times alleged that the popular video conferencing site Zoom engaged in undisclosed data mining during user conversations. The coverage asserted that when a person signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedIn profiles. The incident happened via a subscription-based tool called LinkedIn Sales Navigator that Zoom offered customers to assist with their marketing needs. Moreover, when someone signs into a Zoom meeting with an anonymous name, the tool still connects that person to their LinkedIn profile. Thus, the person had their real name revealed to a fellow user despite efforts to keep it private. Resolution: Source: https://cybernews.com/privacy/6-examples-of-online-privacy-violation/ Issue #2 According to Webroot, a cybersecurity solutions provider, around 1.5 million new phishing sites are created monthly. A study by Verizon found that more than 30% of phishing messages get opened by targeted users, and 15% of people successfully phished will be targeted again (and could be victims again) within the year. To convince you to reveal personal information such as passwords and credit card details, phishing emails and text messages may look like they're from a company you know or trust. They may look like they are from a bank, a credit card company, or a message from your friend on Facebook. Source: https://mb.com.ph/2020/08/13/work-from-home-pinoys-are-under-attack/ Resolution: Issue #3 The Philippine National Police (PNP) is going after a con artist posing on Facebook as its chief, Gen. Camilo Cascolan, and warned the public of a modus using his name. PNP spokesperson Col. Ysmael Yu said the police zeroed in on a cyber con artist who misrepresented Cascolan in an internet-based scam. Using stolen identity data, the poser, who was not identified, created a fake social network account with the name "Camilo P. Cascolan" on Facebook to further bolster his criminal misrepresentation and impersonation scheme. Investigators of the PNP anti-cybercrime group (ACG) have identified the owner and creator of the fake account and have called the attention of Facebook over the fake account's violations, particularly to facilitate criminal activity. Resolution: Source: https://www.pna.gov.ph/articles/1116188
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Case Study: Quick Fix Dental Practice Technology requirements Application must be built using Visual Studio 2019 or Visual Studio 2017, professional or enterprise. The community edition is not...
-
Data on the length, in seconds, of a sample of 50 songs by The Beatles are presented in the accompanying data table. Complete parts (a) through (d) below. Click the icon to view the table of song...
-
A motorcycle is traveling up one side of a hill and down the other side. The crest of the hill is a circular arc with a radius of 45.0 m. Determine the maximum speed that the cycle can have while...
-
Which style of conflict management suggests that one party is the winner and the other loser? Competition or application of force Collaboration Avoidance Compromise
-
Go back to Checkpoint 9.3 and answer the same two questions in terms of the directions of the applied forces and the force displacements. Do your answers agree with those you gave in Checkpoint 9.3?...
-
A firm??s product sells for $2 per unit in a highly competitive market. The firm produces output using capital (which it rents at $75 per hour) and labor (which is paid a wage of $15 per hour under a...
-
A ( n ) _ _ _ _ _ _ _ _ _ _ contains information about a given person, product, or event. Attribute Column Field Record
-
1. Find the future and present values of the following cash flows at different interest rates. (Draw a timeline to visualize each cash flow.) a. The future value of an initial $1000 for 4 years at...
-
Australian law recognises that Indigenous people have rights and interests in the land under their traditional laws and customs. The Native Title Act 1993 (Cwlth.) sets out specific processes that...
-
Note that the following guidance is the minimum level of response required. Analyse: when a question asks you to analyse something, you should do so in detail, and identify important points and key...
-
Using the state pattern, you have to implement a robot that can; walk, walk slowly, walk fast, and cook based on an action provided by the user. In your design take the following into consideration:...
-
Can companies reconcile corporate impacts on people, planet and prosperity with satisfying their fundamental mission to achieve profit and shareholder returns? 2. SDGs are becoming increasingly...
-
Marriot Hotels and Resorts have decided to upgrade their entire Hotel Management Network and Application Infrastructure across 5 cities in Ontario. As part of this entire RFP procurement process, the...
-
For mechanisms given in the following figures, draw the free body diagrams, show the constraint and applied forces acting on the links in the mechanisms, and define with regard to the force-members....
-
Write a paper detailing a geographic information system (GIS) of your own design that would utilize data in an original manner.
-
In September 2008, in the midst of the credit on Wall Street, Goldman Sachs invited Warren Buffett, the legendary fundamental investors, to contribute much-needed equity capital to firm. Buffett...
-
In October 2008, the 142.562 outstanding shares of Realnetworks, Inc., traded at $3.96 each. The most recent quarterly balance sheet reported $454 million in net financial assets and $876 million in...
-
Bausch and Lomb, Inc., the optical products company, reported the following sales and receivables from 1990 to 1993 (in millions of dollars): Subsequently it was discovered that the firm had booked...
-
Consider a two-level system, with basis \(|1angle,|2angle\), and in this basis, a Hamiltonian with elements \(\left(\begin{array}{ll}1 & 1 \\ 1 & 1\end{array} ight)\). Use the first form of the...
-
Use the practical variational method for the same harmonic oscillator ground state energy, with trial wave function \(\psi_{a}(x)=e^{-a y^{2}}\).
-
Use the Ritz variational method for the harmonic oscillator, with trial wave functions \(\psi_{1}(x)=\) \(e^{-y^{2} / 2}, \psi_{2}(x)=e^{-y^{2}}, \psi_{3}(x)=e^{-2 y^{2}}\), where \(y=x \sqrt{m...
Study smarter with the SolutionInn App