17. Use safe and secure sites when making online purchases. Look for the https compared to just http. The s at the end provides some security.
18. Use safe and secure passwords and usernames. Do not give out birthday, name, and other personal information on the internet.
19.
20. The Bad Fox News.com said “BOSTON - Spanish police have arrested three men accused of masterminding one of the biggest computer crimes to date -- infecting more than 13 million PCs with a virus that stole credit card numbers and other data.”(Reuters, 2010) “Mariposa was programed to secretly take control of infected machines, recruiting them as "slaves" in an army known as a "botnet." It would steal login credentials and record every key stroke on an infected computer and send the data to a "command and control center," where the ringleaders stored it.”(Reuters, 2010) http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-network-arrested/ Click on this link to read more.
21.
22. Tech Faq says “The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical “Trojan Horse” that the Ancient Greeks set upon the city of Troy.” (TECH FAQ,2011)
26. Install a personal firewall program and consider a firewall at the router too.
27.
28. Employers are legally allowed to “record” your internet activities. They can see what web site you visited, get copies of emails, and every keystroke.
31. ReFeRENCES G.Wolfgang. (n.d.). Clint Eastwood [picture]. Retrieved May 14, 2011, from GoneMovie.com: http://www.gonemovies.com/WWW/XsFilms/SnelPlaatjes/GoodBlondie2.asp History Channel Cyber Security Greg Evan Talks Spyware [video]. (n.d.). Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=aH-5kcx_J3A ICA. (n.d.). Retrieved May 15, 2011, from Clint Eastwood [picture]: http://www.ica.org.uk/18793/Film/The-Good-The-Bad-The-Ugly.html Reuters. (2010, March 3). Accused Masterminds of world's Largest Computer Virus Network Arrested. Retrieved May 14, 2011, from Fox News.com: http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-network-arrested/
32. References Shelly, G.&.(2010). Security Issues, Ethics, and Emerging Technologies in Education. In G.&. Shelly, Integrating Technology and Digital Media in the Classroom (pp.469-516). Boston: Course Technology, Cengage Learning. Spam (electronic). (n.d.). Retrieved May 14, 2011, from Wikipedia: http://en.wikipedia.org/wiki/Spam_%28electronic%29 The Good, The Bad & The Ugly [sound clip]. (n.d.). Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=1hYV-JSjpyU Trojan Virus. (n.d.). Retrieved May 15, 2011, from TECH FAQ: http://www.tech-faq.com/trojan-virus.html