Presentation is loading. Please wait.

Presentation is loading. Please wait.

CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read 5.4-5.6.

Similar presentations


Presentation on theme: "CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read 5.4-5.6."— Presentation transcript:

1 CptS 401 Adam Carter

2 Change in schedule  Updated online copy  Tomorrow: read 5.4-5.6

3 Question  The term “phishing” describes what activity:  Stealing information through the mail  Impersonating an online entity in order to obtain personal information  Collecting credit card information from portable scanners  A high-tech way to catch fish

4 Answer  B (274)

5 Quiz Question In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites: A. Phishing B. Pharming C. Spyware D. All of the above E. None of the above 5

6 Answer B. Pharming See pp. 274-275. What is a DNS? Is Pharming easier than Phishing? 6

7 Quiz Question Biometrics are A. the unique biological characteristics of a specific group of people, such as blood type or hair color B. the unique biological characteristics of a specific individual, such as fingerprint, eye patterns, or DNA. C. the unique measurements of an individual, such as height, weight, or arm length. D. All of the above E. None of the above 7

8 Answer B. Can biometric scanning devices be tricked? Why or why not? 8

9 Quiz Question  The most common victims of identity theft are in what age range? A. >18 B. 18-29 C. 30-39 D. 40-49 E. 50+

10 Answer  B (273)

11 Question  Which of the following *WAS NOT* mentioned as a way to protect against identity theft? A. Using a service to flag safe websites B. Displaying a safety image prior to login C. Using fingerprints to log into computers D. Sending confirmation messages whenever an information request is made E. Requiring people to use “strong passwords”

12 Answer  (E). While using strong passwords is a very good practice, it was not discussed in section 5.3.

13 Discussion  Consider the development of a “.bank” domain name. Would this help prevent identity theft? Is this a good idea?

14 Discussion  Should we use biometric data for identity protection? A. Yes B. No

15 Class discussion  Discuss personal experiences with spyware

16 Class discussion  What should we expect from companies that get hacked?  Should they be held liable?  Should they be made to pay restitution to the victims?


Download ppt "CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read 5.4-5.6."

Similar presentations


Ads by Google