Download presentation
Presentation is loading. Please wait.
Published byPaula Manning Modified over 9 years ago
1
CptS 401 Adam Carter
2
Change in schedule Updated online copy Tomorrow: read 5.4-5.6
3
Question The term “phishing” describes what activity: Stealing information through the mail Impersonating an online entity in order to obtain personal information Collecting credit card information from portable scanners A high-tech way to catch fish
4
Answer B (274)
5
Quiz Question In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites: A. Phishing B. Pharming C. Spyware D. All of the above E. None of the above 5
6
Answer B. Pharming See pp. 274-275. What is a DNS? Is Pharming easier than Phishing? 6
7
Quiz Question Biometrics are A. the unique biological characteristics of a specific group of people, such as blood type or hair color B. the unique biological characteristics of a specific individual, such as fingerprint, eye patterns, or DNA. C. the unique measurements of an individual, such as height, weight, or arm length. D. All of the above E. None of the above 7
8
Answer B. Can biometric scanning devices be tricked? Why or why not? 8
9
Quiz Question The most common victims of identity theft are in what age range? A. >18 B. 18-29 C. 30-39 D. 40-49 E. 50+
10
Answer B (273)
11
Question Which of the following *WAS NOT* mentioned as a way to protect against identity theft? A. Using a service to flag safe websites B. Displaying a safety image prior to login C. Using fingerprints to log into computers D. Sending confirmation messages whenever an information request is made E. Requiring people to use “strong passwords”
12
Answer (E). While using strong passwords is a very good practice, it was not discussed in section 5.3.
13
Discussion Consider the development of a “.bank” domain name. Would this help prevent identity theft? Is this a good idea?
14
Discussion Should we use biometric data for identity protection? A. Yes B. No
15
Class discussion Discuss personal experiences with spyware
16
Class discussion What should we expect from companies that get hacked? Should they be held liable? Should they be made to pay restitution to the victims?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.