Thursday, June 23, 2016

“Internet Crime”


1st: Identity theft- What is that? How does it harm to on the Internet? Give Examples.

Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or purchases or other things such as getting into university, assume someone else's life . Identity theft is committed many different ways. Some identity thieves sift through trash bins looking for bank account and credit card statements; other more high-tech methods involve accessing corporate databases to steal lists of customer information Once they have the information they are looking for, identity thieves can ruin a person's credit rating and the standing of other personal information.I think the most easy way to think about it is to think it liken this, the fact that there are people who are willing to sell you their life on places like ebay means that is some way there is market for that, now imagine someone steals that from you whatever their purpose may be stealing is bad, especially information that involves someone's life and money. There are people who even still information from dead people in order to get insurance money, or to even use their record to go to college or whatever their purpose may be, this even has name is ghosting.
There are many ways that this could happen to somebody in the age of the internet, they could use your email to open a pre-approved credit and then go and spend it all, there is also phishing , there are also conning calls in which they ask you certain information pretending to be someone else and you like that give you information. Those are some example of how your identity could be stolen from you.

2nd: What is spyware? How to harm? Giving examples.

Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. Spyware can also negatively affect a computer’s performance by installing additional software, redirecting web browser searches, changing computer settings, reducing connection speeds, changing the homepage or even completely disrupting network connection ability. Spyware can also be used as a type of adware, where the software delivers unsolicited pop-up ads in addition to tracking user behavior. Typically, spyware is installed when a user installs a piece of free software that they actually wanted. When the desired software is installed, the spyware will piggyback on the installation and start collecting data from the user’s activities. The user can also be tricked into installing the spyware through a Trojan horse as well as it pretending to be a free piece of security software. Spyware authors have been known to pay shareware developers to bundle their spyware with the legitimate software as well as simply repackaging freeware and bundling it with their own spyware. Drive-by downloading is another method used to install spyware on an unsuspecting user’s computer.

I know this by myself when I was first time I download music with a unknow website and my computer sometime don’t work and I turn power off many times, and when I serve on the internet , I find out they are many advertisement that are no good and it is very slow, then I start to open the firewall, and it didn,t work,my dad told me is stuck with virus, so we throw that computer away and buy a new one, but this time I dowload the in application to defense the virus.




3rd: What are phishing and online fraud? How to harm? Giving examples.images.jpg


The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and will capture and steal any information the user enters on the page.
Having essential information like credit card numbers, passwords, social security even your house direction is a dangerous thing to various degrees. This could potentially harm you financially, security wise because will know things about you personal things, this might mean you have to change house, change all you information and such just to keep yourself safe in real life. They know who you are and you don’t have the slightest idea of who they are.  For example: Some people send mass emails asking for verification information for a website that looks like is real but all they do is copy the HTML code and make it look like it, but in reality you are just giving them your are actual information and is all a facade.


4th: What are spam, Adware? How to harm? Giving examples.

Spam can be used to spread computer viruses, trojan horses or other malicious software. The objective may be identity theft, or worse. Some spam attempts to capitalize on human greed, while some attempts to take advantage of the victims' inexperience with computer technology to trick them. Spam is the term used for unsolicited, impersonal bulk electronic messages. Although email spam is the most common form of spamming, others exist, like mobile phone messaging spam and instant messaging spam.
Spam involves sending nearly identical messages to thousands (or millions) of recipients. Spammers use software robots, called spambots (also Web crawlers or Web spiders) in order to get valid email addresses from company Websites, blogs and newsgroups. Common subjects of spam messages are pornographic or other sexually related Web sites, various financial services or get-rich-quick schemes and health products.Spam messages normally have a fake origin address, which is randomly generated, in order to keep the author of the message from being easily discovered.
On May 31, 2007, one of the world's most prolific spammers, Robert Alan Soloway, was arrested by US authorities. Described as one of the top ten spammers in the world, Soloway was charged with 35 criminal counts, including mail fraud, wire fraud, e-mail fraud, aggravated identity theft, and money laundering Prosecutors allege that Soloway used millions of "zombie" computers to distribute spam during 2003. This is the first case in which US prosecutors used identity theft laws to prosecute a spammer for taking over someone else's Internet domain name.

5th: What are "inappropriate sites" in the video? How to harm? Giving examples.

Inappropriate sites are what  include information or images that upset your child, material that’s directed at adults, inaccurate information or information that might lead or tempt your child into unlawful or dangerous behaviour.

When children enter these sites and contact these bad information. They may intimate some bad behaviour.

My classmates in junior high school usually surf some sexually explicit materials sites which include graphic pictures and videos intended for adults. They can discuss something about sexual video in school. They even image they are in the video. Regarding sex, they get wrong and unhealthy information from these sexually explicit materials sites.
6th: What are malwares ( virus, worms, Trojans) ? How to harm? Giving examples.

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels., all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.one example of it is  can happen in any file that you open is unsafe and unstrustable

Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system,The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.

Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
If we want to defense the malware on the internet  it is better you open the firewall, and always updated the system with the new one so nothing can harm us, and is better to download a VIRUS APPLICATION TO DEFENSE.


7th:What are the differences among virus, worms, and Trojans?

According to the question 6th, one common mistake that people may make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.

8th: questions about hackers
8.1 What is the stereotype toward them?
That they are evil and do bad things, like attacking and stealing information. They smart and that they are young, introverted with too much time in their hands. That they are boys. That they are terrorist and work in dark rooms by themselves. (cristina)

First came out in mind is they are someone who hacking others information and they are boys. But in fact, they can be good and also can be a girl.(dolphin)

My impression of Hackers is that they are all bad guy and always do illegal things.They are thin and their skin is fair because they always stay in room. They may wear all black . They enter computers illegally and steal information. They are thieves.(Amy)

I don’t think they are so bad but many people think they are just like to hack everyone's information on the internet.(yoyi)

8.2 What are their background?

I think this is quite a difficult question to answer, because since hacker's life in the anonymity thus gathering information about their background as a group is hard, there is not much information in the web because hackers can delete this information, even hack it and change it. If they can access USA military classify information I believe they can mess with other things too. However so far, the hackers that have being caught are for the most part white man between the ages of 21 and 40, there are speculations that the best ones are in Asia in countries like China because of the lack of international regulation there and the government censorship hackers who grew up in this environment of control have more “practice” when to comes to opening networks and deceiving the own government by making proxies or facade networks and activities.Without mentioning the countless machines that hackers can use and have access to in order to cut interceptions.  They could looks like you and me, or the person sitting next to you in starbucks, that is what makes it so scary, considering that children have access to, the demographic for young hackers is said to be big too, but what laws are there for hacker underage people?
8.3 What are the similarities and differences among black, white, gray hackers based on populations and their motivations?

This is doesn’t make any sense, to me that is. In the hacker community especially one as big as Anonymous such information does not exist. The classification, is made by people who wants to put them in different type of “jobs” that they do, but in reality in the own community we really don’t know if such a thing exists for sure, simple because active members of the community don’t talk about it for protection. There is a lot of speculation when it comes to finding information about hacker because it may as well be planted information for their own benefit. Considering that a lot of the best hackers work for the government in different levels of security and work, and for security reason this information is for the most part classify in order to protect national security and personal too.

8.4 What social pressure do they face?
They have social pressure like blame and get catch by police, because in the police they can be the hackers too, or the public is going to help catch the hacker, like first be friendly with the hacker and later tell police about their information, so hacker really are busy and hiding from our normal people,it is very tired but they deserved it I think

8.5 Offer examples of black, white, gray hackers.
image.jpg
Black-
Robert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500. Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.

White-
Linus Torvalds is the creator of Linux, a family of operating systems that brought the flexibility and security of Unix-based systems to the public in an easy-to-digest manner.Torvalds started his hacking by fiddling around with his personal machines when he was a child. In 1991, he created the first version of the Linux kernel using the Minix operating system as his source of inspiration. Eventually, he asked for contributors to help him out. Fast forward many years later and now Linux is popular worldwide.

Grey-
article-0-1B5AF57B000005DC-267_306x299.jpg
In August 2013 Khalil Shreateh, an unemployed computer security researcher, hacked the Facebook page of Mark Zuckerberg, Facebook’s CEO, in order to force action to correct a bug he discovered which allowed him to post to any user’s page without their consent. He had tried repeatedly to inform Facebook of this bug only to be told by Facebook that the issue was not a bug. After this incident, Facebook corrected this vulnerability which could have been a powerful weapon in the hands of professional spammers. Shreateh was not compensated by Facebook’s White Hat program because he violated their policies making this a grey hat incident.

9th question: what can people and government do to investigate/prevent/stop... cybercrime?

What I know in these year until now, the people, government police or whatever they can’t do anything when the hackers is seriously and don’t want us to know them, and so those people have no idea to arrest them and even don’t know who they are where they are.

Cyberbully

What is Cyberbully?

Cyberbullying is the act of harming or harassing via information technology networks in a repeated and deliberate manner.
「cyberbully」的圖片搜尋結果


Team Discussion

1st question: how do you define cyberbully?

Yoyi: cyberbully is a kind of bully online in any social websites to harm the one with hate.

Cristina: According to dictionary.com cyberbully is the act of harassing someone online by sending or posting meanmessages, usually anonymously. But I think that in many ways, cyberbully is a very hard thing to define because there is really no way to know 100% how someone feels and everybody define or see things differently. To me cyberbully is when people are being unnecessarily rude to you on the internet to the point that making the other person virtual life unbearable and difficult to be in the internet. But even is a write that I am not even sure myself of what it is, because in many ways is not a reality for me. What I mean is because I am not in a any way famous in the internet and I don't spend time giving my opinion or creating content for the mass media to see I don't worry or care for other people’s opinions whatsoever. But I understand that to some this is very real people kill themselves over this, the impact that people bombarding you with hate message must be horrible, I imagine. I think that for something to have such an effect on you it has to matter to you very much and if the your internet life matters to you then it makes sense but like most thing is not necessarily the case for everybody. 

Dolphin: For me, I think cyber bully is not a kind of bully, because you can just don’t see the comment of others. On internet, what you see is just others review and they didn’t think that they are hurting you, but what you feel is you have hurting by someone. In fact, when we get bully from punch or others, we can’t escape easily but on the internet you can just close your computer easily, you don’t have to care what others saying about you.

Amy: In my opinion, cyberbully is a  way of bully. In this way, bullyer and victim are not face to face. The bullyer harm the victim through offensive word or article. People pose something harmful to  someone online.  

2nd question:" who would suffer" means who are the victims of cyber bully?

Dolphin: Definitely both, you get suffer when someone comment badly about you, but the one who comment badly on you, when others saw it, they will said “wow, you are so bad, you are bullying someone!” and finally the people get suffer too. It just like a kind of cycle.

Yoyi: both will suffer from cyberbully ,the one who get bully will be hurt and can revenge on the one who bully them ,and the other who harm the victim on the internet, if he or she get caught will get punishment even send to the prison.

Cristina: The victims of cyber bully just like in real bully is everybody. No one benefits 100% by being negative towards one another, if you attack someone other people will attack you so maybe we are all at fault. Maybe is society that needs to change, but I don’t know if that is even the correct answer. 

Amy: I think both  bullyer and people suffered by them are victim. People who bully another are also suffered from another bully which affects them to suffer someone. That is a bad circulation. 

3rd question: Why do people bully? ( reasons of cyber bully)

Yoyi: because they have something bad situation on him or he/she doesn't know that it will harm people maybe they think is funny

Cristina: I for the most part think that cyberbullying come from a place of insecurity, jealousy, envy, boredom or just straight trolling.  Trolling is to upset or provoke (other users) by posting such messages or comments (dictionary.com) people sometimes just like to see the internet go crazy for stupid things that well they really don’t care because no one can do anything to them. And in a sense that’s what so great about the internet and  so terrible about it. If we could insult people to their faces without facing any consequences we would, I think the internet is a great example of that.
 Amy: I think it is because people whose hearts is sick, they give vent to angry, jealous thoughts through cyber bully.

Dolphin: I think it was because they envy about the person, maybe his talent or whatever. And maybe they just follow other doing like others was bullying someone and he just follow.

4th question: How do people cyberbully? (by which ways?)

Yoyi -They write on any social website to chat with people about the victim’s information, and always write the bad things of her or she

Amy: People express their offensive opinion about other people in the social website such as Facebook, Twitter. 

Cristina: Hate speech that is how people cyberbully. Anything from bad comments, to songs, videos… whatever form of media even mass messaging… that is how people get cyber bully. 

Dolphin: They like to write whatever they think on the social sites when they say something funny or others and didn’t bother about what they said and comment maybe will hurt someone.And, this will be the start of cyberbully.

5th: Any stories, movies about cyber bully to share ( either the happy or sad ending ones)

Dolphin: There was a movie name “Cyberbully”(2011). It tells a girl who being cyberbully and her mother is trying to help her daughter on the suffer. The quote of this movie is “Words can hurt”. It is interesting and we can learn a lot in this movie, and it shows the cyberbully these day.

Amy: I remember a news happened in 2015. It is about an artist named Cindy  commit suicide because of cyber bully. The news is popular and everybody discusses it. Because of it, the public begin to pay attention to the severity of cyber bully.

Cristina: I had a friend of mine that was cyber bullied because she didn’t had a fight with a girl and there was a lot of drama. So let’s call my friend girl A and the other girl B. Because girl B wasn’t part of our group because we didn’t like them but girl A liked to hang out with her which is okay because everyone can do whatever they like. However things turned a bit sour because in a party they had a fight and a lot of drama happened. The thing is girl B is part of the popular group of school and all her group of friends and her boyfriends group gang up on her sending her tons of hate mail. She was sad about it and she felt like she was completely betrayed by someone that she consider her friend because of a stupid fight. They got called to see the principal and they all had to write apology letter and apologize to her in person. She could never be friends again but we all got over it. 
 
Y
oyi: I didn’t like to see some things like hurting other people so I get nothing to share, but my brother have been cyberbully  from his secondary school,that some of the student use Facebook to create another Facebook with my brother name and write many things bad about his school, but how do we find out? because their classmate show it to the school, but it is ridiculous, because that Facebook website it all Spanish how my brother just enter the school can write spanish so well , but anyway we didn’t find out who did it, but my brother just change school and he is well there.

6th: How to help the victims or to prevent cyber bully?

Dolphin: You can just off all your social websites and don’t use it, maybe it looks like you are evading but the truth is if you didn’t saw those comment, you will not be hurt. We can’t make sure everyone like us. We are not perfection.

Yoyi: I think  we need to be care about the others  and help the one who need helps them to solve the problem and tell the parents the situation not just cover it with secret and that the bullyier knows that you didn’t care and it is not funny, so the bullyier will stop, all of it is from my own experiences, because even the buller will get bored from bullying the others. Cristina: The only thing I can think so is blog people. Many websites have policies against hate speech towards other people. Also stop visiting or using the places where you are getting hate from. Is like in real life if someone is being rude and you don’t like it, just avoid them all together and ignore them, I think engaging in the hate just makes it worse. 

Amy: People should care more about their friends, family, and classmates. We should tell bully sufferers they are not alone, and accompany them to face cyber bully. 



Thursday, June 16, 2016

Future-teaching


A lesson plan (Future Education)




• 1. Subject: Music


• 2. Target: Learn to be independent, improve students self-learning skill and team-working, and know how to increase your own knowledge. 


• 3. Content: S
ymbol , Tempo, Pitch and Music with diverse culture

• 4. Process: Teach by using all sorts of high technology that produce in future world. Learning by yourself. You may also learn with your friends via online.





Video:

This is a story about how is the future life going to be, in that time, we don't need any teachers, we learn things ourselves and we even can use those technology to practice with our friends.
In fact, it's all dream.

Internet addition

How should school personnel and parents identify, prevent and educate students on the dangers of Internet addictions? 

It’s often more about teaching them to control their impulses and manage their own behavior than it is about addiction. For example,
- If a child’s grades are suffering because the game is so compelling that she cannot break away, then a rule limiting screen use until all homework is done may be necessary.
-If they have stopped reading because it’s much more fun to play Virtual Families or post pictures of puppies on Instagram, then give them 30 minutes a day online and let them figure out how to fill the rest of their time.
-If they spends more time playing with virtual characters on Order and Chaos than he does with real people in real life, it’s time to help him find an extracurricular activity that suits his interests and temperament.

-Most important is> show your care, it will help to begin your discussion by reminding your child that you love him or her and that you care about his or her happiness and well-being.


Moreover,
When Internet addiction is considered to be a disorder, students have become addicted to digital technology. It will affect human mental health, for example, if someone is hurt on the public station, and no one is going to care about it or even see it, because everyone are just looking at their cell phone, that also will be a problem to communicated with a real person in society.Usually the most addictive of internet is many people stuck in gaming, they think the game world is real, and don’t want to leave,they think in the internet can escape from reality, and they didn’t realize they have become the internet addiction to digital technology.