CALS 002/085 Third and Final Exam Study Guide
CALS 002/085 Third and Final Exam Study Guide CALS 002
Popular in Foundation:Information Tech
verified elite notetaker
Popular in Calculus and Pre Calculus
This 7 page Study Guide was uploaded by HD on Sunday April 17, 2016. The Study Guide belongs to CALS 002 at University of Vermont taught by Thomas P. DeSisto in Spring 2016. Since its upload, it has received 130 views. For similar materials see Foundation:Information Tech in Calculus and Pre Calculus at University of Vermont.
Reviews for CALS 002/085 Third and Final Exam Study Guide
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 04/17/16
CALS 002/085 Exam 3 Study Guide 1 & 2. Security Risk Assessment o Assets something you value o Threats something that could damage or destroy your asset o Types Qualitative Informed opinions regarding assets and threats Quantitative Assigning money values to assets Using formula to calculate change and cost of expected loss Example: Your hardware and data Flash drives Phones Laptops Etc. All things left behind in places Example: University research Data security for UVM research 3. Threats to Hardware, Software and Data Physical hazards Water Electrical surge Etc. Hardware failure Software failure User error Loss or destruction (physical and digital) Outside attacks Removal or destruction (physical and digital) 4. Actions to secure Hardware, Software and Data o Keep protective measures up-to-date Surge protectors Wires Software Etc. o Organize and back-up systems and data Flashdrives Webfiles o Use locks and keys Actual locks Encryptions 5. Cyber Crime Threats (video) http://blog.ted.com/6-basic-tips-for-better-online-security-from-ted-speaker- james-lyne/ 80% of websites are affected—a lot of them are small businesses 6. Steps to Protect Yourself from Cyber Crime (video) 6 Steps According to James Update system and application software Have strong passwords Be suspicious Keep backups Make sure you run basic security controls Make sure you look up best practice for devices other than just your PC 7. Passwords What UVM recommends o Use strong passwords At least 8 characters, mix of characters Upper/lower case Numbers Symbols Phrases or long sentences if possible Don’t use the same password twice Use two-step authentication whenever it’s available 8. System Updates Keep protective measures up to date regarding software updates on your computer Mac and Microsoft 9. Encrypting Drives Use locks and keys to secure your data (actual locks and encryption) Encryption Software Applications o Apple FileVault o Microsoft BitLocker 10. Two Step Authentication Something the user: Knows o Password o Personal ID # o Pin # o Answer to a question Has o Authenticator device o Card o Cell phone Is o Biometrics o Fingerprint reader on the iphone from the 5s to 6s 11. Sharing Information Online and IP Address Protect Data o If you have Wi-Fi, make sure there’s a strong password o Avoid sharing a network with people that you don’t trust o If you use public Wi-Fi, use a VPN to encrypt your packets or only share your information on websites that use HTTPS IP Address = Internet Protocol Address o # assigned to a device 12. Use of ICT in the Job Search and Application Process How is ICT used during the job application process? o Networking Process in which you gather and exchange information with contacts who can help you focus your career planning and develop a network to uncover the hidden job market o Search Online databases Career events and fairs listed online Online job advertisements Etc. o Material Development Materials Cover letter Resume List of references Productivity software applications used Word processing Spreadsheets Formatting No template Pre-designed template (stock) Pre- designed template (manipulated) Self designed template o Storage Documents Spreadsheets File folders Major issues with data storage Losing specific experiences and descriptions Losing cover letter, resume, references (either completely or versions of them) o Communication In person Phone Online form Mail Email What’s the message you’re sending? Be specific o Submission o Display ICT Skills 13. Transmission of Application Materials o Submission Paper Get card stock—better than normal paper Electronic Website form Email o In body or attachment o Follow job posting submission instructions o If there’s no instruction, then use PDF format to avoid formatting issues o Save PDFs so they can be easily IDed 14. Troubleshooting o There will always be tech issues o Give yourself enough time to resolve these problems o No single person has the answer to every tech problem o If you run into a problem, chances are many people have had the same issue o Sometimes problems cant be fixed, they can only be resolved with “work arounds” Steps to Dealing with a Technology Problem o Identify the problem o Isolate the issue o Search for information on the issue o Develop a plan to resolve the issue o Implement the plan o Record the steps and results (Documentation) o Seek help if needed 15 & 16. HTTP and HTTPS o HTTP vs. HTTPS Hyper Text Transfer Protocol (HTTP) Hyper Text Transfer Protocol Secure (HTTPS) Uses HTTP and Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols What is SSL/TLS? o Technology used to create an encrypted link between web client and server Security o HTTP provides no security guarantees o Threats = eavesdropping, providing false information o HTTPS provides Server authentication Data confidentiality Data integrity Why is HTTPS not used everywhere? o Time (takes times to transfer from HTTP HTTPS o Money 17. 3D Printing o 3D Printer = process of making a physical object from a digital file, typically by laying down many successive layers of material *video* Implications of 3D printing 3D printer in VT = Generator 18. E-waste and Secure Disposal o E-waste Discarded electronic appliances such as mobile phones, computers and TVs o *video* Digital Debris o Data remains on hard drive even after you: Delete Reformat o Study—only 9% had been properly sanitized and properly removed o Securely empty your trash o Options Physical destruction of the hard drive Secure wipe of the hard drive 19. Basics of Citing and Referencing Citing One Author (Rousey, 2015) Citing Two Authors (Rousey & Holm, 2015) Citing Three or More Authors o First Citation: (Rousey, Holm, & Namajunas, 2015) o All Subsequent Citations: (Rousey et al., 2015) 20. Citing and Referencing Electronic Sources Article from an online periodical o Same guidelines as printed Online Scholarly journal article (citing DOIs) o Use alpha-numerical string as opposed to a URL Online periodical with no DOI o Use URL instead Database o APA says not necessary to cite o Provide print info Electronic books o Point readers to where they can find it if it’s not easily accessible o Include DOIs if you can
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'