New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

CALS 002/085 Third and Final Exam Study Guide

by: HD

CALS 002/085 Third and Final Exam Study Guide CALS 002

Marketplace > University of Vermont > Calculus and Pre Calculus > CALS 002 > CALS 002 085 Third and Final Exam Study Guide

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

This is the study guide for our last exam in the class!
Foundation:Information Tech
Thomas P. DeSisto
Study Guide
50 ?




Popular in Foundation:Information Tech

Popular in Calculus and Pre Calculus

This 7 page Study Guide was uploaded by HD on Sunday April 17, 2016. The Study Guide belongs to CALS 002 at University of Vermont taught by Thomas P. DeSisto in Spring 2016. Since its upload, it has received 130 views. For similar materials see Foundation:Information Tech in Calculus and Pre Calculus at University of Vermont.

Popular in Calculus and Pre Calculus


Reviews for CALS 002/085 Third and Final Exam Study Guide


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 04/17/16
CALS 002/085 Exam 3 Study Guide 1 & 2. Security Risk Assessment o Assets  something you value o Threats  something that could damage or destroy your asset o Types  Qualitative  Informed opinions regarding assets and threats  Quantitative  Assigning money values to assets  Using formula to calculate change and cost of expected loss  Example: Your hardware and data  Flash drives  Phones  Laptops  Etc.  All things left behind in places  Example: University research  Data security for UVM research 3. Threats to Hardware, Software and Data  Physical hazards  Water  Electrical surge  Etc.  Hardware failure  Software failure  User error  Loss or destruction (physical and digital)  Outside attacks  Removal or destruction (physical and digital) 4. Actions to secure Hardware, Software and Data o Keep protective measures up-to-date  Surge protectors  Wires  Software  Etc. o Organize and back-up systems and data  Flashdrives  Webfiles o Use locks and keys  Actual locks  Encryptions 5. Cyber Crime Threats (video) james-lyne/  80% of websites are affected—a lot of them are small businesses 6. Steps to Protect Yourself from Cyber Crime (video)  6 Steps According to James  Update system and application software  Have strong passwords  Be suspicious  Keep backups  Make sure you run basic security controls  Make sure you look up best practice for devices other than just your PC 7. Passwords  What UVM recommends o Use strong passwords  At least 8 characters, mix of characters  Upper/lower case  Numbers  Symbols  Phrases or long sentences if possible  Don’t use the same password twice  Use two-step authentication whenever it’s available 8. System Updates  Keep protective measures up to date regarding software updates on your computer  Mac and Microsoft 9. Encrypting Drives  Use locks and keys to secure your data (actual locks and encryption)  Encryption Software Applications o Apple FileVault o Microsoft BitLocker 10. Two Step Authentication  Something the user:  Knows o Password o Personal ID # o Pin # o Answer to a question  Has o Authenticator device o Card o Cell phone  Is o Biometrics o Fingerprint reader on the iphone from the 5s to 6s 11. Sharing Information Online and IP Address  Protect Data o If you have Wi-Fi, make sure there’s a strong password o Avoid sharing a network with people that you don’t trust o If you use public Wi-Fi, use a VPN to encrypt your packets or only share your information on websites that use HTTPS  IP Address = Internet Protocol Address o # assigned to a device 12. Use of ICT in the Job Search and Application Process  How is ICT used during the job application process? o Networking  Process in which you gather and exchange information with contacts who can help you focus your career planning and develop a network to uncover the hidden job market o Search  Online databases  Career events and fairs listed online  Online job advertisements  Etc. o Material Development  Materials  Cover letter  Resume  List of references  Productivity software applications used  Word processing  Spreadsheets  Formatting  No template  Pre-designed template (stock)  Pre- designed template (manipulated)  Self designed template o Storage  Documents  Spreadsheets  File folders  Major issues with data storage  Losing specific experiences and descriptions  Losing cover letter, resume, references (either completely or versions of them) o Communication  In person  Phone  Online form  Mail  Email  What’s the message you’re sending? Be specific o Submission o Display ICT Skills 13. Transmission of Application Materials o Submission  Paper  Get card stock—better than normal paper  Electronic  Website form  Email o In body or attachment o Follow job posting submission instructions o If there’s no instruction, then use PDF format to avoid formatting issues o Save PDFs so they can be easily IDed 14. Troubleshooting o There will always be tech issues o Give yourself enough time to resolve these problems o No single person has the answer to every tech problem o If you run into a problem, chances are many people have had the same issue o Sometimes problems cant be fixed, they can only be resolved with “work arounds”  Steps to Dealing with a Technology Problem o Identify the problem o Isolate the issue o Search for information on the issue o Develop a plan to resolve the issue o Implement the plan o Record the steps and results (Documentation) o Seek help if needed 15 & 16. HTTP and HTTPS o HTTP vs. HTTPS  Hyper Text Transfer Protocol (HTTP)  Hyper Text Transfer Protocol Secure (HTTPS)  Uses HTTP and Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols  What is SSL/TLS? o Technology used to create an encrypted link between web client and server  Security o HTTP provides no security guarantees o Threats = eavesdropping, providing false information o HTTPS provides  Server authentication  Data confidentiality  Data integrity  Why is HTTPS not used everywhere? o Time (takes times to transfer from HTTP  HTTPS o Money 17. 3D Printing o 3D Printer = process of making a physical object from a digital file, typically by laying down many successive layers of material  *video* Implications of 3D printing  3D printer in VT = Generator 18. E-waste and Secure Disposal o E-waste  Discarded electronic appliances such as mobile phones, computers and TVs o *video* Digital Debris o Data remains on hard drive even after you:  Delete  Reformat o Study—only 9% had been properly sanitized and properly removed o Securely empty your trash o Options  Physical destruction of the hard drive  Secure wipe of the hard drive 19. Basics of Citing and Referencing  Citing One Author (Rousey, 2015)  Citing Two Authors (Rousey & Holm, 2015)  Citing Three or More Authors o First Citation: (Rousey, Holm, & Namajunas, 2015) o All Subsequent Citations: (Rousey et al., 2015) 20. Citing and Referencing Electronic Sources  Article from an online periodical o Same guidelines as printed  Online Scholarly journal article (citing DOIs) o Use alpha-numerical string as opposed to a URL  Online periodical with no DOI o Use URL instead  Database o APA says not necessary to cite o Provide print info  Electronic books o Point readers to where they can find it if it’s not easily accessible o Include DOIs if you can


Buy Material

Are you sure you want to buy this material for

50 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Jim McGreen Ohio University

"Knowing I can count on the Elite Notetaker in my class allows me to focus on what the professor is saying instead of just scribbling notes the whole time and falling behind."

Jennifer McGill UCSF Med School

"Selling my MCAT study guides and notes has been a great source of side revenue while I'm in school. Some months I'm making over $500! Plus, it makes me happy knowing that I'm helping future med students with their MCAT."

Steve Martinelli UC Los Angeles

"There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."

Parker Thompson 500 Startups

"It's a great way for students to improve their educational experience and it seemed like a product that everybody wants, so all the people participating are winning."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.