CIS 101 Discussion Board Topics Fall 2008



CIS 101 Discussion Board Topics Fall 2008

Week 1 – Introductions

Week 2 – Security Chapter 1

Week 3 – Security Chapter 2

Week 4 – Security Chapter 3

Week 5 – Excel and the Workplace

Week 6 – Communication on the Net – Social Networking

Week 7 – Security Chapter 4

Week 8 – Web Site Evaluation

Week 9 – The Future of the Web

Week 10 – Security – Chapter 5

Week 11 – Security – Chapter 6

Week 2 – Security Chapter 1- Introduction to Security

Topic: Cyber Security – Why is it necessary?

Computers have revolutionized the way we live. With all of the advantages there are also many dangers that exist. Why is it so difficult to protect information in the digital age? What are some of the ways security can be breached? What are some strategies for creating a secure environment?

Week 3 – Security Chapter 2 – Desktop Security

Topic: Protecting Our Computers from Attacks?

One thing we can be sure of is if we don’t protect ourselves from malware, we risk the chance of being attacked! What are some ways hackers can break into our computers? What are some strategies to protect ourselves? What do you personally do to protect your computer from attacks? Has anyone ever been infected with a Virus? Explain what happened?

OR:

Psychology of the Hacker - Can we protect ourselves?

Microsoft announced that it will invest $5 million for a reward program to nab cyber criminals who infect the Internet with worms and viruses.

Security experts agree that the lucrative rewards should cause tongues to wag in the tight-knit, but boastful, hacker community.

Please read the article in the link below:

Microsoft Confident Bounties Will Nab Virus Writers



 

And also read the "Virus Underground"

 

Please respond to the following questions:

1- Do you think that reward money is an effective way to deter hackers and cyber criminals? Explain in your own words.

2- Would you turn someone in for $250,000? Explain

3- Why do you think Microsoft did it?

4- What other solutions if any would you recommend to curb the increased attacks of viruses, worms and other cyber crime?

5- Why do Hackers hack in the first place?

Explain.

6- Is there anyway to protect ourselves from Viruses and Cyber Crime?

Week 4 – Security Chapter 3 – Internet Security

Topic: SPAM, COOKIES, SCRIPTS – Do they have a place?

The depth of disgust for spam is evidenced in a Yahoo! Mail survey of nearly 28,000 Internet users revealing that 77 percent found it less aggravating to clean toilets than to wade through the junk messages in their e-mail. Of those respondents who think spammers should be punished, 30 percent think they should receive stiff fines, and 8 percent think they should do jail time.

One-in-five preferred to achieve balance by inundating spammers with junk mail at their own home, and a quarter of respondents were more forgiving, saying that spam was merely a job, and spammers should be spared punishment.

Is all spam bad? How different is spam from a billboard ad or TV commercials? Can spam ever be useful? What about Cookies and Pop-Up ads? What are they and do they serve any valuable purpose?

Week 5 – Excel

Topic: Excel and the Workplace

The controller of a construction company used a spreadsheet to develop a bid on a multi-million dollar office complex. At the last minute he made a change and included $254,000 for overhead expenses he had forgotten about earlier. He inserted this number at the top of a column of numbers. Unfortunately the $254,000 was not included in the final total and the contract was underbid by that amount. The construction company was awarded the contract and was forced to make good on its unrealistically low estimate. Seeking to recover its losses, the construction company took the software vendor to court. Should the construction company "win" its lawsuit against the software vendor? Why or why not? What was the probable cause of the error?

Week 6 – Online Communication

Topic: Communication on the Net – Social Networking

There are many differences between communicating via email (asynchronous) communication and face to face or voice to voice (synchronous) communication. In the digital era we find those that would rather sift through dozens of spam mails rather than talk on the phone or better yet get together face to face?

What are the advantages and disadvantages of email / instant messaging /texting/Blogging/Virtual Communities like MySpace/Facebook VS. face/voice communication. Certainly there are pluses and minuses for each of them. Discuss at least two of each and discuss your personal preference for communicating with family, friends, work and school.

or:

The FACEBOOK Phenomenon

Here are the facts about Facebook: It’s the 6th most popular website in the world, it has over 60 million active users, 250,000 new people join every day, it gets more than 65 billion (yes billion) page views per month, 56% of the members are over 25 years of age, 55% of the members are female, 35% of members earn more than $60,000/year, and 23% earn over $100,000/year.

How do we explain the incredible success of this Social Networking Web Site? What is the attraction? Are you a Facebook user?





YouTube

Week 7 – Security Chapter 4 – Personal Security

Topic: Spyware and Identity Theft – Can one have Privacy Online?

What are some of the ways our privacy can be compromised online? What tactics are used by cybercriminals to obtain our personal information? What can be done to protect ourselves? Do you know someone who has been a victim of phishing or identity theft?

Week 8 – Web Site Evaluation

Topic: What Makes a Great Web Site?

Please read the articles below before responding to the question:





What makes a website a great website?  Give one example of what you consider to be a good website and one example of what you consider to be a bad website. Explain your choices and criteria you used. Please create a link to each website within your response to the discussion board.

Week 9 – The Future of the Web

Topic: The Future of the Web – What lies ahead?

Most of us would agree that as consumers, our experience with technology and the internet has only begun! There are futurists out there that are describing a world where everything (internet appliances/smart devices) talk to everything else out there. 

Please take the links below, and let's discuss the futuristic visions explained in the article links. Are they just fanciful ideas or will they be realties for the masses in just a short time?

Virtual Economies:

 

(I'm especially interested in your reaction to this Virtual Reality Model!)

Homes of the Future:

 





When Cars start to talk?



Smart Carts: Shopping in the (near) future



Week 10 – Security – Chapter 5 – Network Security

Topic: Network Security – Dangers & Solutions

Networks serve an important purpose in allowing computers to share data and devices.

The Internet is the ultimate network allowing everyone connected to access data and information. What are some ways networks can we compromised? What are the specific dangers of using a wireless network (WIFI)? Has anyone ever had any information breached while on a wireless network?

Week 11 – Security – Chapter 6 – Enterprise Security

Topic: Enterprise Security – A Defensive Strategy?

If you were asked to develop a plan for securing the computer labs at PACE University from physical and information theft what steps would you take to protect your enterprise from attack?

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download

To fulfill the demand for quickly locating and searching documents.

It is intelligent file search solution for home and business.

Literature Lottery

Related searches