Online Safety Lab II

CS 102

Sept. 22, 2006

Name(s)

Introduction

This lab will help us discover:

  1. How to find out information about specific viruses and how to recover one's computer from a virus infection.

  2. What kind of firewall protection the free version of Zone Alarm provides.

  3. What things to be aware of while shopping online.

  4. How to protect our privacy online.

A side aim of this lab is to sharpen you search skills on the Web. In some cases, this lab leads you to a specific Web site, but you may have to dig around to get the information you need. In other cases, you may have to use the Google search engine.

Lab

  1. Visit Symantec Security Response at http://securityresponse.symantec.com and answer these questions:
    1. What kind of virus is Subseven? What kind of capabilities does it offer to an attacker? How much of a threat would you consider it to be?

      Answer:














    2. What kind of virus is W32.Beagle? What kind of capabilities does it offer to an attacker? How much of a threat would you consider it to be?

      Answer:














    3. What kind of free virus removal tools are available from the Web site? Would they serve as a substitute to buying an installing anti-virus software? Why or why not?

      Answer:




















    4. What is the ``Good Times'' virus?

      Answer:














  2. Visit the Zone Labs Web site at http://www.zonelabs.com/ and answer the following questions about free Zone Alarm (you may need to visit the Service & Support part of the Web site and look through Zone Alarm's User Guide to answer some of these questions):
    1. Are you completely safe once you install it? (Does it offer Program Control?)

      Answer:














    2. Does it protect against incoming attacks? Outgoing attacks?

      Answer:














    3. What is ``malware'' (perform a site search at Zonelabs)?

      Answer:














    4. Look up ``malware'' at Wikipedia (http://www.wikipedia.org/) Which is the more useful definition of malware and why?

      Answer:














  3. Answer these questions about online shopping:

    1. Visit Amazon.com. With whom does Amazon.com share customer information? Name three ways Amazon.com works with you to secure your personal information.

      Answer:














    2. Now visit Froogle.com. Compare and contrast it with Amazon.com. If you were extremely security conscious, would you prefer to shop at Amazon or Froogle? Why?

      Answer:














    3. Critique the following woeful tale. What mistakes were made?
      I recently bought an item at a site I found after doing a Web search. The name of the site is www.scams-r-us.com.ru. When requested, I entered my personal information. The browser didn't display the little ``locked'' icon, but that must have been a bug in the browser software. They asked for payment via a personal check, which I was glad to give since my credit card balance is so high right now. I think this is a foreign company and no one I know had ever heard of them, but, hey, they're on the Internet so they must be legitimate! They even let me set-up a password-protected account page. I used the same password that I use for my online bank account. (The password is ``dog'', but don't tell anyone!).

      Answer:




















  4. Visit the Privacy Rights Clearinghouse at http://www.privacyrights.org/ and answer the following questions:

    1. Find the information on privacy in cyberspace and list what you consider to be the three most important tips for safeguarding your privacy in cyberspace.














    2. Find the information on identity theft and list what you consider to be the three most important tips for safeguarding your identity.














    3. What is a ``dumpster diver?''














    4. What should you do with pre-approved credit offers and other documents, containing identity information, that you wish to discard?














    5. Try one or more of the identify theft quizzes. How high is your identify theft ``IQ''?



Thomas P. Kelliher 2006-09-20
Tom Kelliher