Monday, March 21, 2011

Kat Dion Chapter 5

Name Kat Dion                                                                                                                 Class time:12pm
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author: Sara Baase
Date of Publication: 2008
Book: Gift of Fire
Sections read: 5.1 5.2 5.3

1.       (Knowledge)Tell three interesting elements of this chapter:
a.         That hackers are so intelligent they can hack into government websites and change things.
b.       That in 1965 there were over 500,000 hacker attacks on department of defense networks, but the hackers didn’t change anything. 
c.       To protect people from identity theft some institutions install an identification number on the customers laptop and then verify the machine when the customer logs in. 

2.       (Comprehension) Summarize what is being discussed within this chapter?

This chapter talks about how hackers get into government and business websites and what the government has done to stop them. This chapter also discusses identity theft and how large it is in today’s society and what being done to reduce and or stop identity thefts.


3.       (Application)Name a specific example or NEW solution for this type of problem/similar situation in  society or that you have experienced – be specific and explain?

My grandparents had their identity stolen when they were on vacation in Florida, as they were driving through Georgia their credit company called and asked if  they had used their credit card at a gas station in Daytona and they said no so they ma nagged to deactivate that credit card and catch the thieves before anything else happened,


4.       (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter  to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences. 

Back when I was in middle school we had this mysterious kid that would somehow gain access into all of our lockers and take what was valuable like lunch money cd players Gameboys or even sometimes homework and use it for himself. He was eventually caught and ever since then they keep everyone’s combination under lock and key. Some lockers and still broken into but today it’s for calculators PSP’s or Ipods. The issue that’s being presented within the reading neglects to mention how hackers can hack into your own computers as your using them and see what you’re doing this is a way they can plant viruses and or  get the necessary information to steal your identity.

5.       (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)?  What new conclusions can you draw about this (or other topics) after reading this material?

Yes I back up what’s being said because it is an epidemic the idea oof hackers and as technology advances so do they. What I can draw from this chapter is to be more careful with my information and what I put out on the web because dealing with identity theft doesn’t seem like something I want to handle.

6.       (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter?  What new ideas will you make after reading this chapter?


His topic is extremely relevant in today’s society, hackers are larger than ever. There is people that are trained to hack into websites so that they can tell the government were their weaknesses are to stop other hackers from gaining access.  The reason I am so strongly against hackers and identity thieves is because these things have happened to my friends and family. I’ve even have a friends credit card stolen out of their mailbox and used to the maximum credit limit. Hacking is wrong and don’t do it if you don’t want it to happen to some one you know.

No comments:

Post a Comment