Anda di halaman 1dari 2

Chapter 9 -- REFLECTIVE JOURNAL ENTRIES

100 Points

The reflective journal entry assignment will be related to content concepts covered in
class readings. Keyboard your reflective entry and submit on the journal entry link.

Use this form to keyboard your reflective journal entry.

The journal entry must address the following three (3) questions:

1. Which concept (s) had the most value in developing my understanding of the
topic? Why?

The concept that has most value in developing my understanding is Cybercrime and
identity theft. Knowing the type of cybercrimes and how to take precautions helps to
understand how to protect ourselves. Avoiding dangers from serious matters like
computer intrusions and blackmail can be done only by having appropriate
knowledge about cybercrime. The kind of cybercrimes conducted over internet and
other categories of crimes FBI related scams, identity theft, non-delivery of
merchandise and advance fee fraud has no fool proof protection methods but being
aware and taking precautions that will help you minimize your risk.

2. Which concept (s) was the most interesting? Why?

The most interesting concept is understanding Hackers. The method a hacker uses
to access a computer through internet is interesting, as internet connection is a two-
way street, making chance for hackers to access through logical ports. Beside
stealing information hackers use computer as a staging area for mischief. Hackers
use programs like Trojan, Backdoor programs, rootkits, botnets, denial-of service
attacks to gain access to computers unlawfully is an interesting topic to learn.

3. Which concept (s) has the most applicability to my career development? Why?

The most applicable concept to my career development is restricting access to


digital assets. Keeping hackers at bay is often a matter of keeping them out by
preventing them from accessing our computer, protecting our digital information in
such a way that it cant be accessed, and hiding our activities from prying eyes.
Knowing how firewalls protect from hackers by blocking access to logical ports and
keeping our computer network address secure is important.

Written work must reflect the professional use of Standard American English
grammar, spelling, and punctuation.
You must use your computers spell check and grammar check functions to edit
and proof read your work.

It is strongly recommended that you team with someone in your group or


someone else in the class to collaborate with as peer editors.

Anda mungkin juga menyukai