CIS 105 MENTOR Career Path Begins/cis105mentor.com CIS 105 MENTOR Career Path Begins/cis105mentor.com | Page 6

computer on the wireless system and found, to his dismay, some bank accounts and passwords. · Think about how you would feel if James were parked outside your home, using your wireless network. · Refer to Ch. 12 in Computing Fundamentals · Explain the following in 350 to 700 words: Before this class, what means, if any, were you employing to protect yourself in the cyber world? What security measures are available to the average computer user? What is missing from the system James “borrowed?” Which do you think are most important? How might you change your approach to online security in the future? · Cite any resources used in APA format. · Post the CheckPoint as an attachment --------------------------------------------------------------------------------------- CIS 105 CheckPoint: Data Versus Information FOR MORE CLASSES VISIT www.cis105mentor.com