working and he had an important project due that day. James was in a
small town about
an hour away from the nearest internet kiosk, so he decided to drive
around a nearby
suburb to see if he could find a wireless system he could “borrow” to
send out his project.
James found a wireless system without a security key and, after
parking near the home
with the system, uploaded the project. Afterward, just for fun, James
peaked into the
computer on the wireless system and found, to his dismay, some bank
accounts and
passwords.
· Think about how you would feel if James were parked outside your
home, using your
wireless network.
· Refer to Ch. 12 in Computing Fundamentals
· Explain the following in 350 to 700 words: Before this class, what
means, if any, were
you employing to protect yourself in the cyber world? What security
measures are
available to the average computer user? What is missing from the
system James
“borrowed?” Which do you think are most important? How might you
change your