CIS 105 MENTOR It's Your Life/cis105mentor.com CIS 105 MENTOR It's Your Life/cis105mentor.com | Page 6

working and he had an important project due that day . James was in a small town about
an hour away from the nearest internet kiosk , so he decided to drive around a nearby
suburb to see if he could find a wireless system he could “ borrow ” to send out his project .
James found a wireless system without a security key and , after parking near the home
with the system , uploaded the project . Afterward , just for fun , James peaked into the
computer on the wireless system and found , to his dismay , some bank accounts and
passwords .
· Think about how you would feel if James were parked outside your home , using your
wireless network .
· Refer to Ch . 12 in Computing Fundamentals
· Explain the following in 350 to 700 words : Before this class , what means , if any , were
you employing to protect yourself in the cyber world ? What security measures are
available to the average computer user ? What is missing from the system James
“ borrowed ?” Which do you think are most important ? How might you change your