Ant Mimic Spider

Ant Mimic Spider
www.spiders.us

Expectations

This assignment is to investigate one of the many ways in which computers and/or software can be attacked and/or protected from attacks. Your first task is to do a small amount of investigation about some of the ideas listed below. Choose one that you are interested in, but that you do NOT know very much about already (this assignment is to help you learn more, not just show off what you already know.)

Send Mr. Taylor an e-mail requesting one of the topics. If you are the first to request it, your name will be placed beside the topic and you may start your research. If you are investigating a way that computers or software can be attacked, find out how the process works, the meanings of any special vocabulary, in what way it harms people, why it is a bad thing to do, and what individuals, the police or the government can do for protection. If you are investigating a method of protection, find out what it protects against, how it works, how much effort or cost is involved and who needs to use it.

As usual, you should put your report into a web page created with HTML tags. This time, try to make use of the ordered list and unordered list tags.

Why do you think I chose the Ant Mimic Spider for this assignment?

ThreatNameProtectionName
SpamSafSpam filtersNathan
Spoofing and PhishingBenCaptchasJack
Viruses and WormsDanielVirus checkersAdil
Identity theftKrishanPasswordsYunsun
Trojan horses and BackdoorsAndyBiometricsSafiya
Chain mailJavianFirewallsMatt
Spyware and KeyloggingAhmadBackupsDana
AdwareJacobNetwork monitor 
BotnetSherifSmartcardsRiethu
Denial-of-Service attackJoshuaCryptography or encryptionChristen
HackersMohamed E.Security updatesZiyad
Cyber-bullyingHaoHaoCopyright lawsJordan
RansomwareJazeelSafe on-line shoppingMohamed A.