Computer Crimes: Security Implications to Minimizing Vulnerability
Peer Review for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
User Rating for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Member Comments for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Bookmark Collections for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Course ePortfolios for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Learning Exercises for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Accessibility Info for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
A Bookmark with this title already existed.
Please limit a note about this material to 2048 characters
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II




        

Search > Material Results >

Computer Crimes: Security Implications to Minimizing Vulnerability

        

Computer Crimes: Security Implications to Minimizing Vulnerability

Logo for Computer Crimes: Security Implications to Minimizing Vulnerability
Computer Crimes: Security Implications to Minimizing Vulnerability There are seven common online blunders that make people vulnerable to viruses and theft: 1. Assuming your security software is protecting you; 2. Accessing an account through an e-mail link; 3. Using a single password for all online accounts; 3. Using a single password for all online accounts; 4. Downloading free software; 5. Thinking your Mac shields you from all risks; 5. Clicking on a pop-up ad that says your PC is not secure;... More
Material Type: Assessment Tool
Technical Format: HTML/Text
Date Added to MERLOT: October 06, 2009
Date Modified in MERLOT: July 02, 2012
Author:
Send email to aokpala@dillard.edu

Quality


  • Rate this material
  • Create a learning exercise
  • Add accessibility information
  • Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
    Name the Bookmark Collection to represent the materials you will add
    Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
    Edit the information about the material in this {0}
    Submitting Bookmarks...

About

Primary Audience: College General Ed
Mobile Compatibility: Not specified at this time
Language: English
Material Version: Text
Cost Involved: no
Source Code Available: yes
Accessiblity Information Available: yes
Creative Commons: no

Connections





QR Code for this Page

Users who viewed this material also viewed...

Discussion

Discussion for Computer Crimes: Security Implications to Minimizing Vulnerability

Log in to participate in the discussions or Register if you are not already a MERLOT member.

Return to Top of Page
Avatar for Azubike Okpalaeze
5 years ago

Azubike Okpalaeze (Faculty)

Used to enhance students understanding of computer crime vulnerability and how to avoid common pitfall and consequent financial and emotional losses.
Time spent reviewing site: Thirty minutes
Used in course