<<= Back | <<= Computer Classes | Next =>> |
In this lesson you will learn:Introduction to Theft and LossEven a casual search on the internet will reveal the statistics and numbers of thefts, loss, dollar and time costs and case histories of those who have lost vital information and equipment. The purpose of this class is to make sure it doesn't happen to you. In this class we will study the types of theft and loss than can happen. Types of TheftThe big three.
Identity theft can take the form of credit cards or personal information being used by another or as email spoof letters that seemingly come from your own mailbox. In other words, it looks to others like you sent it and that the information or request is coming from you. Cell phones and cameras are tools used regularly to film or photograph unsuspecting people, capturing keystrokes, passwords, usernames, text and other credentials that serve as doors for personal or corporate valuable information. Identity theft is covered in more detail in the Identity theft page. Types of Loss
Hacking, Viruses and Malicious Software problems are a big subject and are covered in depth throughout later lessons. The first lessons show how to recognize it and prevent it, and in more advanced lessons, how to fix it using utilities or patches. Theft theft does not mean that the object of interest is necessarily gone from the premises. It means that it is gone to YOU. Restricted access can comprise theft if something or someone has locked you out or deliberately prevents you from accessing what is rightfully yours. Any data, hardware or even your entire office can fall into the realm of theft. Freezes and Crashes: Ever felt victimize by your own computer? Operating systems or program bugs have claimed a share in the 'theft' category. What to do when it happens, how to recognize when things are not right and fixing the problem are covered in these lessons. Mistakes happen, but it isn't limited to just you. Lending your machine to others and having them take something down can add insult to injury. The best tactic of prevention is in educating the user on what NOT to do. It takes time to foresee the problems and solutions before handing things over to others. Being aware of potential problems and conveying that information in communication can be challenging. But trying to unravel the events that led to the loss through another person compounds the problem by adding the communication factor into the troubleshooting or diagnostic equation. It is easier to do the hard part of anticipation and communication in the beginning, using pass-down techniques to convey the nuances of the software, interactions and any potential surprises. |
NOTE: These are posted for student and staff educational & class use.