Oregon State University

CS 101: Applications and Implications of Computers

Oregon State University, College of Engineering

Chapter 5 ~ How Privacy and
Security Works

⬆ Shiftrefresh Shift-Refresh this page to see the most up-to-date instructions.

When Facebook added open graph sharing of user data to its application in 2010, it allowed third-party vendors like Cambridge Analytica (UK) to scrape personal user data so it could target their news feeds with political ads. In 2011, the USA Federal Trade Commission (FTC) required Facebook to get the user's consent before sharing that data. However, that didn't happen. Consequently, 87 million users were targeted by Cambridge Analytica with misleading political ads paid for by politicians, which experts say unfairly swayed many presidential elections around the world.

ABC News bar graph showing the number of people from the USA and 9 other countries affected by the FA/CA scandal. In 2017, the USA Federal Communications Commission (FCC) voted to rescind new online privacy laws, which could have protected users better. In 2018, the European Union began regulating user consent when websites gather data. As of 2020, the USA still doesn't adequately regulate user data.

How do we ensure our privacy and security online when companies and governments may not care?

These kinds of issues and new regulations arise when companies are not fully invested in keeping our personal data safe. In addition, most people are not careful with their data.

In this chapter, we'll explore the Facebook scandals in more detail as well as research and write about other malicious acts. Then, you'll create another slideshow based on your previous template and write about privacy, security, and prevention topics. The bibliography will be added to the last slide and you'll once again share the live presentation by hyperlinking it in your What I've Learned document.

Group Collaboration

Instead of using the Canvas Discussion this week, you'll use the Canvas Collaboration tool in conjunction with a Canvas Assignment. Click this Chapter's Assignment in Canvas to locate the Ch 5 Collaboration ~ Facebook Scandals and Malware Terms file.

Access to the Collaboration Document will be provided the week it is due. Instructions are provided in that file. Login to your OSU Google Account and Launch Canvas before you attempt to open the file. Do not open the file from an email message.

5.1 Research Facebook Scandals.

Shame Never Sleeps: Updating the Facebook Timeline of Scandal and Strife
  1. Choose one Facebook Scandal from one of the following timeline articles and summarize it in the Collaboration document.
  2. Hint: type your name under the topic heading to hold your place.
  3. Replace your name with your summary paragraph.
  4. Use Google, Google Scholar, Bing, Library Databases, and/or the SmartNews app to assist with research.
  5. Cite the articles you refer to by hyperlinking their titles in a sentence.

5.2 Research Malware.

David McCandless, Tom Evans, Paul Barton, Dr Stephanie Starling, Duncan Geere, sources: databreaches.net, IDTheftCentre and media reports

This section of the assignment uses the Collaboration document you contributed to in the previous step.

  1. Explore the Worlds Biggest Data Breaches & Hacks infographic. Do you see an interesting topic you'd like to explore further? Use links in the infographic to learn more about a malware incident.
  2. Choose one Malware term from the list below (and purple heading in the Collaboration Document).
    • Advanced Persistent Threads (APT)
    • Backdoor
    • Botnet
    • Browser Hijack
    • Brute Force
    • Click Bait, Engagement Bait, Malvertising
    • Cryptojacking
    • Cross-site Scripting
    • Cyberflashing
    • Cyberwarfare
    • Deep Fake
    • Dedicated Denial of Service Attack (DDoS)
    • Doxing and Swatting
    • Drive-by downloads
    • Fileless Malware
    • Geotagging
    • Injection Attack
    • Keylogging
    • Man-in-the-Middle attacks
    • NAND Mirroring
    • Pharming
    • Phishing and Spear Phishing
    • Rainbow Table Attack
    • RAM Scraper
    • Ransomware
    • Robocall
    • Rogue Security Software
    • Remote Access Trojan (RAT)
    • Rootkit
    • Spoofing, watering hole
    • Spyware, Stalkerware, and Snooping (sound, video, webcam)
    • Super-cookies, Evercookies, Zombie Cookies, Sidejacking
    • Social Engineering, Pretexting
    • Trojan Horses
    • Worms
    • Zero-hour Auto Purge (ZAP)
    • Zombie computer
    • Zoombombing
  3. Hint: Type your name under the topic heading to hold your place.
  4. Replace your name with a definition of the term.
  5. Also, summarize an actual case of its use. Which company fell victim to a similar breach and how did it happen?
  6. Use Google, Google Scholar, Bing, Library Databases, and/or the SmartNews app to assist with research.
  7. Cite the articles you refer to by hyperlinking their titles in a sentence.
  8. Copy your work into a separate word processing document.
  9. Save this new file as a PDF.
  10. Submit the file in Canvas for a plagiarism check.

5.3 Review the Collaboration writing.

Before the end of Tuesday:

  1. Read through and edit the summary below your entry in the Collaboration Document.
  2. Improve grammar, spelling, formatting, and consistency.
  3. Cite all sources by hyperlinking the title in each paragraph.
  4. Add the references to the Bibliography if they are missing (brown heading at the end).

To confirm you met all requirements, view the Canvas Assignment Rubric.

The instructor and TAs can see who wrote and corrected the paragraphs and bibliography in the Collaboration Document's Activity Dashboard.

Read the final document (Canvas PAGES area) so you understand what all the terms mean.

Reuse the Slide Design

Ensure your slideshow design meets requirements, then reuse it in a new slideshow.

5.4 Create a new presentation file.

Cover has an orange background, white heading, and purple name. Text master slides are designed with smaller margins, purple headlines, and dark gray text set in Tahoma 18pt with 1.5 line height.

If your Chapter 4 master slides look like these designs then continue on. If not, adjust the CS 101 Cover and CS 101 Text master slide designs to match. The slide dimensions should be set to Widescreen (16:9) (in PowerPoint, set the Slide Size to 10 by 5.63 inches).

The CS101 Cover slide master should have an Orange background, centered White bold heading in Tahoma font, and a Purple or Dark Magenta 2 name in Tahoma font in the default sizes. The OSU logo should be rendering with a transparent background in the lower left corner of the cover, just shy of the edges.

The CS 101 Text slide master should have smaller margins (the textboxes should touch the left, bottom, and right edges as well as the bottom of the heading textbox). The headings should be set to Tahoma Bold size 33pt in Purple or Dark Magenta 2. The textbox should be set to dark gray color in Tahoma 18pt with 1.5 line height. If you set the text size to 18pt with 1.5 line spacing, then 10 or 11 lines of text should fit nicely under the heading. If you want to write more than 10 lines of text for any given topic, add a second slide.

The Bibliography should be set to 12pt numbered line items.

Continue to set up the new presentation:
  1. Launch the presentation application:
    • Microsoft PowerPoint:
      1. Open your existing chapter 4 slideshow How Internet Search Works.
      2. From the View menu, choose Slide Master.
      3. Shift-click to select the two master designs you created in chapter 4 (CS 101 Cover and CS 101 Text) then Copy them with Ctrlc or c.
      4. From the File menu, choose New > Blank Presentation.
      5. From the View menu in this new blank file, choose Slide Master.
      6. Click the Slide Size menu and choose Page Setup to change the dimemsions to 10 inches by 5.63 inches.
      7. Paste in the two master slides you copied from chapter 4's file using Ctrlv or v.
      8. If the logo did not copy over, then copy and paste it again and move it to the bottom left corner of the Master CS 101 Cover slide.
    • Google Slides:
      1. From your CS 101 folder on the Google Drive:
      2. Choose + New > Google Slides > Blank Presentation.
      3. From the Format or Themes pane, choose Import Theme at the bottom right of the screen.
      4. Import the theme from your chapter 4 presentation file called How Internet Search Works.
      5. Select the Simple Light theme with orange cover slide. Then, click Import Theme.
      Margaret Deuth demonstrates this step and the next four for Google Slides users.
  2. Name the file How Privacy and Security Works.
  3. Apply the CS101 cover layout to the cover slide and click into the headline textbox and type How Privacy and Security Works. Add your first and last name to the second textbox.
  4. Add a second slide and apply the CS101 text layout.
  5. Now, make 8 copies of this second slide.
  6. Update the headline for each slide as per the topics/articles you'll focus on in the next steps.

Need the Instructor's help?

If you have questions about completing the technical skills or the writing, you can share your file with the instructor.

  • Share a Google file:
    1. With your file open, click the Sharing button at the top right of the screen. Or, if the file is not open but listed in the Drive, right-click it to choose the Share menu.
    2. Click the Get Link box to update the OSU Settings and copy the link:
      Change settings so that only OSU people can view. Copy the link.
    3. Ignore the Share with People and Groups box for this course.
      Don't share your files this way for this course.
    4. Paste the URL into the Canvas Inbox message or Assignment Comment box, along with your questions. Note which step number you're stuck on.
  • Share a Microsoft file:
    1. Login to your OSU OneDrive account from the browser.
    2. Drag the file from your hard drive to the OSU OneDrive file list in the browser to transfer it there.
    3. Beside the file name in the list, click the Share icon:
      Click the Share icon for the file to change the settings.
    4. Choose the settings provided in the screenshot below:
      Change settings so that only OSU people can view it without editing or downloading.
    5. Copy the link so you can provide it to the instructor or in the Assignment Comment box.
      Click the Copy Link icon. Select and copy the link.
    6. Paste the URL into the Canvas Inbox message or Assignment Comment box, along with your questions. Note which step number you're stuck on.

Cybersecurity problems and solutions

Learn about privacy and cybersecurity problems and solutions by reading/viewing the following sources and writing about them in the new presentation file.

Each text slide should have one paragraph of writing (about 10 lines or 130 words), however, you may add more slides to accommodate more than 10 lines of writing for any given topic. The line-height should stay at 1.5 on each text slide.

5.5 Research and write about data privacy.

  1. On slide 2, update the Title to say International Data Privacy and write about what you learned from one of the topics listed the Electronic Frontier Foundation's (EFF) Privacy page. Choose a topic that relates to you and your major course of study, if possible. Add the article to your bibliography tool. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.
  2. On slide 3, update the Title to say GDPR and summarize what you learned from about the GDPR from infographic: European Commission’s overview of the General Data Protection Regulation (GDPR) Add the website to your bibliography tool. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.

5.6 Research and write about cybersecurity

  1. Cybersecurity, Crash Course #31, edited by Brandon Brungard for PBS.. Add the movie to your bibliography tool.

    On slide 4, update the Title to say Online Security and summarize what you learned about online security, such as threat model, authentication, passwords, and avoiding problems. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.

5.7 Research and write about prevention.

  1. Click to read: 11 Tell-Tale Signs Your Accounts and Devices Have Been Hacked. Add the article to your bibliography tool. On slide 5, update the Title to say Malware Symptoms, Prevention, and Removal and summarize what you learned about symptoms, prevention, and removal of malware. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.

5.8 Research and write about improving privacy.

  1. Click to read: Want to browse the web privately? Here’s how to do it for real. Add the article to your bibliography tool. On slide 6, update the Title to say Private Browsing and summarize what you learned about private browsing. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.
  2. Click to read: How to Opt Out of Targeted Ads Around the Web. Add the article to your bibliography tool. On slide 7, update the Title to say Opting out of Online Advertising and summarize what you learned about opting out of online advertising. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.
  3. Click to read: The Best Free Password Manager 2020. Add the article to your bibliography tool. On slide 8, update the Title to say Password Management Software and summarize what you learned about password management software. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.
  4. Extra Credit: Click to read the full article and listen to the podcast. I Gave a Bounty Hunter $300. Then He Located Our Phone Add the article to your bibliography tool. On slide 9, update the Title to say How Phone Companies Sell Location Data and summarize what you learned about it. Right-click on the article's title above and choose Copy link address, then, select the name of the article in your paragraph and Ctrlk or k to add a hyperlink. Select important keywords and apply the Bold style.
  5. Check and correct grammar and spelling using the built-in functions, Grammarly plugin, or LanguageTool Chrome extension.
    • Click the Review tab on the ribbon. Click Spelling or Spelling & Grammar.
    • Click Tools > Check Spelling > Spell check. A box will open in the top right corner.
    • ; or choose Edit > Spelling and Grammar > Check Grammar With Spelling (a checkmark indicates it’s on), then choose Check Document Now.

5.9 Add a Bibliography.

Add a new slide (9 or 10) and update the title to say Bibliography. Paste in the bibliography entries saved from your bibliography tool. There should be at least 7 or 8 entries. Be sure to add author names, titles, publish dates, and publisher names if your tool did not provide them (for example, YouTube is not the author, title, or publisher of user-uploaded media). Select all of the bibliography text, and apply size 12pt then, click the numbering icon to separate them.

Right click to restarting numbering for numbered lists. All of this chapter's sources should fit on one slide, however you can add another slide and restart the numbering if needed. From the second bibliography slide's textbox (Google Slides), apply size 12pt and the numbering icon, then right-click and choose Restart Numbering (Slides) or Start At (PowerPoint) field and type in the number needed to continue the list.

Save the file with Ctrls or s.

Add the presentation to the document.

5.10 Save as PDF

Save the presentation as a PDF file.

  • File > Export as PDF/XPS. Save the file to your CS 101 folder on the hard drive.
  • File > Download as PDF. Save the file to your CS 101 folder on the hard drive or Google Drive.
  1. In order for others to see your presentation without having to download, ask for permission, or look at your editing file, share it publically, or publish it to the web. The goal is to provide a live link that starts the presentation in presentation mode without any hassles. Share/publish the file using the correct cloud drive:
      1. Save > Save as PPSX or Show... file.
      2. Login to your OSU OneDrive account from the browser.
      3. Drag the file from your hard drive to the OSU OneDrive file list in the browser to transfer it there.
      4. Beside the file name in the list, click the Share icon:
        Click the Share icon for the file to change the settings.
      5. Choose the settings provided in the screenshot below:
        Change settings so that only OSU people can view it without editing or downloading.
      6. Copy the link so you can use it in the next steps.
        Click the Copy Link icon.
        Select and copy the link.
    • File > Publish to the web > Publish. Copy the sharing link so you can use it in the next steps.
      Publish to the web.
      Copy the published sharing link.
  2. Hyperlink the shared URL in the word processing document.
    1. Open the What I’ve learned about computing document that you created in the previous chapter. Save the file with a new name so it reads What I've Learned First and Last Name Ch5.
    2. Jump to section 5. How Privacy and Security Works in the What I've Learned... document.
    3. Add this text under the section 5 headline: This content is provided in a shared presentation file, which anyone at OSU can view.
    4. Select the words shared presentation file and click the link icon, right-click to add a link, or insert a link. Ctrlv or v the sharing URL that you copied and Apply.
  3. Confirm that the link works by hovering over it and clicking on the URL that pops up.
    View and click the URL of a hyperlink.
  4. Save as the file with CtrlShifts or Shifts, and rename the file What I've Learned NAME Ch__. Replace NAME with your name. Replace __ with the chapter number. Next, create a PDF file:
    • From the File menu, choose Save As > PDF > Standard (for electronic and printing distribution).
      If you are using Word for Macintosh, then choose PDF > For Printing.
      Or, Ctrlp to Print a PDF file. Choose PDF from the list of printers.
    • From the File menu, choose Download as PDF.
    • From the File menu, choose Export to... and choose PDF.
      OR, p to Print a PDF file. Choose PDF from the list of printers.
  5. Check to confirm that hyperlinks work.
  6. Move all files to this course's folder in the Documents folder of your hard drive.
  7. If the hyperlink doesn't work in the newly generated PDF file, then try saving the PDF a different way: Export, Save, or Print. If it still doesn't work, then when you submit the file, add the platform and software version to the Assignment Commenting box. I'll grant credit even though your software is faulty.

5.12 Submit the assignment

  1. Upload the How Privacy and Security Works slideshow presentation PDF file on the Canvas Assignment page.
    • Confirm that it uploaded.
    • Check the TurnItIn Report for plagiarized phrases and sentences.
    • Either edit or quote those highlighted passages in your original file and resave the PDF file.
    • Upload the newer version in the Canvas Assignment Submission Details screen.
  2. Also, upload the What I've Learned... PDF file.
  3. Paste the published/sharing URL of your slideshow presentation into the Commenting box if your hyperlink in the What I've Learned PDF file doesn't work.
    Upload the second file using the Add Another File link.

Back up to multiple sources

Earlier, you saved a copy of your work with a new name. Now, copy that backup to a different location, such as:

  1. Cloud drive such as Google Drive, Microsoft OneDrive, or Apple iCloud.
  2. A USB stick drive.
  3. Zip archive file.
  4. Turn on automatic backups.
    • Windows 10
      Learn to use the Windows File History feature to backup files to a new location.
    • MacOS
      Learn to use Time Machine for backup up automatically to external hard drive devices.

Because bad things happen to good people and their computers, you must back up every time you work on a project. Losing your work because of a technical glitch and lack of a backup will not provide you with a due date extension; it will only provide you with empathy.

Criteria to meet by the end of chapter 5

If you have questions about how to use any of the required technologies for this lesson or what the following criteria mean, please reread the relevant lessons, view the Zoom recordings, then ask the Instructor via the Canvas Inbox.

Check Canvas Home, Assignments, and Calendar for the most current Due date and time. The Available Until date and time constitutes a grace period, which can be used in an emergency, or if you are ill.

By the end of chapter 5, these items must be completed to earn full points:

Discussion

  1. Summarized and cited research about one Facebook Scandal in the Group Collaboration.
  2. Defined a malware term and summarized and cited an actual case where it was used.
  3. Summary is written with proper grammar and spelling.
  4. Summary is free of plagiarism.
  5. Bibliography is detailed and consistently formatted.

Design

  1. Presentation slide size displays in a 16:9 ratio.
  2. Presentation cover has an orange background with white heading, purple subheading, and OSU logo.
  3. Presentation text slides use purple headings and gray text on a white background.
  4. Presentation text slides have narrow margins on all four sides.
  5. Presentation text slides use a consistent font size 18pt with no bullets (about 10 lines per slide).
  6. Presentation was submitted as a PDF file.
  7. Published/Shared presentation slides transition from the right.
  8. Word processing document section 5 includes a hyperlink to the published presentation file.

Writing

  1. Presentation cover slide includes the title and student/author name.
  2. Presentation slide 2 describes one EFF privacy topic.
  3. Presentation slide 3 describes the EU's GDPR.
  4. Presentation slide 4 describes online security threat model, authentication, passwords, and avoiding problems.
  5. Presentation slide 5 describes symptoms, prevention, and removal of malware.
  6. Presentation slide 6 describes private browsing.
  7. Presentation slide 7 describes how to opt out of online advertising.
  8. Presentation slide 8 describes password management software.
  9. Extra Credit: slide 9 describes how phone companies sell your data.
  10. Presentation slide 9 or 10 begins the formal, numbered bibliography.
  11. Presentation is free of plagiarism.
  12. Presentation is free of spelling and grammar errors.