2. Internet Search ProcessInternet Search Process
1. Pick the best search tool such as: Bing, Google, Google Chrome, Mozilla
Firefox, or Internet Explorer.
2. Formulate the search query – putting in keywords or more words: God,
man, dog, history.
3. Perform the search – press the enter button/enter key.
4. Examine the search results – pick the best information needed for your
search.
5. Evaluate the credibility of the search results – double check to make sure
the information is valid and up to date.
3. Online Safety GuidelinesOnline Safety Guidelines
• Don’t post your every move.
• Only communicate with people you know
on a daily basis.
• Try not to get on them as much.
• Keep your contacts to a minimum.
• Avoid posting things that can ruin your
name or reputation.
• Finally, think before posting anything.
4. Wireless Network Security ThreatWireless Network Security Threat
• Lan Jacking - driving around with a laptop,
antenna, and wireless card searching for
unsecured wireless networks to access.
• Spoofing - hacker accessing a network to
create a fake Web site or sending mail
that looks as if coming from an internal
server.
• Rogue WLAN - hacker installing a
wireless router using a network resource
to expose network to security threats