Internet Flexibility
The Internet allows us to complete tasks quickly, with the greatest amount of flexibility. We use social media sites for personal and professional communication, use Strayer University online resources to attend further our education, and use email as a basic communication tool in todays world. However, there are people on the Internet who have ulterior motives for connecting with us. The goal of this week’s discussion is to help you spot when you are interacting with suspicious characters on the Internet. Click on the below video or use this CHOOSE A SCENARIO You received an email from what appears to be Strayer University requesting you to login using a link and change your username and password because your account was compromised. You are on a social media website chatting with a friend, but your friend starts to ask questions that they should know the answers to and the conversation seems strange or off. You received a text from what appears to be your bank stating that your account may be compromised and they need key information to verify your identity with your last five transactions. ADDRESS THESE POINTS Welcome: Please provide a greeting to begin your post (e.g. Hello Professors and Peers!). Paragraph 1: What scenario did you choose? Why? How do you know if the communication in your scenario is legitimate? How do you respond to the communication in your scenario (i.e. identify the correct steps to take)? Paragraph 2: What are the repercussions of taking an incorrect action in your scenario? Are the repercussions irreversible? Why or why not? Do you have personal experience with the type of scenario you chose? If so, describe what happened to you and what you learned. If not, did you learn anything new from walking through the scenario you chose? Closing: Sign your post with your preferred name so that my team knows how to address you in the discussion forum. ORGANIZE YOUR POST Make sure that you always organize your post into paragraph format with 200+ words. Create a conversational flow (e.g. talking to someone) with a scholarly tone (i.e. no text talk or slang, spell and grammar check always using a tool such as Grammarly, etc. PEER REVIEW RE: Week 10 Discussion COLLAPSE Overall Rating: 1 2 3 4 5 1 2 3 4 5 Greetings! Facebook has been the center of many accounts being hacked and taken over by seemingly nice strangers that appear to be a friend. If I was chatting with a friend and they started to act strange by asking questions already known or asking/inviting me to participate in Forex or a money scheme I would immediately know someone is impersonating my friend. Recently, on Instagram I received a friend request from someone I was already friends with. I accepted the friendship and reached out to my friend to ask if they created a new page. When it was discovered they didn’t, I immediately reported the fake profile and the profile was deleted. Had I not suspected or known it was fake, the person could have stolen valuable information. Fortunately, the person’s who’s profile that was stolen was my ex husband. After the fake profile was removed, we both had a great laugh; however, we learned a valuable lesson. It’s important to change your passwords often; and, oftentimes, people create fake profiles from downloading someones’ pictures and replicating their information without ever accessing their personal profile. Had the intrusion been Facebook, sensitive information could have been stolen. Therefore, we both decided we would no longer share updated information about our whereabouts, locations and family vacation pictures.