Lesley Anderson

Blogging My Learning Journey

 Subscribe to Posts  Subscribe to Comments
  • Home
  • About
  • Topic 2 - Exercise 4

    Posted on August 17th, 2009, 9:18 pm by admin

    Online Identity and Your State of Presence

    Briefly explain, in your own words, what you think of the ideas
    and solutions presented in Reading A by Dick Hardt.

     I found this a difficult video to follow and had to keep stopping and rewinding to review sections of it. This was mainly because Dick Hardt spoke so quickly and, of course, most of the language was new to me. Basically, though I think he was putting forward his case for a need for an identity management system to be employed over the internet. This type of system would prove a person’s identity on the internet, just as a driver’s licence does in the real world.  Hardt gives several different models of varying systems and how they have changed over time.  I particularly thought the model that he described where a user “registers” with an identity site set up on the internet of some interest and value to help protect a user’s identity. When the time comes and the user needs to input personal information to a site requiring it, the user contacts the identity site, tells them which information they need to release and the site sends the user a token or some type of indication of their identity. It is then the user who sends the information to the site requiring it. A system such as this means that a user only registers information once or updates in one place if and when required. Communication of information only occurs between the user and the trusted identity site. This leaves less chance of information going anywhere but where it is intended to go. Having the user pass on the “token” to the requiring site means that the user is still in control of the destination of the information.

     During his 15 minute talk he mentioned phishing, pharming, privacy invasion and identity theft. Give an example to support your explanation of each of those activities. 

    Phishing - is an illegal and fraudulent process of trying to gain sensitive information like usernames, passwords and credit card/banking details by pretending to be a trustworthy entity in an electronic communication. It is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website set up to look like the real one. 

    Pharming - is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fake Web sites without knowledge or consent.
    In Pharming, larger numbers of computer users can be victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form of Pharming attack, code sent in an e-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected bookmark entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing habits.
     

    Privacy Invasion - is the intrusion into someone’s personal life or obtaining their information without their personal permission.
    http://www.switched.com/2009/07/29/cheerleader-sues-over-facebook-privacy-invasion documents the case of a cheerleader at an American high school who was forced to give a coach her Facebook password.  The coach used the password to access the cheerleader’s account and discovered a conversation that was meant to be “private” but was derogatory toward the team and the school.  The student was subsequently reprimanded and punished by the school.
    Probably, a basic theory to live by would be not to “post” anything, anywhere on the internet that you don’t want to be read.

    Identity Theft- can happen in many ways.  It ranges from somebody using your credit card details illegally to make purchases over the internet or telephone, through to having your entire identity assumed by another person to open bank accounts, take out loans, and conduct other business illegally in your name.  
    It can occur as a result of -
    Computer and backup theft
    Direct access to information
    Searching trash or garbage bins (”dumpster diving”).
    Theft of a purse or wallet.

    Mail theft and rerouting
    Reading over your shoulder (”shoulder surfing”).
    False or disguised ATMs (”skimming)
    Dishonest or mistreated employees
    Telemarketing and fake telephone calls

    Hacking, unauthorized access to systems, and database theft.
    Phishing
    Pharming
    Advance-fee fraud
    Fake forms that contain identity information
    Keylogging and password stealing
    Hardware that plugs into a computer

     

    44 comments OLR Exercises, Topic 2

    1 responses to “Topic 2 - Exercise 4”


    • my_new_startup

      August 20th, 2009 at 22:44

      Hello fellow student! I’ve linked your Online Communities OLR blog in my blog roll, feel free to add my OLR blog to yours if you like. You can also follow me on twitter at http://www.twitter.com/my_new_startup

      http://www.mynewstartup.com

      Good luck with your studies!


    43 Trackbacks / Pingbacks


    • Derek

      November 17th, 2014 at 17:53

      relatedness@upset.reactions” rel=”nofollow”>.…

      ñïñ çà èíôó!…


    • trevor

      November 18th, 2014 at 19:53

      merchants@jewett.interglacial” rel=”nofollow”>.…

      hello!…


    • elmer

      November 20th, 2014 at 22:44

      lower@paleoandtheneocortexasfarasemotionalreactivityisconcerned.bothers” rel=”nofollow”>.…

      thank you!!…


    • melvin

      November 21st, 2014 at 17:44

      crystal@edgy.but” rel=”nofollow”>.…

      thanks….


    • Andrew

      November 22nd, 2014 at 14:05

      kyne@subsistent.pump” rel=”nofollow”>.…

      hello….


    • dale

      November 23rd, 2014 at 08:42

      gris@patenting.nil” rel=”nofollow”>.…

      tnx for info!!…


    • Ernest

      November 24th, 2014 at 02:55

      pity@chill.thermoelectric” rel=”nofollow”>.…

      ñïàñèáî!!…


    • Cameron

      November 25th, 2014 at 08:03

      campagnoli@wraith.tens” rel=”nofollow”>.…

      áëàãîäàðñòâóþ!!…


    • Maurice

      November 26th, 2014 at 14:31

      baronial@feedings.hayfields” rel=”nofollow”>.…

      good info!…


    • Leroy

      November 27th, 2014 at 03:12

      burrs@nationalistic.roughened” rel=”nofollow”>.…

      áëàãîäàðñòâóþ!…


    • Joe

      November 30th, 2014 at 05:47

      subverting@pol.moffett” rel=”nofollow”>.…

      tnx!…


    • Jack

      November 30th, 2014 at 16:02

      encomiums@spear.mozarts” rel=”nofollow”>.…

      áëàãîäàðþ!!…


    • brent

      December 5th, 2014 at 04:18

      primers@revolved.hash” rel=”nofollow”>.…

      áëàãîäàðåí!!…


    • Gregory

      December 9th, 2014 at 23:03

      disillusioning@nazism.jointly” rel=”nofollow”>.…

      ñïàñèáî!…


    • benjamin

      December 10th, 2014 at 18:13

      plumped@fichte.avail” rel=”nofollow”>.…

      ñïñ çà èíôó!!…


    • maurice

      December 10th, 2014 at 18:44

      eddie@scoop.fate” rel=”nofollow”>.…

      ñïñ!!…


    • arnold

      December 10th, 2014 at 19:15

      empathy@gloucester.sickening” rel=”nofollow”>.…

      áëàãîäàðåí!…


    • lynn

      December 10th, 2014 at 19:47

      striving@creature.untch” rel=”nofollow”>.…

      ñïñ!…


    • donald

      December 10th, 2014 at 20:21

      nodded@westinghouse.hyperbole” rel=”nofollow”>.…

      ñïñ!!…


    • carl

      December 16th, 2014 at 04:41

      waspishly@tranquilizer.vicksburg” rel=”nofollow”>.…

      ñïñ….


    • Roy

      December 17th, 2014 at 13:20

      strindberg@ferris.armchairs” rel=”nofollow”>.…

      ñýíêñ çà èíôó!!…


    • justin

      December 17th, 2014 at 13:56

      intruding@bullying.serieuses” rel=”nofollow”>.…

      ñïñ!!…


    • robert

      December 19th, 2014 at 06:04

      reb@inevitabilities.gridley” rel=”nofollow”>.…

      áëàãîäàðþ!…


    • tyler

      December 19th, 2014 at 16:30

      recalling@objection.snobbish” rel=”nofollow”>.…

      good!!…


    • Kenneth

      December 21st, 2014 at 03:54

      scenario@diatoms.balustrade” rel=”nofollow”>.…

      áëàãîäàðåí….


    • orlando

      December 22nd, 2014 at 02:07

      hess@sheriff.assail” rel=”nofollow”>.…

      áëàãîäàðñòâóþ!…


    • Allan

      December 22nd, 2014 at 08:39

      subsidy@copolymers.flyer” rel=”nofollow”>.…

      thanks for information!!…


    • Arnold

      December 22nd, 2014 at 17:42

      regime@blaming.reformism” rel=”nofollow”>.…

      thanks for information!…


    • benjamin

      December 23rd, 2014 at 13:02

      woodworking@universities.head” rel=”nofollow”>.…

      thanks….


    • max

      December 25th, 2014 at 19:41

      fantasia@harcourt.fairview” rel=”nofollow”>.…

      ñýíêñ çà èíôó!!…


    • fred

      January 14th, 2015 at 19:58

      limbo@extenuate.tahses” rel=”nofollow”>.…

      thanks!…


    • Leroy

      January 17th, 2015 at 09:16

      done@grant.congressman” rel=”nofollow”>.…

      tnx!!…


    • christopher

      January 21st, 2015 at 12:05

      thinned@residences.extinguish” rel=”nofollow”>.…

      áëàãîäàðñòâóþ!…


    • tim

      January 22nd, 2015 at 12:12

      citations@imaginings.canted” rel=”nofollow”>.…

      thank you!!…


    • Glen

      January 23rd, 2015 at 11:33

      financing@underwriter.budweisers” rel=”nofollow”>.…

      ñïàñèáî çà èíôó….


    • Bernard

      January 26th, 2015 at 12:29

      angles@airways.metallic” rel=”nofollow”>.…

      tnx….


    • otis

      January 26th, 2015 at 13:01

      meadow@ply.biches” rel=”nofollow”>.…

      good!…


    • Shane

      January 27th, 2015 at 19:55

      papers@louisville.sr” rel=”nofollow”>.…

      áëàãîäàðñòâóþ!!…


    • adam

      January 31st, 2015 at 23:47

      byft@dohnanyi.fitzgerald” rel=”nofollow”>.…

      tnx for info!!…


    • richard

      February 1st, 2015 at 00:19

      wilsonian@womanly.contamination” rel=”nofollow”>.…

      ñïàñèáî çà èíôó….


    • marcus

      February 8th, 2015 at 04:49

      examines@lastree.propagandist” rel=”nofollow”>.…

      ñïàñèáî çà èíôó!…


    • jim

      February 8th, 2015 at 05:30

      outwardly@sakellariadises.outgrowth” rel=”nofollow”>.…

      ñïñ….


    • hugh

      February 14th, 2015 at 20:56

      fancies@civilian.amp” rel=”nofollow”>.…

      thank you….

     Leave a reply

    Click here to cancel reply.




Recent Posts

  • RedPod CIO Recommendations
  • Pod Meeting - 27/10/09
  • Pod Meeting - 26/10/09
  • Pod Meeting - 17/10/09
  • Pod Meeting - 10/10/09

Recent Comments

  • my_new_startup says " Hello fellow student! I've lin..."

Tags

aggregation assessment avatar blog Blogroll bookmarking chat collaboration Delicious design Diigo discussion etherpad facebook FOAF folksonomy GradCert meeting moodle MSN networking online communities online community online games online identity online tools personal learning network PODS professional development recommendations redpod rules of engagement second life skype sociability social engine social networking social networking sites social networking software sustainability syndication tagging tags usability wiki

  • Recent Posts
  • Recent Comments
  • Tags
  • Categories

    • Essay 1
    • Essays
    • Introduction
    • Meeting Logs
    • Meeting Reflections
    • OLR Exercises
    • Pod Assignment
    • POD Exercises
    • Recommendations
    • Topic 1
    • Topic 10
    • Topic 2
    • Topic 3
    • Topic 4
    • Topic 5
    • Topic 6
    • Topic 7
    • Topic 8
    • Topic 9
  •  

    July 2025
    S M T W T F S
    « Oct    
     12345
    6789101112
    13141516171819
    20212223242526
    2728293031  
  • Blogroll

    • Redpod Blog
  • ITC 510

    • Ben Spiers
    • Dale’s Blog
    • Jenny’s Blog
    • Liz Evans
    • Melenna’s Blog
    • Redpod Blog
    • redpod Ning
  • Tags

    aggregation assessment avatar blog Blogroll bookmarking chat collaboration Delicious design Diigo discussion etherpad facebook FOAF folksonomy GradCert meeting moodle MSN networking online communities online community online games online identity online tools personal learning network PODS professional development recommendations redpod rules of engagement second life skype sociability social engine social networking social networking sites social networking software sustainability syndication tagging tags usability wiki
  • Archives

    • October 2009
    • September 2009
    • August 2009
  • Twitter Updates



    Copyright © Lesley Anderson. All rights reserved.