06 Performance Task 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

IT2221

Performance Task
The Power of the Web and Internet
Objectives:

At the end of the exercise, the students should be able to:

▪ Resolve a network and Internet failure based on privacy and security.

Requirements:

▪ Internet Connection
▪ Media Editing Tools

Instructions: (3 items x 20 points)

1. Assess real-life issues about network and internet failure.


2. Provide logical resolutions in no less than five (5) sentences.
3. The resolution must include the following:
o Summary of the problem
o Internet privacy technique/network technologies to be used
o The benefits of applying your resolution

Issue #1
An April 2020 piece from The New York Times alleged that the popular video conferencing site Zoom
engaged in undisclosed data mining during user conversations. The coverage asserted that when a person
signed into a meeting, Zoom transmitted their data to a system that matched individuals with their LinkedIn
profiles.

The incident happened via a subscription-based tool called LinkedIn Sales Navigator that Zoom offered
customers to assist with their marketing needs.

Moreover, when someone signs into a Zoom meeting with an anonymous name, the tool still connects that
person to their LinkedIn profile. Thus, the person had their real name revealed to a fellow user despite efforts
to keep it private.
Source: https://cybernews.com/privacy/6-examples-of-online-privacy-violation/
Resolution:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

06 Performance Task 1 *Property of STI


Page 1 of 2
IT2221

Issue #2
According to Webroot, a cybersecurity solutions provider, around 1.5 million new phishing sites are
created monthly. A study by Verizon found that more than 30% of phishing messages get opened by
targeted users, and 15% of people successfully phished will be targeted again (and could be victims
again) within the year.

To convince you to reveal personal information such as passwords and credit card details, phishing
emails and text messages may look like they’re from a company you know or trust. They may look like
they are from a bank, a credit card company, or a message from your friend on Facebook .
Source: https://mb.com.ph/2020/08/13/work-from-home-pinoys-are-under-attack/
Resolution:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

Issue #3
The Philippine National Police (PNP) is going after a con artist posing on Facebook as its chief, Gen. Camilo
Cascolan, and warned the public of a modus using his name.

PNP spokesperson Col. Ysmael Yu said the police zeroed in on a cyber con artist who misrepresented
Cascolan in an internet-based scam. Using stolen identity data, the poser, who was not identified, created a
fake social network account with the name "Camilo P. Cascolan" on Facebook to further bolster his criminal
misrepresentation and impersonation scheme.

Investigators of the PNP anti-cybercrime group (ACG) have identified the owner and creator of the fake
account and have called the attention of Facebook over the fake account’s violations, particularly to facilitate
criminal activity.
Source: https://www.pna.gov.ph/articles/1116188
Resolution:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

GRADING RUBRIC:
Performance Standards Points
The student applied a logical internet privacy technique/network technology 10
The student provided an attainable and reasonable resolution. 5
The explanation is in no less than five (5) sentences. 5
TOTAL 20

06 Performance Task 1 *Property of STI


Page 2 of 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy