Comment on Fantastic Four Team Artifact 5 – Computer Protection by Elizabeth Lynch

Thanks Brooke-Lynn,
I n creating my artifacts I always try to remember a few things: How can I make this somewhat short and sweet with out losing information, still making it fun and user friendly. We are all busy and don’t have the time and most times attention to read lengthy an abstract info, so making my artifact overly complicated and not a little visually appealing makes it useless. Glad you liked it and thanks for the support.

Comment on Fantastic Four Team Artifact 5 – Computer Protection by Brooke-Lynn Navarro

Hi Fantastic Four team,

I like how you guys gone into depth and also, are straight forward with the information that you guys brought into your artifacts. Liz, I liked how you managed to put a dialogue as your intro, for your artifact and I also like the artifact that contained: Description and protect yourself. Although you guys are informative, you manage to be creative and incorprate graphics to your artifacts. I am looking forward to seeing your next artifacts.

“White hat”

Comment on Fantastic Four Team Artifact 5 – Computer Protection by Jeffrey Sanchez

Hey Greg,
The data in the table comes from a study conducted by PCWorld. They tested free antivirus software to their premium counterparts. For example, “avast! Free Antivirus” was compared to “Avast Pro Antivirus.” Also, I prefer Microsoft over free Avast because Microsoft never sends me messages telling me “my computer is at risk” and I should “upgrade.”

Comment on Fantastic Four Team Artifact 5 – Computer Protection by Elizabeth Lynch

Here are summarized some tips that are covered indirectly in the last two slides of my pp.

Team CES – Artifact 5: Protecting Your Computer and Yourself


Team CES recognizes that we all rely on a computer. We use computers at home, for school researching or projects and at work. Although computers may connect you to information instantly, problems may arise if you are not doing anything to prevent attacks from unknown users or hackers. Atsuko focuses on the use of antivirus and antispyware software and explains how it works. Richard provides some insight on preventing identity theft and solving steps on what you can do if you happen to be a victim. Gina focuses on cybercrime – what it is and current events. Kiara gives us a quick guide on the types of malicious programs we may encounter and some quick tips on recognizing a computer problem related to virus attacks.

Please see our individual artifacts below along with short summaries of each.

How can we use free antivirus, antispyware software from reliable companies? How do they work? by Atsuko Hamano Microsoft Security Essentials

  • Comprehensive protection
  • Easy to get, easy to use
  • Quiet Protection

McAfee Security Scan Plus

  • Easily check my computer for anti-virus software, firewall protection and web security at no cost
  • I don’t want my productivity to be interrupted during program installation and updates
  • Quickly find out if my computer is at risk
  • Detect threats in running processes and other temporary files
  • Security Recommendations if my computer is at risk
  • Customize scanning frequency

avast! Free Antivirus

  • Visually appealing
  • Good installation options
  • Security improvements
  • Features

Sophos Anti-Virus for Mac Home Edition

  • Full protection from viruses, Trojans and worms
  • Stops all threats, familiar and unfamiliar
  • Quarantines and removes the threats it finds
  • Easy installation and painless maintenance

UH Computer Virus and Threat protection      University of Hawaii (UH) Information Technology Services (ITS) provides software, services, and technical support to protect the UH community against computer viruses and security threats.

  • McAfee Anti-virus Software at UH
  • UH Virus and Security Alert Email Notification

Link to Atsuko’s Artifact

How to prevent identity theft? Richard Laparejo

  • Definition
  • Causes
  • Phishing
    • Examples of phishing
  • Effects of identity theft
    • Video on effects
  • Prevention
  • What to do when you are a victim?

Link to Richard’s Artifact

With technology advancement also comes the advance in cybercrime. People in the world are always looking how to steal funds. identities, and information from the every-day computer user, companies use hackers to try to gain information from other competitors, and others simply want to destroy systems with device-destroying viruses.  While there are thousands of different types of viruses, rogue programs, and various ways to attack the computer user I have created an overview of the main types of crimes we all face on a daily basis. Please review this spreadsheet in its entirety (please see all tabs) to understand more about Cybercrime, how many people it affects, and how you can limit your vulnerability. What are the different types of Cybercrime and how can you protect yourself from these types of attacks?

  • Definition of Cybercrime
  • Types of Cybercrime
  • Latest News in Cybercrime
  • Cybercrime Statistics
  • What can you do to be more secure and protect your computer?

Link to Gina’s Artifact

Malicious Programs How do viruses and spyware work? How do they infiltrate your computer? What symptoms and signs appear when you have an infected computer? Kiara Pascual

  • Types and definitions – Table
    • Computer virus
    • Spyware
    • Rogue security software
    • Worm
    • Rootkit
    • Trojan horse
  • What is malware?
  • How can a computer get infected?
  • Suspicious e-mail?
  • Link to another source of information
    • “How to Know If Your Computer is Infected with a Virus”

Link to Kiara’s Artifact

Team Cutting Edge Support continues to provide useful information in order to protect your computer and yourself. By researching and collecting information from the best sources and using our experience with the subject, we are able to share our knowledge along with  others. If you have any questions, feel free to ask. Team CES is willing to assist you in anyway possible. Hope to hear from you!

GQ5 How to keep you and your computer safe?

     A computer virus is a computer program that can duplicate itself to infect other computers. Some viruses are harmless, others may damage data files, and some may destroy files. Viruses are spread primarily through email messages, hard drive sharing and downloading files over the internet. Here are some good tips to keep in mind when setting up a defense for your computer and you.



     I remember growing up and my parents always told me, “Be careful-there are many bad people in the world that can hurt you”. I never thought that when we entered into the technology world, that these “bad people” could still get to us! They can hurt us by taking our personal identity using that information to ruin our credit history and our credibility, and possibly ruin some people’s lives.
We have become so dependent on the internet for many different reasons not realizing that every time we go online we are exposing ourselves and possibly our future because “bad people” in the world can now create this “thing” called a virus that can literally damage our computers and jeopardize our right to privacy. Viruses can enter into our computer systems without our knowledge in many different forms and do their damage before anyone even discovers them.


Guiding Question #5

How can one secure his/her computer to protect him/herself from hackers, scammers, and identity thieves and and how can he/she avoid, detect, and get rid of viruses and spyware?

     Anyone who uses their computer knows that the information that we store there is priceless. whether its homework for school, pictures of memories with friends and loved ones, or banking information we use to pay our bills online. Every day people all around the world are subject to identity theft, computer crashes, and stolen information due to hackers, viruses, and spyware. What can we do to protect ourselves and our computer from these unwanted intruders? In this artifact we hope to provide you with the useful tools that are necessary to detect, protect, and avoid being a victim.

Darrell Delmundo

    There are many ways to protect your computer from viruses and other harmful programs such as spyware. With simple techniques and proper programing you can avoid problems that your computer may be faced with. I will discuss different ways a person can protect their computer from viruses and spyware.

Kathleen Galloway

     A scammer is one who penetrates a scam.  There are many scammers out in the world who are waiting to get their hands on your personal/business information while capable of destroying your computer. .  With this helpful presentation, you will be able to gain some ideas and insight on how to protect yourself and your computer from unwanted “scammers.”

Kurt Kaleikini

     No individual is totally protected from being attacked from a “Hacker or Cracker” in the world of advance technology today!  In addition, the question is “How can an individual protect and secure his or her computer from Hackers and Crackers?” It is actually a individuals personal responsibility to insure protection against a Hacker or Cracker from gaining access to his or her personal sensitive information.  Through my thorough research, I surprisingly discovered that the biggest prize for any Hacker and Cracker, besides your IP address, would be the users “Password and User Name.” If the previous information is attained successfully it is almost certain and pretty much seals the deal in someone being hacked or cracked as intended.  In that sense, I have created a useful PowerPoint presentation that will make anyone aware and prepared to recognize how to prevent attacks from hackers and crackers and additionally how an individual will be able to recognize if he or she is a actual victim or being attacked by a “Hacker or Cracker”

     All it takes are simple techniques such as installing anti virus programs, constant updates of software, and avoiding questionable websites and material online. With proper maintenance and monitoring anyone can keep themselves and their computers running at optimum capacity. It only takes one time for your computer to be infiltrated for you to lose everything. Lets all be proactive and secure our precious information and hardware before they fall into the wrong hands.

The Axis of Evil

Hackers, Scammers and Thieves, OH MY!

 For as long as there has been access to the internet, and file sharing there has been a means for people to find their way to take your information and wreak havoc on your personal life.  Some do it for the sake of doing it, others do it to gain financial and material gain, and others do it just to say they did it.  Whatever their methods are, the end result is always true; a person becomes a victim in the loss of their personal information. 

In this new age where victims are being overrun without even leaving their homes, it is important to remember that not all people are considered evil.  Some people can utilize their talents of breaking into a computer system to help increase security for a company and find the “loose ends” that need attention.  Others tend to utilize their talents in a means of securing justice for those that would not otherwise be convicted.

Who are these people that steal the

information off of unsuspecting victims?

Ikaika will help to answer this question, as well as the first line of defense against preventing these people from stealing your personal information

Suddenly! A virus is detected on your

computer! What do you do?

Stephanie will help elaborate on the methods that are out there for a computer user to alleviate and prevent future attacks of viruses, spyware, and malware.

How do I stop Identity Thieves from

stealing my information?

Brooke will help guide you through the helpful ways to find a method that works for you.


Sample Team Artifact Post

How does one research online to uncover relevant, credible information, when searching online leads everyone in the same direction and to the same websites? How can one use research to dig and search for the truth on the Internet?

Short introduction here on how the team addressed the Guiding Question (include guiding question) with their artifacts in making sense of the entire Guiding Question. Sum up everyone’s contributions.

1. How do you find and interpret credible research information using Google search?

By: Tommy Technology

Google is one of the most widely used search engines. The common saying these days is, “Just Google it.” What does that mean? It means you can find anything – answers to all your questions using the Google search engine, But how do you find and interpret credible research information from your online search? In the file below, I’ve included a list of the top 10 ways to research and find credible information using the Google search engine, including additional information and examples.

Top 10 Ways to Research and Find Credible Information Using Google (.docx)


2. Next teammate’s question.

Next teammate’s name.

Short intro.

Attach artifact file here.

3. Next teammate’s question.

Next teammate’s name.

Short intro.

Attach artifact file here.

4. Next teammate’s question.

Next teammate’s name.

Short intro.

Attach artifact file here.


Short conclusion. Ask for comments.