StudyGuide Flashcards
Name the three components to the collection of resources known as the World Wide Web distinguished by the way that the resources are accessed and indexed.
HTML, HTTP, URLs
Define the visible web
Is a collection of resources accessible through HTTP and compatible protocols with index search engines.
Define the deep web
Is a invisible result: its inaccessibility by search engines, and its a part internet that is not indexed by search engines. (Normally behind paywalls)
Define the Dark Web
Designed to be conceal from search engines and casual web uses (only through anonymity) services such as Tor or I2P
Name one dark web domain
.onion or .garlic
Name 2 Dark Web services
TOR ( TORPROJECT.ORG)
I2P
What was the motivation behind the dark web?
COMPLETE Anonymization of information exchange on internet (encryption: sender/servers)
List two uses of the dark net that you find acceptable
Anonymity and untraceable location
Name the two technologies were critical to the operation of Silk Road
Tor and bitcoin technology
What is principle of dumb pipe?
Network providers provide equal access and pricing to all content providers and customers without regard to the nature of that content.
What is “fait-based approach” to net neutraility”?
The ability of broadband providers to self-regulate and maintain an open and neutral internet without the need for extensive government regulations.
- No bandwidth throttling
- No preferential allocation of bandwidth
- No Traffic shaping
What is evidence that there were cases of “broadband providers blocking customers from accessing the content, application or service of their choice?”
Many Cases:
T-Mobile Binge On (2015) - Throttling: reduce bandwidth resolution
Comcast and Bit Torrent (2007- US broadband p2p)
Verizon and Throttling fire Deportment (OIO)
AT&T and Facetime (unlimited data plans)
What are the three prohibition listed in the 2010 FCC Open Internet Order
No blocking,
No unreasonable Discrimination,
Transparency
What is the real reason behind broadband providers opposition to Net Neutrality as the FCC defines it.
Interferes with the ability of broadband providers to maximize corporate profits and for this reason faces strong opposition
How did the FCC change the regulations of broadband providers in 2015?
Reclassification as Title II Service Providers:
Net Neutrality Rules: No blocking, no paid prioritization, Transparency
What is regulatory capture?
Government regulatory agency, originally established to act in the public interest and regulate industries, ends up being heavily influenced or controlled by the industries or companies it is supposed to oversee.
List 1 research focus that seem reasonable to you?
- Impact of Neoliberalism on Internet Policies
- Media and Public Perception of Net Neutrality
- Historical Analysis of Internet Regulation
What was the government position on the merit of Project Truthy?
The NSF and government support weren’t in a position to detriment the “truth” of Project Truthy, though FCC chairman Ajit Pai and Fox News used deception and misinformation to fuel tribalism. (CHECK IT)
____ target of the alleged recent Russian hack on our election infrastructure?
A developer - who was selling software about voting machine hardware
Is the greater threat to the integrity of the US electron system foreign or domestic?
domestically is more potential as threat of election interference than foreign entities.
According to political scientist Dov Levin which country has interfered with the most national elections over the past 50 years.
USA
According to political scientist Dov Levin, the US and USSR/Russia interfered with what percentage of the 937 competitive national elections between 1946 and 2000?
117
Where did the Russians find the greatest impact in the 2016 election?
Trolling, Fake news/(misinformation campaigns)
What is the “Fake News phenomenon?
The widespread dissemination of false or misleading information presented as legitimate news
Provide 2 of the 3 examples of governmental use of propaganda to control global and domestic public over the past century given in the articles
Radio Free Europe (RFE)
Radio Library (RL)
China 50 cent party
According to the author, which country perfected the art of “misinformation campaigns.
USA
How many ports are potentially accessible on a modern computer?
131,072
What ports are associated with legacy NetBios API?
135, 137-139
What are the terms that IANA uses to refer to the following port ranges? 1)_________________
0-1023
Well Known
_________________1024-49151
Registered
_________________49152-65535
Dynamic/ or Private
(T / F) IANA approves ports based on the application and intended use
True
(T / F) IANA does not endorse the use of a port or service even if the application is approved.
True
(T / F) There is little or no control over the use of a registered port
True
(T / F) Registered ports are controlled by IANA whereas unregistered ports aren’t
False
(T / F) Port 445 is associated with Windows NetBios API
False
(T / F) NetBios and SMB can be disabled in the Windows Registry
True
(T / F) NetBios and SMB can be unbound from the network interface
True
(T / F) NetBios and SMB can be blocked at a network firewall.
True
(T / F) ports 135-139 are never used on Unix computers.
False
(T/F) Telnet and FTP services are relatively harmless so their ports should be left open.
False
What is the popular netizen refrain regarding trolling?
“Don’t feed the trolls”
How does the article define “online trolling”?
Practice of anonymously interrupting normal and customary information exchange in order to lure the recipient not reacting to the message
How is online trolling different from other interference technologies like signal jamming, network blocking, network filtering, etc.?
Attempts to either engage or inflame the receiver, usually through misinformation, lies, distortions, and so on
What is one of the main goals of trolling?
provoke a reaction and manipulate opinions
Trolling is a part of the Internet’s ________________ space.
negative
List two examples of pedestrian online trolling
- Shit posting
- hit and run posting
Define kakistocracy
Rules by the least competent, corrupt and mortally unfit individuals (worst or least qualified to govern)
Define pathocracy
Rule of individuals with personality disorder, psychopaths’ and narcissists: (leading authoritarian or destructive governance.
List five different types of trolling defined in the article:
1) Ad hominem Trolling:
2) Nuisance Trolling:
3) Provocation trolling
4) Snag trolling
5) Proxy Trolling:
Why is online trolling so effective at manipulating public opinion?
Very Easy to escape undetected and can cause emotional manipulation.
List and explain the 4 categories of trolling stimulus & response.
1) ~TROLL/~TROLL (ordinary exchange):
2) ~TROLL/TROLL (troll/trollop insertion):
3) TROLL/~TROLL (sucker/victim):
4) ROLL/TROLL (troll warfare):