Copyright Goodheart-Willcox Co., Inc.
24 Introduction to Microsoft Offi fice
Goodheart-Willcox Publisher
Figure 1-18. The Department of Justice maintains a website for reporting com-
puter crimes, including hacking and data vandalism.
Hands-On Example 1.2.2
Cybersecurity Threats
The federal government and the White House have undertaken many cybersecurity policy
initiatives. The White House website contains information about cybersecurity threats.
1. Launch a browser, and navigate to www.whitehouse.gov.
2. Using the website’s search function, search for
foreign policy
cybersecurity.
3. Locate an article on foreign policy related to cybersecurity. Alternatively, directly navigate
to the page www.whitehouse.gov/issues/foreign-policy/cybersecurity.
4. Read the article, and summarize the government’s objectives.
Censorship
Many schools, companies, and organizations restrict the information
that their members can access. Censorship is the act of limiting access to
information or removing information to prevent the information from
being seen. There must be a balance between providing a safe computing
environment and allowing free access to information.
Previous Page Next Page