We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEstevan Seddon
Modified about 1 year ago
1 Copyright © 2014 M. E. Kabay. All rights reserved. & Internet- Use Policies CSH5 Chapter 48 “ and Internet-Use Policies” M. E. Kabay & Nicholas Takacs
2 Copyright © 2014 M. E. Kabay. All rights reserved. Plan for Today Video: The Plugged-in Mailbox Discussion Chapter Review
3 Copyright © 2014 M. E. Kabay. All rights reserved. Topics in CSH5 Ch 48 Damaging the Reputation of the Enterprise Disseminating and Using Incorrect Information Hoaxes Threats Viruses and Other Malicious Code Junk Chain Letters and Ponzi Schemes Get-Rich-Quick Schemes Mail Storms Stolen Intellectual Property Plagiarism Criminal Hacking and Hacktivism Online Auctions Online Gambling Buying on the Web Games Spyware Internet Addiction Online Dating and Cybersex Hate Groups Pornography Pedophiles
4 Copyright © 2014 M. E. Kabay. All rights reserved. Training Video The Plugged-In Mailbox Commonwealth Films Followed by Class Discussion
5 Copyright © 2014 M. E. Kabay. All rights reserved. Damaging the Reputation of the Enterprise Principle: The USENET is forever is almost forever Violating netiquette Violating laws Ill-advised Creating hostile work environment Libeling people or organizations Inappropriate use of corporate identifiers Corporate = corporate letterhead
6 Copyright © 2014 M. E. Kabay. All rights reserved. Disseminating and Using Incorrect Information Disintermediation and quality Libel Practical guidelines Judge credibility of source Do not pass on information without checking validity X
7 Copyright © 2014 M. E. Kabay. All rights reserved. Hoaxes Urban myths Virus myths Clues Style No date No authoritative source Demand to disseminate widely Claims of prizes / money Threats of bad consequences for failing to circulate
8 Copyright © 2014 M. E. Kabay. All rights reserved. Threats Do not take lightly NEVER destroy of this type Need evidence Should usually contact internal security Security personnel will call law enforcement according to established procedures Threats of terrorist action (bombs, poison) particularly serious and may require immediate action as part of incident response plan
9 Copyright © 2014 M. E. Kabay. All rights reserved. Viruses and Other Malicious Code Policies forbid all voluntary involvement with malware No Vx sites No writing, exchange, distribution No disabling of AV software Safety guidelines known to all Automatic updates Don’t use illegal / rogue software Don’t accept executable attachments to
10 Copyright © 2014 M. E. Kabay. All rights reserved. Junk The SPAM®* skit (Monty Python)! Major problem – 80% of all in world Guidelines No employee to create / send spam Never allow response to spam Never buy anything from spammers Don’t click on addresses in spam Make sure your SMTP server forbids spam relay * SPAM® is a registered TM. Use Spam or spam but not SPAM for junk .
11 Copyright © 2014 M. E. Kabay. All rights reserved. Chain Letters and Ponzi Schemes Pyramid fraud Send money to people higher (earlier) on list Amounts increase as long as new victims recruited When no more new victims, pyramid collapses Last in lose all their money Originators run away rich Illegal in USA (USPS regs) No employee should be allowed to participate
12 Copyright © 2014 M. E. Kabay. All rights reserved. Get-Rich-Quick Schemes Infinite variety of schemes for suckers Too good to be true = not true Nigerian (advance-fee) scams a plague I have lots of stolen/unclaimed money “I’ll give you some if you help me steal it” Policy: constant awareness Ensure employees know about scams Make fun of scams in your newsletters Tell employees about gullible (stupid) victims
13 Copyright © 2014 M. E. Kabay. All rights reserved. Mail Storms Autoforwarding between 2 addresses List servers that allow autoresponse to entire list Full mailboxes Out-of-office replies Reply to entire list instead of to single person Quoting entire messages instead of extracts Especially quotations Of quotations Of quotations Of quotations….
14 Copyright © 2014 M. E. Kabay. All rights reserved. Stolen Intellectual Property Serious legal issues for employers RIAA has threatened companies, universities with lawsuits SPA / BSA have sued organizations Webmasters get employers into trouble by posting materials without permission Embarrassing, risky Politicians have found stolen text on competitors’ Websites Must train employees to respect legal restrictions for software, music, text
15 Copyright © 2014 M. E. Kabay. All rights reserved. Production software can never be allowed to be stolen versions! Serious legal liability Vulnerability to blackmail Public humiliation Expensive penalties Undermines credibility of management principles Demoralizing to honest employees Stolen Intellectual Property
16 Copyright © 2014 M. E. Kabay. All rights reserved. Plagiarism Unattributed / misattributed information Copyright violation Extreme embarrassment Discredits organization Policies Absolutely forbidden Check materials using GOOGLE etc. Tools available for automated checking E.g., See next page
17 Copyright © 2014 M. E. Kabay. All rights reserved. DocCop
18 Copyright © 2014 M. E. Kabay. All rights reserved. Criminal Hacking and Hacktivism Duhhh…
19 Copyright © 2014 M. E. Kabay. All rights reserved. Other Risks to Employees and Families Online Auctions Online Gambling Buying on the Web Games Spyware Internet Addiction Online Dating and Cybersex Hate Groups Pornography Pedophiles
20 Copyright © 2014 M. E. Kabay. All rights reserved. Review Questions (1) 1.Why should an organization expend any effort at all in teaching employees how to protect themselves and their families against Internet & dangers? What does this have to do with information assurance? 2.How can something as minor as violating customs in discussion groups cause harm to an organization? 3.Why do we say that USENET and corporate have a potentially permanent lifespan? 4.Should corporate be used for non-professional messages? Why or why not? 5.How can someone reasonably decide whether to forward an containing alarming information? 6.What does “disintermediation” mean in discussions of information quality on the Internet?
21 Copyright © 2014 M. E. Kabay. All rights reserved. Review Questions (2) 7.What are some key signs that message is a hoax? 8.How can you check a message to find out if it is a hoax? 9.How should employees respond to threats of violence received in ? 10.What are the most important principles to teach employees about preventing virus / worm infections? 11.How should employees respond to junk ? 12.What is a Ponzi scheme and how should employees respond to one? 13.Explain how mail storms can arise from autoreplies and mailing lists. 14.Why should organizations ban the use or exchange of pirated music, software and text?
22 Copyright © 2014 M. E. Kabay. All rights reserved. DISCUSSION
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
Let’s Talk About Cyber Security A guided PowerPoint lesson For Presentation at Mayfield Intermediate.
Lifelong Learning Service Monday 30 th or Tuesday 31 st March :30pm Safe use of the Internet.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
INFORMATION AND RESOURCES Internet Safety. Internet Safety: The Issues Despite the educational and social benefits of information and communication technologies,
Student Internet Use Tutorial and Agreement Modesto City Schools August 2011.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
WOW! Resources Resources Time Time Paperwork Paperwork Relationships Relationships So many resources, so little time, so much paperwork, and so many relationships.
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
Computer Vulnerabilities 1. 1.Overview 2. 2.Threats to Computer Systems 3. 3.How Hackers Work 4. 4.Using the Internet Securely 5. 5.How We Make It Easy.
Assessing & Auditing Internet Usage Policies Presented to the Institute of Internal Auditors 13 April 2004 M. E. Kabay, PhD, CISSP Associate Professor.
Internet Safety for Young People Presented by: Ashwin Seegolam & Shailaja Oolun NCB.
Personal Information Security and Malware Awareness Workshop Bard College at Simons Rock Information Technology Services (ITS) Summer 2012 (Please sign.
Computer Hope Copyright © Cannady ACOS. All rights reserved.
PRESENTATION ON INTERNET PROFICIENCY SCHEME INTERNET SAFETY AT SCHOOL AND IN THE HOME Produced by Childnet International. Copyright 2003.
1 Information Security Awareness Training: Good Computing Practices for Confidential Electronic Information Information Security Training for all Workforce.
Facing up to Facebook.com Staci Hersh Tom Kupferer Mark Nakamoto Chris Stipeck New York University Diversity College.
CYBER SECURITY TRAINING Virginia Marine Resources Commission MIS Dept. October 2012.
Company LOGO Data Protection Fundamentals Sensitisation MQA By : Mrs. Pravina DODAH Mr. Hemrajsingh BHUGOWON Date : 09 Nov 2012.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
The Ethical Use of Computers. What are ethics? The rules of right and wrong behavior. Merriam-Webster defines ethics as the principles of conduct governing.
ATS 8A - 1 The Art of Tech Support John Abbott College Ethical Issues in Cyberspace and in the Workplace M. E. Kabay, PhD, CISSP Director of Education,
Practice Ethical and Legal Use of Technology Copyright © Cannady ACOS. All rights reserved.
Incident Response In a Microsoft World. By John K. AKA
© 2016 SlidePlayer.com Inc. All rights reserved.