We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEstevan Seddon
Modified about 1 year ago
1 Copyright © 2014 M. E. Kabay. All rights reserved. & Internet- Use Policies CSH5 Chapter 48 “ and Internet-Use Policies” M. E. Kabay & Nicholas Takacs
2 Copyright © 2014 M. E. Kabay. All rights reserved. Plan for Today Video: The Plugged-in Mailbox Discussion Chapter Review
3 Copyright © 2014 M. E. Kabay. All rights reserved. Topics in CSH5 Ch 48 Damaging the Reputation of the Enterprise Disseminating and Using Incorrect Information Hoaxes Threats Viruses and Other Malicious Code Junk Chain Letters and Ponzi Schemes Get-Rich-Quick Schemes Mail Storms Stolen Intellectual Property Plagiarism Criminal Hacking and Hacktivism Online Auctions Online Gambling Buying on the Web Games Spyware Internet Addiction Online Dating and Cybersex Hate Groups Pornography Pedophiles
4 Copyright © 2014 M. E. Kabay. All rights reserved. Training Video The Plugged-In Mailbox Commonwealth Films Followed by Class Discussion
5 Copyright © 2014 M. E. Kabay. All rights reserved. Damaging the Reputation of the Enterprise Principle: The USENET is forever is almost forever Violating netiquette Violating laws Ill-advised Creating hostile work environment Libeling people or organizations Inappropriate use of corporate identifiers Corporate = corporate letterhead
6 Copyright © 2014 M. E. Kabay. All rights reserved. Disseminating and Using Incorrect Information Disintermediation and quality Libel Practical guidelines Judge credibility of source Do not pass on information without checking validity X
7 Copyright © 2014 M. E. Kabay. All rights reserved. Hoaxes Urban myths Virus myths Clues Style No date No authoritative source Demand to disseminate widely Claims of prizes / money Threats of bad consequences for failing to circulate
8 Copyright © 2014 M. E. Kabay. All rights reserved. Threats Do not take lightly NEVER destroy of this type Need evidence Should usually contact internal security Security personnel will call law enforcement according to established procedures Threats of terrorist action (bombs, poison) particularly serious and may require immediate action as part of incident response plan
9 Copyright © 2014 M. E. Kabay. All rights reserved. Viruses and Other Malicious Code Policies forbid all voluntary involvement with malware No Vx sites No writing, exchange, distribution No disabling of AV software Safety guidelines known to all Automatic updates Don’t use illegal / rogue software Don’t accept executable attachments to
10 Copyright © 2014 M. E. Kabay. All rights reserved. Junk The SPAM®* skit (Monty Python)! Major problem – 80% of all in world Guidelines No employee to create / send spam Never allow response to spam Never buy anything from spammers Don’t click on addresses in spam Make sure your SMTP server forbids spam relay * SPAM® is a registered TM. Use Spam or spam but not SPAM for junk .
11 Copyright © 2014 M. E. Kabay. All rights reserved. Chain Letters and Ponzi Schemes Pyramid fraud Send money to people higher (earlier) on list Amounts increase as long as new victims recruited When no more new victims, pyramid collapses Last in lose all their money Originators run away rich Illegal in USA (USPS regs) No employee should be allowed to participate
12 Copyright © 2014 M. E. Kabay. All rights reserved. Get-Rich-Quick Schemes Infinite variety of schemes for suckers Too good to be true = not true Nigerian (advance-fee) scams a plague I have lots of stolen/unclaimed money “I’ll give you some if you help me steal it” Policy: constant awareness Ensure employees know about scams Make fun of scams in your newsletters Tell employees about gullible (stupid) victims
13 Copyright © 2014 M. E. Kabay. All rights reserved. Mail Storms Autoforwarding between 2 addresses List servers that allow autoresponse to entire list Full mailboxes Out-of-office replies Reply to entire list instead of to single person Quoting entire messages instead of extracts Especially quotations Of quotations Of quotations Of quotations….
14 Copyright © 2014 M. E. Kabay. All rights reserved. Stolen Intellectual Property Serious legal issues for employers RIAA has threatened companies, universities with lawsuits SPA / BSA have sued organizations Webmasters get employers into trouble by posting materials without permission Embarrassing, risky Politicians have found stolen text on competitors’ Websites Must train employees to respect legal restrictions for software, music, text
15 Copyright © 2014 M. E. Kabay. All rights reserved. Production software can never be allowed to be stolen versions! Serious legal liability Vulnerability to blackmail Public humiliation Expensive penalties Undermines credibility of management principles Demoralizing to honest employees Stolen Intellectual Property
16 Copyright © 2014 M. E. Kabay. All rights reserved. Plagiarism Unattributed / misattributed information Copyright violation Extreme embarrassment Discredits organization Policies Absolutely forbidden Check materials using GOOGLE etc. Tools available for automated checking E.g., See next page
17 Copyright © 2014 M. E. Kabay. All rights reserved. DocCop
18 Copyright © 2014 M. E. Kabay. All rights reserved. Criminal Hacking and Hacktivism Duhhh…
19 Copyright © 2014 M. E. Kabay. All rights reserved. Other Risks to Employees and Families Online Auctions Online Gambling Buying on the Web Games Spyware Internet Addiction Online Dating and Cybersex Hate Groups Pornography Pedophiles
20 Copyright © 2014 M. E. Kabay. All rights reserved. Review Questions (1) 1.Why should an organization expend any effort at all in teaching employees how to protect themselves and their families against Internet & dangers? What does this have to do with information assurance? 2.How can something as minor as violating customs in discussion groups cause harm to an organization? 3.Why do we say that USENET and corporate have a potentially permanent lifespan? 4.Should corporate be used for non-professional messages? Why or why not? 5.How can someone reasonably decide whether to forward an containing alarming information? 6.What does “disintermediation” mean in discussions of information quality on the Internet?
21 Copyright © 2014 M. E. Kabay. All rights reserved. Review Questions (2) 7.What are some key signs that message is a hoax? 8.How can you check a message to find out if it is a hoax? 9.How should employees respond to threats of violence received in ? 10.What are the most important principles to teach employees about preventing virus / worm infections? 11.How should employees respond to junk ? 12.What is a Ponzi scheme and how should employees respond to one? 13.Explain how mail storms can arise from autoreplies and mailing lists. 14.Why should organizations ban the use or exchange of pirated music, software and text?
22 Copyright © 2014 M. E. Kabay. All rights reserved. DISCUSSION
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
BTT12OI. Do you know someone who has been scammed? What happened? Been tricked into sending someone else money (not who they thought they were)
BTT12OI. Do you know someone who has been scammed online? What happened? Been tricked into sending someone else money (not who they thought they were)
Scams & Schemes Common Sense Media. Vocabulary Scam Identity Theft – an attempt to trick someone, usually with the intention of stealing money or.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS Using the Internet safely and responsibly.
Cyber Safety Assessment Review Grades Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE.
Let’s Talk About Cyber Security A guided PowerPoint lesson For Presentation at Mayfield Intermediate.
HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET
What is identity theft, and how can you protect yourself from it?
Carla Bates Technology and Education ED 505. Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Contents Viruses Viruses Computer Worms Computer Worms Trojans Trojans Spyware Spyware Adware Adware Spam Spam Hoaxes and Scams Hoaxes and.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Technology in the Classroom By: Amanda Johnson - Cyberbullying -Internet Safety -Legal, Ethical and Social Issues - Cyberbullying -Internet Safety -Legal,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber Crimes. Introduction Definition Types Classification.
ED 505 Educational Technology By James Moore. What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
BY: RACHEL NOWLING UWA – ED 505 Digital Citizenship Project.
Digital Citizen Project By: Frances Murphey Technology and Education.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Technology is a wonderful thing! Because of internet and cell phones we can : Rapidly communicate with people all over the world Learn about anything.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons: Lesson 3: Protecting yourself and your.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Northside I.S.D. Acceptable Use Policy
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Scams and Schemes VICTORIA ISD COMMON SENSE MEDIA GRADE 6: SCAMS AND SCHEMES.
Consumer Issues Chapter 28. Objectives Explain the role, rights, and responsibilities of consumers. Evaluate sources of consumer information. Outline.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Security fundamentals Topic 9 Securing internet messaging.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
© Nichola Wilkin Ltd Online Safety Quiz Start Quiz.
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
When young people go online: 13% received unwanted sexual solicitations 34% communicate with individuals they never met 11% establish close personal.
Acceptable Use Policy. The District system includes: A network of computers that serves all the schools Saved files on a server for student work.
Security, Privacy, and Ethics Online Computer Crimes.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Computer Security Keeping you and your computer safe in the digital world.
Danielle Hildebrant Acceptable Use Policies ◦ document stating the use and limits of the network or internet Cyberbullying ◦ Bullying that takes.
© 2017 SlidePlayer.com Inc. All rights reserved.