US Copyright Law & Protecting Your Privacy On-Line Marty Manjak Information Security Officer.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Let’s Talk About Cyber Security
Social media threats. Warning! May contain mild peril.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
The Most Dangerous Places on The Web (according to PC World)
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Chapter Nine Maintaining a Computer Part III: Malware.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
A First Course in Information Security
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
Keeping your computer current and trouble free Aaron Robertson.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Protecting Your Information Assets
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
PLUG IT IN SIX Protecting Your Information Assets.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Safety and Security issues of using ICT Alys brooks.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
COMPUTER MALWARE. Malware is a general term for any type of unwanted software that does mischief or permanent damage to your computer. Malware is created.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Botnets A collection of compromised machines
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Risk of the Internet At Home
Computer Security.
Test 3 review FTP & Cybersecurity
Presentation transcript:

US Copyright Law & Protecting Your Privacy On-Line Marty Manjak Information Security Officer

US Copyright Law Signed by Pres. Washington in 1790 Protects authors of “maps, charts, and books” Author possesses sole authority to print, publish, and sell Violators fined $.50 for each unauthorized copy

Intellectual Property Roberto (Law) has an idea Roberto commits his idea to “tangible form” (paper, electronic) Roberto’s idea is now copyrighted No one else may copy, distribute, or sell his idea without his permission

Intellectual Property (IP) Copyright protects IP Examples: choreography, sculpture, films, books, screenplays, essays, scripts, diagrams, paintings, drawings, research, designs, maps, architectural drawings, songs, poems, non-fiction….. All are protected against theft…in any format

Digital Millennium Copyrigh Act-1998 DMCA: written to protect IP from digital copying and distribution. If university receives a DMCA complaint: They must remove the copyrighted material from their network Or, be liable for financial penalties

File Sharing and Peer-to-Peer File sharing software (Limeware and BitTorrent) can violate copyright law Sharing protected works without permission Worse-They can cost you thousands of dollars! Up to $250,000 per item! Recent awards: $54,000-$67,5000

Be Careful with file sharing! Don’t embarrass your host school Don’t embarrass yourself Don’t become liable for financial penalties

The Copyright Test If you don’t have permission, you can’t share it

On-line Protection Cyber crime is big business You will be a target You need to be pro-active in protecting your privacy and your computer

The Torpig Botnet Researchers at UC Santa Barbara gained control of botnet for 10 days 180,000 machines were infected 70Gbs (7 x 10 10) of personal data collected 8,310 account passwords 410 financial institutions 1,660 credit card numbers

Scareware Fake antivirus products earn promoters $100 million (for starters) d/Notices/Data/2009/45/2009_13445.asp d/Notices/Data/2009/45/2009_13445.asp 05/28/swede-u-s-citizen-accused-of- running-scareware-scam/ 05/28/swede-u-s-citizen-accused-of- running-scareware-scam

How were machines infected? Drive-by downloads from legitimate web sites. Good web sites have been compromised and seeded with malicious code that attacks your computer Malware will attack your browser and other software (Adobe products [Flash, Reader], iTunes, Quicktime, Java)

Protection #1 Don’t use the web with administrator privileges Use less privileged “User” accounts This is standard with Vista and Windows 7 machines

Protection #2 Keep EVERYTHING patched secunia.com/vulnerability_scanning/online/ Secunia will check for missing patches and vulnerable software Install the Personal version: personal/

Protection #3 Use anti-malware products Anti-virus Anti-spyware Spyware Blaster Spybot Search and Destroy Windows Defender Keep them up-to-date!

Protection #4 Use long passphrases (> 14 characters), even on Facebook! J’aimedespommesfr!t3S = Use different passphrases for different services Use KeePass2 to remember your passphrases

Protection #2 Keep EVERYTHING patched secunia.com/vulnerability_scanning/online/ Secunia will check for missing patches and vulnerable software Install the Personal version: personal/

Protection #5 Use a firewall Most operating systems (Windows, Mac OS X) come with built in firewalls Don’t turn them off!

Protection #6 Beware of social engineering Most malware is installed by the victim Fake video codecs Poison links in messages Phishing: “Send us your password now!” Fraudulent messages from “friends” Fake anti-virus warnings Criminals will pose as friends, victims, and authorities

Protection: Bonus Points Use the Firefox browser with No Script Forces you to decide what content you will allow Will break a lot of web pages  But will also stop 99% of web attacks US/firefox/addon/722/

More Firefox Bonus Points Browser Plug-in: AdBlock Plus US/firefox/addon/1865/ US/firefox/addon/1865/ Browser Plug-in: Better Privacy Deletes persistent cookies US/firefox/addon/6623/

Review 1. Don’t run as admin 2. Keep EVERYTHING patched 3. Use Anti-virus software 4. Different site; Different passphrase 5. Firewalls: don’t disable 6. Be wary of social engineering

Thank you! And good luck!!