Sarah Breton CSC 104-01 December 13, 2012. Societal Topics Weeks 7 & 8  Internet Regulation : Internet regulation is restricting specific aspects of.

Slides:



Advertisements
Similar presentations
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
The Internet Information Systems, Intermediate 2.
CSC 101 Fall 2012 Felicia Furino December 13, 2012.
Csc Markup Internet Regulation - Internet Regulation is putting up laws on the internet, limiting the freedom of the internet. Sometime last.
CSC CONNOR HUNT. SOCIETAL TOPCS WEEKS 7 AND 8 Internet Regulation - Internet Regulation is putting up laws on the internet, limiting the freedom.
Kevin Workman CSC /04/12. Week 7 and 8 Internet regulation is basically restricting access to certain information. Examples of Internet regulation.
Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
Jodi Bissonnette CSC December 6, Societal Topics Weeks 7and 8 Internet Protocol (IP) addresses are numeric code used by any device that connects.
Societal Topics Alyssa Glasow CSC101. Show rooming  Show rooming consists of going to the physical store and browsing for a product, without making a.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
By: Mike Yerina. Internet Regulation: The Internet Regulation is a very important part of the world today and without it there would be huge changes in.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER SEVEN NETWORKS: MOBILE BUSINESS CHAPTER SEVEN NETWORKS:
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Jonathan Reichardt. Internet Regulation Internet regulations censor data on the internet monitor IP addresses. The Internet Society wants to stop regulations.
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Societal Topics Andrew McCauley CSC N Spring 2013.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
A First Course in Information Security
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Tiffany Robledo CSC N. Showrooming O Showrooming is when a customer walks into a store to check out a look and feel for the product then buys it.
A’Lexus Williams CSC 104 Final Exam Part 1. Societal Topics Weeks 7 & 8 Internet Regulation-is basically restricting or controlling access to certain.
Alexander Wichmann November 27, nd Half Slide Show.
Chapter 8 The Internet: A Resource for All of Us.
Protecting Your Information Assets
Sonja Campbell CSC 104. Index  Week 1  Topic 1 Topic 1  Topic 2 Topic 2  Week 2  Topic 1 Topic 1  Topic 2 Topic 2  Week 3  Topic 1 Topic 1  Topic.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
FINAL PROJECT Shelby LeVasseur CSC Fall 2012 November 27 th, December 13 th, 2012.
 Internet Regulation  Some people think that Internet Regulations and Business exchange are the same. That is why many consider this a controversial.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
The Internet: A Nursing Resource Nursing Informatics.
Jessica Lavoie CSC 101 November 27, Societal Topics Weeks 7 and 8 Internet Regulation Internet regulation is restricting or controlling access to.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Protecting Students on the School Computer Network Enfield High School.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Heidi Duchaine CSC /1/12. Societal Topics Weeks 7 and 8 Internet Regulation: In some societies around the globe, governments are regulating internet.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Instructional Plan | Slide 1 CIS 295 Network Security M. Sue Fuentes.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Components of wireless LAN & Its connection to the Internet
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Security Awareness – Essential Part of Security Management Ilze Murane.
The Internet: What is it? How does it work?
Networking Components
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Massive Open Online Course MOOC Judy Qiu Indiana University Bloomington.
Security “Automatic Border Detection” is essential – For service discovery scope – For prefix assignment and routing – For security Default filters (ULAs?)
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
{ Domain Name System DNS & IP Address Protocols within the Internet Ecosystem. - Amanda Sparling, EMAC 6300.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Networking Week #10 OBJECTIVES Chapter #6 Questions Review Chapter #8.
Chapter 6 Views on Technology. 1. Instrumentalist view - Technologies are neutral; a value neutral tool that can assist in achieving a certain purpose.
Hotspot Shield Protect Your Online Identity
TECHNOLOGY GUIDE THREE
Computer Data Security & Privacy
E-Commerce: Regulatory, Ethical, and Social Environments
E-Safety.
INTERNET SECURITY.
Presentation transcript:

Sarah Breton CSC December 13, 2012

Societal Topics Weeks 7 & 8  Internet Regulation : Internet regulation is restricting specific aspects of a network. Internet Regulation consists of censored data, controlled internet and domain registration, and control IP addresses. The regulations are produced to maintain neutral internet access.  Internet Governance : Internet governance applies to activities such as; coordination of technical standards, development and regulations that shape the internet. Internet governance is not restricted to the government. There are debates as to how the internet should be governed for the future.  EdX: Edx is a system of online courses. People can register for online classes. These classes are 12 hours per week. No prerequisites are required to take these specific courses.  IP Adressing : IP addresses are required for every device that can connect to the internet. IP addresses are managed by (Internet Assigned Numbers Authority). For an example, my iPhone requires an IP address to connect to the internet.

Societal Topics Week 9 & 10  Ipv6 : this is the next generation of internet protocol addresses. A lack of these addresses would cause slow programs and computers would have difficulties communicating with each other. IPv6 is essential for our future of technology.  Net Neutrality : Network neutrality is having the ability to have control where you surf the internet and what you do online. Network neutrality is the principle of internet that allows it to be the most diverse form of 21 st century history.  Windows 8: Windows 8 is the new software for windows operating systems. The windows 8 software program is offered for personal computers including home and business desktops, laptops, tablets, and home theater PCs.  Routing Autonomous Systems : is a group of connected IP routing abbreviations operated by more than one network. This is defined as the internet’s routing policy.

Societal Topics Weeks 11,12,13  Privacy and identity : Privacy matters so that people can communicate with people around the world without sacrificing their privacy identities. Privacy is about having the ability to disclose data, and have expectations of sharing knowledge to other people.  Border Gateway Protocol : is the protocol that makes the routing decisions for the internet. It also maintains the IP networks that designate its users to specific internet sources.  Spam : is a major concern for people using internet services. Spams are becoming to infect computers with viruses and fraudulent messages. The internet society works are focusing on providing protection from these types of spams.  MOOC: is a massive open online course. These courses are usually free at cost but do not offer credits to be used at universities. Most of the massive online courses are used for people who want to learn about something new.  Security : The internet society believes that the internet can be for everyone. Internet Society promotes the internet’s development, stability, and security. Security is supposed to protect from service attacks, fraud, spam, viruses, and scams.

Midterm

Tables

Google Forms

Google Map

Semantic Tags/Java Script

Google Forms

Google Video Editing

2ed Half Slideshow