Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

GCSE ICT Networks & Security..
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security and Privacy Chapter Overview  This chapter covers:  Hardware loss, hardware damage, and system failure, and the safeguards that.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1.1 System Performance Security Module 1 Version 5.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 8: Computer Security and Privacy. 2 Learning Objectives  Explain why all computer users should be concerned about computer security.  List some.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Privacy, Security and Ethics
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Systems Design and Development Security Precautions Computing Science.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Network and Internet Security and Privacy
UNIT 19 Data Security 2.
Securing Information Systems
Computer Security, Ethics and Privacy
Network and Internet Security and Privacy
Computer Security, Ethics and Privacy
G061 - Network Security.
Presentation transcript:

Network and Internet Security and Privacy

 Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying other children or teenagers via the internet  Cyberstalking – repeated threats or harassing behavior via the internet  Although there are as yet no specific federal laws against cyberstalking, all states have made it illegal, and some federal laws do apply if the online actions include computer fraud or another type of computer crime, suggest a threat of personal injury, or involve sending obscene messages.

 A variety of controversial and potentially objectionable material is available on the Internet.  Although there have been attempts to ban this type of material from the Internet, they have not been successful.

 To protect yourself against cyberstalking and other types of online harassment:  Use gender-neutral, nonprovocative identifying names.  Be careful about the types of photos you post online and  Do not reveal personal information to people you meet online.

 To protect yourself against cyberstalking and other types of online harassment:  Do not respond to any insults or other harassing comments you may receive online.  Consider requesting that your personal information be removed from online directories, especially those associated with your address or other online identifiers.

 Topics Covered:  Protecting your information  Hardware Loss and Damage  System Failure and Other Disasters  Protecting Against Hardware Loss, Hardware Damage, and System Failure  Firewalls, Encryption, and Virtual Private Networks (VPNs)

 Keep in mind the following precautions when using computers (both desk top and portable) and other mobile devices:  Install and use ▪encryption ▪antivirus ▪antispyware, ▪firewall software. 7

 Encryption is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key. Encryption key (formula) often uses more than one method  Encryption is used in secure Web sites as well as other mediums of data transfer.  Private key encryption uses a single secret private key to both encrypt and decrypt a file or message being sent over the Internet.  Public key encryption, also called asymmetric key encryption, utilizes two encryption keys to encrypt and decrypt documents.

 Identifies and removes computer viruses  Most also protect against worms and Trojan horses  Most anti-virus programs provide more then just virus protection.

Windows Security Essentials

 A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.  Firewalls can be either hardware or software-based.

 User name - Unique combination of characters that identifies user  Password is private combination of characters associated with the user name that allows access to computer resources

 Keep in mind the following precautions when using computers (both desk top and portable) and other mobile devices:  Use only secure Wi-Fi connections, and disable Wi-Fi and Bluetooth when they are not needed.  Don’t store usernames or passwords attached to a computer or inside its case.  Use a plain case to make a portable computer less conspicuous.  Use a cable lock to secure devices to a desk or other object whenever you must leave them unattended.  Regularly back up your data.

 How important is your data?  You can back up on a random basis on to CD/DVD/Blue Ray disks or attached hard drives.  You can automate back up onto internal or external hard drives.  You can use internet back up like cloud storage.

 Hardware loss  Hardware theft  Component damage

 System failure is the complete malfunction of a computer system.

 Prolonged malfunction of computer  Can cause loss of hardware, software, or data  Caused by aging hardware, natural disasters, malware, or electrical power disturbances  Electric power disturbances  Noise—unwanted electrical signal  Under-voltage—drop in electrical supply  Overvoltage or power surge—significant increase in electrical power

 Surge protector – protects equipment from noise and over voltage  Uninterruptible power supply (UPS) - protects equipment from noise and over voltage and under voltage.

 Proper care of hardware can help prevent serious damage to a computer system:  Protective cases  Ruggedized devices

 Privacy is usually defined as the state of being concealed or free from unauthorized intrusion.  The term information privacy refers to the rights of individuals and companies to control how information about them is collected and used.

 Marketing databases contain marketing and demographic data about people, such as where they live and what products they buy.  Information about individuals is also available in government databases.  Collecting in-depth information about an individual is known as electronic profiling.

 Database examples;  Property value  Public records  Address

 Most businesses and Web sites that collect personal information have a privacy policy that discloses how the personal information you provide will be used.  Amazon.com  Information You Give Us: We receive and store any information you enter on our Web site or give us in any other wayYou can choose not to provide certain information, but then you might not be able to take advantage of many of our features. We use the information that you provide for such purposes as responding to your requests, customizing future shopping for you, improving our stores, and communicating with you.  Our site includes third-party advertising and links to other Web sites. We do not provide any personally identifiable customer information to these advertisers or third-party Web sites.

 Computer monitoring software: records keystrokes, log the programs or Web sites accessed, or otherwise monitors someone’s computer activity.  Video surveillance: the use of video cameras to monitor activities of individuals for work-related or crime-preventions purposes.  Employee monitoring: recording or observing the actions of employees while on the job.  Presence technology: enables one computing device to locate and identify the current status of another device on the same network.

 There are not many options for protecting yourself against computer monitoring by your employer or the government, or against video surveillance systems.  Businesses should take the necessary security measures to ensure that employee activities are not being monitored by a hacker or other unauthorized individual.  It is illegal for one individual to monitor the activities on another individual.

 The following privacy tips can help you safeguard personal information:  Read a Web site’s privacy policy before providing any personal information  Avoid putting too many personal details on your Web site or on a social networking site  When you sign up for free trials or other services that may result in spam, use a throw-away address  Consider using privacy software to hide your personal information as you browse the Web  Supply only the required information when completing online forms  If you are using a public computer, remove any personal information and settings stored on the computer during your session

 It’s difficult for the legal system to keep pace with the rate at which technology changes.  The high level of concern regarding computer security and personal privacy has led state and federal legislators to pass a variety of laws since the 1970s.