Lecture2 Networking. Overview Email and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

Dangers on the Internet
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Implications and Security Issues of the Internet By Neelesh Patel.
Breaking Trust On The Internet
Inappropriate Materials. Discussion Question Think of a time in your classroom when a student viewed inappropriate materials. Why were they inappropriate?
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Chapter 3 Networking. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview (1/2) Introduction .
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Lesson 19 Internet Basics.
Computer Networks IGCSE ICT Section 4.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Lecture 5 Title: Networks and Businesses
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
Welcome to e-safety Training Friday 3 rd Oct 2014.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
 Social Networking  Posting and watching videos on YouTube  Blogging  Chat Rooms  Visiting Wikis  Googeling virtually ANY subject.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Lecture 6, Term COD12 COMPUTER LITERACY Communication and Connectivity.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Introduction To Internet
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Internet Architecture and Governance
Internet Définition: Internet: interconnected networks: an interconnected system of networks that connects computers around the world via the TCP/IP protocol.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
Chapter 2 Rheachel, Jessica, Megan, and Cassidy Communications, Networks, the Internet, and the World Wide Web.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
The Internet  Define the internet  Discuss advantages of the internet  List requirement needed to access the internet.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
E-safety Helping your children stay safe on-line A presentation for Parents.
WHAT IS THE INTERNET ? Objective: to develop a network for transmission of information within the framework of institutions which are not affected by the.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Online Communications This is about different ways that people & businesses communicate online You will already be very familar with most ways.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
Vocabulary Internet Flash cards Computer Science – Espinosa.
A Parent’s Guide to Child Safety on the Internet.
Chapter 3: Networking.
Presented to The Board of Education September 20, 2016
Presented to The Board of Education September 6, 2011
Ethics Tutorial Assignment#2
Presented to The Board of Education September 19, 2017
The Internet and Electronic mail
Presentation transcript:

Lecture2 Networking

Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the Internet Internet addiction 1-2

Networking = Online Behavior 3-3 Internet Web Spam Online Pornography Censorship Identity Theft Sexting

and Spam How Works Messages embedded in files transferred between computers Messages broken into packets Routers transfer packets from sender’s mail server to receiver’s mail server 1-4

Routers Pass from LAN to LAN 1-5

Spam Spam: Unsolicited, bulk Spam is profitable – Profitable even if only 1 in 100,000 buys product Amount of that is spam has ballooned – 8% in 2001 – 90% in

The Spam 1-7

Spam How Companies get addresses – Web sites, chat-room conversations, newsgroups – Computer viruses harvest addresses from PC address books – Dictionary attacks – Contests Spam filters block most spam before it reaches users’ inboxes 1-8

Reaction to Spam Slide 4- 9

2. The World Wide Web Attributes of the Web It is decentralized Every Web object has a unique address It is based on the Internet 1-10

How We Use the Web Shopping Socializing (e.g., Facebook) Contributing content (e.g., wikis, blogs) Blogging Learning Entering virtual worlds Paying taxes Gambling Taking humanitarian action Lots more! 1-11

Tim B-L’s 1 st Web Browser - WWW Slide From

Twitter More than 200 million users Blogging tool (+) Social networks lead to politicization (-) Ties in social networks too weak for high- risk activism 1-13

Governmental Control: Too Much or Too Little? Burma,Cuba, North Korea: Internet virtually inaccessible Saudi Arabia: centralized control center United States: Repeated efforts to limit access of minors to pornography 1-14

Censorship Forms of Direct Censorship State ownership of media Prepublication review Licensing and registration Control media,also can lead for censorship. 3-15

Internet Censorship Is Control The Dissemination Of And Access To Information On The Internet, And Are Used In control Technology relies On A Firewall Or Proxy, And This Is Done By Forcing All Dealers with The Network To Pass Through Proxy Servers Before Access To The Network, Definition of Internet censorship 1-16

Challenges Posed by the Internet Many-to-many communications Dynamic connections Huge numbers of Web sites Extends beyond national borders, laws 1-17

Freedom of Expression Freedom of Expression: History Not exist prior restraints on publication … publish as you, please. American states adopted freedom of expression Freedom of Expression, Threat to loyalty Various restrictions on freedom of expression exist 3-18

Children and Inappropriate Content Web Filters Web filter: Software that prevents display of certain Web pages – May be installed on an individual PC Methodologies – Examine content for Inappropriate words/phrases 1-19

Child Internet Protection Act You have to filter their networks of libraries of content inappropriate for children 1-20

Sexting describe the creation and transmission of sexual images by minors. In a 2009 survey, 9% of U.S. teenagers admitted to sending a sext, 17% admitted to receiving a sext Case of Jesse Logan Case of Phillip Alpert Case of Ting-Yi Oei 1-21

Breaking Trust on the Internet Identity Theft Identity theft: When a person uses another person’s electronic identity identity theft is credit card fraud Financial institutions contribute to problem by making it easy to open new accounts About 10 million cases of identity theft in U.S. in

Identity Theft Nearly half of cases from lost credit card, checkbook, etc. In 20% of cases, credit card number stolen at time of making purchase. About 1 million cases of identity theft annually in United States from online activities 1-23

Chat-Room Predators Chat room: Supports real-time discussions among many people connected to network Instant messaging and chat rooms replacing telephone for many people Some pedophiles meeting children through chat rooms 1-24