Presentation is loading. Please wait.

Presentation is loading. Please wait.

US Copyright Law & Protecting Your Privacy On-Line Marty Manjak Information Security Officer.

Similar presentations


Presentation on theme: "US Copyright Law & Protecting Your Privacy On-Line Marty Manjak Information Security Officer."— Presentation transcript:

1 US Copyright Law & Protecting Your Privacy On-Line Marty Manjak Information Security Officer

2 US Copyright Law Signed by Pres. Washington in 1790 Protects authors of “maps, charts, and books” Author possesses sole authority to print, publish, and sell Violators fined $.50 for each unauthorized copy

3 Intellectual Property Roberto (Law) has an idea Roberto commits his idea to “tangible form” (paper, electronic) Roberto’s idea is now copyrighted No one else may copy, distribute, or sell his idea without his permission

4 Intellectual Property (IP) Copyright protects IP Examples: choreography, sculpture, films, books, screenplays, essays, scripts, diagrams, paintings, drawings, research, designs, maps, architectural drawings, songs, poems, non-fiction….. All are protected against theft…in any format

5 Digital Millennium Copyrigh Act-1998 DMCA: written to protect IP from digital copying and distribution. If university receives a DMCA complaint: They must remove the copyrighted material from their network Or, be liable for financial penalties

6 File Sharing and Peer-to-Peer File sharing software (Limeware and BitTorrent) can violate copyright law Sharing protected works without permission Worse-They can cost you thousands of dollars! Up to $250,000 per item! Recent awards: $54,000-$67,5000

7 Be Careful with file sharing! Don’t embarrass your host school Don’t embarrass yourself Don’t become liable for financial penalties

8 The Copyright Test If you don’t have permission, you can’t share it

9 On-line Protection Cyber crime is big business You will be a target You need to be pro-active in protecting your privacy and your computer

10 The Torpig Botnet Researchers at UC Santa Barbara gained control of botnet for 10 days 180,000 machines were infected 70Gbs (7 x 10 10) of personal data collected 8,310 account passwords 410 financial institutions 1,660 credit card numbers

11 Scareware Fake antivirus products earn promoters $100 million (for starters) http://www.interpol.int/public/Data/Wante d/Notices/Data/2009/45/2009_13445.asp http://www.interpol.int/public/Data/Wante d/Notices/Data/2009/45/2009_13445.asp http://www.thenewnewinternet.com/2010/ 05/28/swede-u-s-citizen-accused-of- running-scareware-scam/ http://www.thenewnewinternet.com/2010/ 05/28/swede-u-s-citizen-accused-of- running-scareware-scam

12 How were machines infected? Drive-by downloads from legitimate web sites. Good web sites have been compromised and seeded with malicious code that attacks your computer Malware will attack your browser and other software (Adobe products [Flash, Reader], iTunes, Quicktime, Java)

13 Protection #1 Don’t use the web with administrator privileges Use less privileged “User” accounts This is standard with Vista and Windows 7 machines

14 Protection #2 Keep EVERYTHING patched secunia.com/vulnerability_scanning/online/ Secunia will check for missing patches and vulnerable software Install the Personal version: http://secunia.com/vulnerability_scanning/ personal/

15 Protection #3 Use anti-malware products Anti-virus Anti-spyware Spyware Blaster Spybot Search and Destroy Windows Defender Keep them up-to-date!

16 Protection #4 Use long passphrases (> 14 characters), even on Facebook! J’aimedespommesfr!t3S = 86 21 Use different passphrases for different services Use KeePass2 to remember your passphrases http://keepass.info/download.html

17 Protection #2 Keep EVERYTHING patched secunia.com/vulnerability_scanning/online/ Secunia will check for missing patches and vulnerable software Install the Personal version: http://secunia.com/vulnerability_scanning/ personal/

18 Protection #5 Use a firewall Most operating systems (Windows, Mac OS X) come with built in firewalls Don’t turn them off!

19 Protection #6 Beware of social engineering Most malware is installed by the victim Fake video codecs Poison links in email messages Phishing: “Send us your password now!” Fraudulent messages from “friends” Fake anti-virus warnings Criminals will pose as friends, victims, and authorities

20 Protection: Bonus Points Use the Firefox browser with No Script Forces you to decide what content you will allow Will break a lot of web pages  But will also stop 99% of web attacks https://addons.mozilla.org/en- US/firefox/addon/722/

21 More Firefox Bonus Points Browser Plug-in: AdBlock Plus https://addons.mozilla.org/en- US/firefox/addon/1865/ https://addons.mozilla.org/en- US/firefox/addon/1865/ Browser Plug-in: Better Privacy Deletes persistent cookies https://addons.mozilla.org/en- US/firefox/addon/6623/

22 Review 1. Don’t run as admin 2. Keep EVERYTHING patched 3. Use Anti-virus software 4. Different site; Different passphrase 5. Firewalls: don’t disable 6. Be wary of social engineering

23 Thank you! And good luck!!


Download ppt "US Copyright Law & Protecting Your Privacy On-Line Marty Manjak Information Security Officer."

Similar presentations


Ads by Google