20332 security Legal and ethical issues when a business is providing internet access for individuals © EIT, Author Gay Robertson, 2016.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security, Privacy, and Ethics Online Computer Crimes.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Safety.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
Network and Internet Security and Privacy
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Lecture 8. Cyber Security, Ethics and Trust
Software Applications for end-users
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
© EIT, Author Gay Robertson, 2017
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Network and Internet Security and Privacy
INFORMATION SYSTEMS SECURITY and CONTROL
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

20332 security Legal and ethical issues when a business is providing internet access for individuals © EIT, Author Gay Robertson, 2016

Implications to consider .. Security of information Personal use Virus protection Physical Security Personal safety

Implications for business Security of information …

Security of information … Security of an organization or home business network is become more and more important as people spend more and more time connected to the Internet The increased use of electronic media has increased the possibility of security breaches Compromising network security is often easier than breaking into your building Protection of information / data is the process of securing against use, modification, tampering or disclosure of data by some means of UNAUTHORISED access (internal or external)

Every business needs … Integrity of data Availability of data Data is not tampered with or modified without the modification being detected Availability of data Data is available when required by users who are given the rights to the data Disclosure Only data necessary for the user to perform his task is made available or ‘disclosed’

Security needs to follow data as it moves across the network or WiFi network on different devices

EIT policies dealing with the impact of security of information … Password policies User passwords, file passwords, drive folder passwords and server passwords Passwords should be changed frequently Passwords must not be shared or revealed to others Access policies - all users must Only access, alter or delete information on the system they are authorised to use Use the System for the purposes for which access is granted Regardless of circumstances, username and passwords must never be shared or revealed to anyone else besides the authorised user

Records management policies – User must ensure that data on a laptop or USB device is also located on the server for back up purposes IT Services will not be responsible for recovery of data lost from local computer hard drives or USB devices or any other mobile device Use of EIT Resources, Facilities and Equipment policy Students must use EIT resources, facilities and equipment in a careful and responsible manner and only use them for the legitimate EIT purposes for which they are provided. Students who use Social Networking on EIT resources must be aware of the amount of personal use EIT block sites which are objectionable or illegal for your personal safety

Biometrics are being used for access to equipment eg laptops, servers Authentication based on unique characteristics of that person’s body Fingerprints Iris or Retina Face Security policy availability Students can request access to this at any time Recovering from theft Backup of server kept off site at a secure location

Improper Use of IT Systems policy includes Using computer programmes to decrypt, capture passwords or control information Attempting to circumvent or subvert system security measures Engaging in any activity that may be harmful to systems or to any information stored thereon, such as creating or intentionally propagating viruses, disrupting services, or damaging files Installation or downloading of any software applications (including computer games) that are not approved for use by IT Services on the EIT computer systems Unauthorised use of software applications can pose a serious security risk and IT Services staff will remove any unauthorised software as deemed necessary

Implications for a business Internet for personal use …

Personal use of business email… Business email systems and Internet access is primarily for the business purposes Most businesses allow access to Stuff, Facebook, TradeMe, YouTube, Wikipedia and many other web sites Email Etiquette requires: Personal use should be kept to a minimal amount of time Good personal judgement about the sites you visit is expected of all staff Never send junk mail, random mail or ‘who are you’ messages Limit your use of lists as much as possible and know how to unsubscribe

Monitoring software … Businesses use monitoring software to keep track of personal use Where a user is believed to be in breach of policy or law based on system monitoring the information collected in system monitoring will be passed to the appropriate manager or enforcement agency ‘What is accessed’ and ‘time spent’ is reported to management Frequency of access to sites is also reported to management Businesses can impose ‘time bans’ eg user can only look at Stuff between 12 – 1 pm when network use is low

Implications for business Virus & virus protection …

Virus protection … What are the threats? Email Phishing Websites Removable media Direct connectivity to an end-user service

Emails can contain … Malware Viruses Trojan horse Spyware Worms Tricks computer user into downloading software which is malicious Viruses Computer Viruses replicate (repeat) their structures or effects by infecting other files or structures Trojan horse Malicious software that pretends to be harmless Spyware Programs that monitor your activity on your computer without you knowing Information is reported to others Worms Programs that can replicate (copy or repeat) themselves throughout a network

Phishing … Attempts to steal bank account and credit card numbers, PINs and site passwords by asking you to click a link in an email Email looks genuine with official looking logos and content Any details you provide may be used to access your bank or credit card account or site network

Websites … Malicious code can be delivered via websites Legitimate websites can be hacked into and malicious code attached to popular content eg photos, movies, cooking recipes The hacker waits for users to link to the website or website content If your anti-virus software is out of date you will not be protected If your system is not well protected you could be infected or your policies could be violated

Removable media … These include USB devices, DVDs and CDs Delivered ‘free or really cheaply’ are an effective means to deliver malware eg arrives in the post, or you buy a device from ‘TradeMe’ Malware could be included in Documents Free software Multi media Always run Anti-virus software on devices BEFORE using the device especially in EIT systems

Direct connectivity to end-user service … “Always On” Internet Access that is permanently available eg intentionally open to users inside or outside the network Network based applications have specific network protocols (rules) Applications could include Websites eg Facebook , Twitter Remote access File sharing Email Virtual private networking

What could a business do to provide virus protection? Implement Intrusion Detection System (IDS) This monitors the EIT network/system for malicious activities or policy violations When detected, the IDS will try to stop or prevent the illegal activity by performing system activities that will lead to stopping the attacks aimed at the EIT system/network And the IDS will discover problems in EIT security BEFORE the attackers do

Implement Firewalls impose restrictions on incoming and outgoing packets to and from EIT networks All the traffic, whether incoming or outgoing, must pass through the firewall Firewalls create checkpoints between an internal private network (EIT) and the public Internet Firewalls can limit EIT network exposure by hiding the internal network system and information from the public Internet

Antivirus programs detect and eliminate viruses Implement Antivirus programs and Internet security programs - these are useful in Protecting a computer from malware and other malicious software Antivirus programs detect and eliminate viruses This is the antivirus program used at EIT

Implications for business Physical security …

Lose your data – lose your business What could an intruder do? Write malicious code to servers Steal or damage hard drives Copy hard drives Alter security settings Add equipment to your network

EIT security Security policies to secure premises EIT has security systems, security staff, alarms, locks, swipe cards Detect theft EIT use surveillance cameras inside and outside buildings to track intruders or dishonest insiders

Implications for Digital Citizen Personal safety …

Personal safety when using a business system For your personal safety, businesses block access to sites which are objectionable, offensive, slanderous, illegal, obscene or likely to be offensive Businesses uses monitoring software to keep track of personal safety and ensure compliance with policy and legislation

Personal safety for the Digital Citizen … While you are online, security, privacy and personal safety are always an issue. This is particularly true of broadband connections that are "always on", that is, the connection to the Internet is always open Excellent Sites for information on all aspects of computer security http://www.bbc.co.uk/webwise/0/27606410 http://www.bbc.co.uk/webwise/0/22717881 http://www.gcflearnfree.org/internetsafety/your-browsers-security-features/1/ and especially for if you have kids http://www.gcflearnfree.org/internetsafetyforkids/

Important points for you to think about to enhance your personal safety

Back to the workbook now!!