Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor.

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

Public Relation.  While NAWS has no specific position on Facebook. NA as a whole has a clearly defined outline for the use of Internet technologies.
What Anyone Can Know The Privacy Risks of Social Networking Sites. Thelma Ameyaw TEL2813.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
COMP 2903 A31 – False Reporting on the Internet and the Spread of Rumors Danny Silver JSOCS, Acadia University.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Ch.5 It Security, Crime, Compliance, and Continuity
Computer Security Fundamentals
COMP 2903 A21 – The Evolution of Cyber Warfare Danny Silver JSOCS, Acadia University.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Wars Games By: Chris Hill. What is a Cyberwar? Cyberwar is a type of warfare that is all electronic attach instead of a physical attack which involves.
Network Security of The United States of America By: Jeffery T. Pelletier.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Network security policy: best practices
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Introduction to Network Defense
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cracking down on international cyberterrorism
Social impacts of the use of it By: Mohamed Abdalla.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
Article by Simon Garfinkel Presentation by Adam Miller.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
© 2014 WESTERN DIGITAL CORP. ALL RIGHTS RESERVED. Company Confidential Legislative & Regulatory Activities Involving Cyber Security Bob Bowen May 2015.
Privacy in the Media Presentation by Rich Green. What is Privacy? Privacy is the ability to have personal information kept out of the public eye In an.
The Internet and New Technologies Chapter 2. “We had a choice to enter the country and follow the law. Or we had a choice to not enter the country.” —Eric.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Section 6 Theory Software Copyright, Viruses and Hacking.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Social Impacts of IT. IT allows others to access information about you through social networking sites. Potential employers can check through Facebook.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
ISP Policy Position: For A university should monitor university networks and connected computers for improper activities such as copyright infringement.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Security Mindset Lesson Introduction Why is cyber security important?
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
Chapter 17: Foreign Policy and National Defense Section 2.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Computer Security Keeping you and your computer safe in the digital world.
Internet Safety. Online Concerns: Contact Content Conduct.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Social Media Privacy By: Jordan Mallore. What is Social Media?  Electronic communication in which users use online websites to communicate, spread ideas,
Tomorrow’s Battleground Nicholas Jabbour Alice Culbertson.
Cyberwar Becomes a Reality
Responding to a Data Breach 360° of IT Compliance
CSI Survey 2007 Tiffany Gorman
Information Security It Is Your Business
False Reporting on the Internet and the Spread of Rumors: Three Case Studies By Paul Hitlin (2004)
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Article 31: False Reporting on the Internet and the Spread of Rumors Three Case Studies By: Paul Hitlin Presented by: Lynsey Saylor

The internet has been the chosen news medium for people’s opinions about causes of tragic events. Many people find comfort in these explanations. Steven O’Leary claims that, “these rumors fill a need for consumers of news that is very similar to the void that ‘real news’ fills.” These Internet rumors help people to make sense of their world following a tragedy.

The Internet is certainly not responsible for errors in journalism. Instead it allows for anyone to have access to the production and dissemination of news.

4 Reasons for Cyberjournalism Errors 1. The Need for Speed – the deadline is always “now” and many reporters do not check sources as they are competing to get the story published first 2. The Desire to Attract ‘Hits’ – financial incentives and competition to keep consumers interested; competition again for getting a story first 3. Political Gains – certain political groups spread rumors to promote their own cause 4. Attraction to Scandal – consumers can browse sites rapidly and this furthers the need for reporters to lead with scandal to grab attention

Three Case Studies 1. TWA Flight 800; July 17, Three rumors were spread as to the cause. 2. Sidney Blumenthal vs. Matt Drudge and Internet Libel, Allegations of spousal abuse. Rare example of ease of correction. 3. The Suicide of White House Aide Vince Foster; July 20, Suicide was an alleged murder cover up.

Correction Policy  There is no real way to correct false reporting on the Internet because the ease and quickness of the spread of information.  It usually is difficult to trace errors to a particular site or author.  “There is simply too much online content for the government to be able to enforce the same types of journalistic laws that other news mediums must follow, not to mention the potential for excessive government censorship.”

Questions  The Internet can be held accountable for the rumors spread through its use? ANSWER: FALSE  Which of the following is a reason for Cyberjournalism errors? A. Political Gain B. Attraction to Scandal C. The Need for Speed D. All of the above

By: Simson Garfinkel

…Continue Constitution o Protection & Restriction Search and Seizure- 4 th Amendment Witness against self -5 th Amendment o “False Light” and “Sexting” The Computer o Computerize Errors o Driver’s License o Netflix

…Continue 9/11 First National Scare in Computer Age o Switch of Definition of Privacy o Security or Privacy have to choose Facebook o People willing put out personal information o 1 of 5 internet users spend a average of 25 minutes per day on Facebook.

The Concerns o Problems: o Cost o Development o Identifying o Changes: o No more passwords electronic chip license, or government issued card o Privacy Protection Agency

Questions 1. How much time does 1 out of 5 internet users spend per day on Facebook a. 2 hours b. 1 hour c. 30 minutes d. 25 minutes 2. True or False: The Government is thinking about getting rid of passwords, and switching to cards with electronic chips built in.

The Evolution of Cyber Warfare Chris Moore By Greg Bruno

Cyber Ware fare: The New Frontier  Estonia: Believes that Russia staged a denial of service attack due to the movement of a statue in a former Russian state. Russia denies any involvement.  Many believe that China is the most active in these tactics.  United States: Accused China of trying to infiltrate government networks at the Departments of State, Commerce, and Defense.

U.S. Cyber Warfare On the Offensive  The United States is not simply a bystander in this new type of warfare.  Will Arkin, a defense analyst, said “our ability to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.  No one outside of the government really knows what they are truly capable of.

Tactics  Such things as denial of service are most likely unheard of by most people, while such things as spyware and malware are more common.  Denial of service is an approach that harnesses “botnets”—massive networks of interconnected computers—to bombard targeted networks with information requests while masking the location of the primary attacker.

Patching the Holes  Director of National Intelligence Michael McConnell believes that both China and Russia both have the technical capabilities to target and disrupt the United States information.  Significant amounts of money have been put towards enhancing “civilian agency cyber security and strengthening defenses to combat terrorism.” (Roughly $144 million by the Bush administration.)

Measuring the Threat  In 2007 the Department of Homeland Security logged an estimated 37,000 attempted breaches of private and government computer systems, and over 80,000 attacks on Pentagon systems.  One economists estimate that shutting down electric power to a sizable region for more than ten days would stop over 70% of the economic activities in the region.

Questions  Who do many believe to be the most active in these “cyber warfare” tactics?  Answer: China  How much was spent by the Bush administration to better protect the United States against the types of attacks?  Answer: $144 million