Security Colin Armstrong School of Information Systems Curtin University

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Are you being a safe and successful digital citizen? E-safety
Digital Footprint Objective: Students will gain awareness of what it means to have a digital footprint.
Neighborhood Watch John E. Williams, CPS Certified Crime Prevention Specialist Beavercreek Police Department.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Cyber Bullying Grade 3.
The key aim for the week is: To ensure children are able to recognise and challenge bullying behaviour wherever it happens - whether face to face or in.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Security Controls – What Works
Identity Federation: Some Challenges and Thoughts OGF 19 Jan 30, 2007 Von Welch
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Do you know how to keep yourself safe?
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Information Security Information Technology and Computing Services Information Technology and Computing Services
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
City Hall of Iasi Ethics in e-guidance, privacy and security devices Date: Author: Cristina Nucuta.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
By Joe and Josh.. Would you leave your front door open? Letting strangers see every thing about you by giving away your details online is probably the.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Cryptography, Authentication and Digital Signatures
Digital Citizenship 6th-8th Unit 1 Lesson 1 Digital Life 101
Security Training USAID Information Security.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Trends and Issues Basic Computer Concepts Education  Children are outpacing adults on the technology track. Education plays a major role in guiding.
LESSON 2: Internet, Computer Ethics and Security
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
DIGITAL LIFE 101.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Chapter 10 Basic Skills Count Chapter 10 Basic Skills Count Lesson 10.2 Applying Other Skills Lesson 10.2 Applying Other Skills.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Chap1: Is there a Security Problem in Computing?.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Ingredients of Security
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 9 Networking & Distributed Security (Part C)
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Netiquette and Online Safety By: H F. Netiquette Netiquette is the do’s and don’ts of the internet. Basically netiquette is the rules of online communication.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
Network Security Overview
 Being free from public attention that means not being watched or disturbed by other people.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
8 – Protecting Data and Security
Introduction to Privacy
Everything You Wanted to Know About Encryption in Just 10 Minutes
Security of Data  
Digital leaders Multimedia presentation
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Security Colin Armstrong School of Information Systems Curtin University

Physical & Logical Security Privacy……… Secrecy………….. & Netiquette………….

Basic Security What do YOU think of when someone talks about SECURITY National Security Protecting Valuable Assets Muscle Bound, Gun Toting Guards with Big Angry Dogs Computer Sec – Information Sec – Internet / Network Sec Your Address and Your Front Door Key

Is Security Important We would probably all agree that security is important, BUT Who To ? ? ? ? ? ? ? ? Most people tend to think that it is ”Not Their Job” Maybe 5% will pursue Security as a Career But…….. Every single person here is continually effected by security.

Aims of Security Confidentiality Access only by authorised personnel by authorised methods Availability Data and systems are up and running when needed Integrity Modification only by authorised personnel by authorised methods Authenticity Ensuring authorised users, devices and transmissions Non-repudiation Denial of action is not possible

Privacy Privacy……… What are YOUR rights to privacy – Sweden, USA, Aust, etc. What do you want to know about other people. Should you know where criminals now reside peadophiles EchelonEchelon is listening to everything & recording it for 90 days

Surveillance for Fun Surveillance is the new entertainment at the Remote Lounge in New York city, where revellers spy on each other with joystick- controlled cameras. When patrons think about being watched by others, says so- owner Kevin Centanni, “they’re taken aback by the lack of privacy.” But when they themselves watch other patrons, “they feel empowered.” Shenk, D. (2003). "Watching You. The World of High-tech Surveillance." National Geographic 204. No 5(November 2003): pp Privacy

On a Scale of 1 – 5 with 1 being low and 5 being high Rate the level of security you would place on Diplomatic Despatch………….. Private Letter………….. Post Card………….. ………….. Phone Text Message………….. Privacy

How do you propose we achieve those levels of security Diplomatic Despatch………….. Private Letter………….. Post Card………….. ………….. Phone Text Message………….. Privacy

Secrecy Secrecy, why If you know a secret exists, how safe is it. The trick is not to let anyone know that the secret exists Classification systems attempt to address these issues.

What classification was placed on this information Secrecy

What value Winning 6 numbers in Lotto What role is played by our News Services, Paper, TV, etc Secrecy

Netiquette Netiquette…………. Good Manners on the Internet Culture of the community, Physical vs Logical Sweden / Iraq & Ethics.

Netiquette - Ethics

Netiquette Is Netiquette a Security matter…………. By keeping a low profile, one is noticed less and therefore not under as much scrutiny as others Yes, even Netiquette can be a Security matter.

Basic Tenents The basic tenents of all SECURITYare: Detect Delay Deter Respond If you remember nothing else, remember this….

Security Todays address briefly discussed ; Privacy Secrecy & Netiquette

Security Security as a subject of research, teaching, and work is extraordinarily diverse. Policy - Biometrics - Encryption & Communications Crime, Law, Ethics, and Hacking - Internet - Physical Information - Personnel - Intelligence - Executive Security Incident Response - Disaster Recovery Planning Information Warfare - Forensics It is an exciting field of endeavour

Public Toilet Security A physical security practitioner must address many needs… Even, Public Toilet Security This is no Joke, Think about it. If we can apply Security here we can apply security anywhere By thinking of Security in the Physical World we can adapt and convert Security to the Logical World.

Comments – Questions ? Colin Armstrong School of Information Systems Curtin University