Lecture # 34 Privacy and Security. Passwords Spam Scams Viruses and Worms (Malware) Intellectual Property and Copyright Cookies Encryption Back-Ups.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Quiz Review.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Cyber Crimes.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Types of Electronic Infection
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Internet Safety LPM
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Managing Money Workshop The National Autistic Society AGM
Computer Security Keeping you and your computer safe in the digital world.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Learn how to protect yourself against common attacks
Protect Your Computer Against Harmful Attacks!
Cyberspace Risks and Defenses
Computer Security.
Presentation transcript:

Lecture # 34 Privacy and Security

Passwords Spam Scams Viruses and Worms (Malware) Intellectual Property and Copyright Cookies Encryption Back-Ups

Passwords Password Break-ins: Try all possible strings in lexicographic order (but software usually limits the # of times) Passwords are scrambled/encrypted, so if you forget, you have to reset Use a phrase vs. word Make it personal and use characters $, # … Change and recycle passwords for security

Spam Unsolicited (but check, maybe you did solicit it) Spam Filters: - Don’t “understand” messages - Trainable: Mark undesirable as Spam/Junk. - Use heuristics based on message characteristics “Bag of Words” techniques (like image search) - Compute Spam “Score”: If greater than some thresh- hold, quarantine the message

Scams Scam Spam: Attempts to Defraud - Identity Theft - Access your accounts (bank, computer) - The “Nigerian Widow” – play on sympathy “Need your money to secure a ‘deal.’” Phishing: Attempts to capture personal info, looks authentic - SSN, Bank account #, password, etc. “In order to continue service we need …”

Scam Spam Example Phishing and Spoofing use bogus links, log-ins Reputable companies never ask for sensitive info by Don’t click on links if you suspect phishi ng

Viruses and Worms (Malware) Virus: A program, V, that “infects” another program, P, by imbedding a copy of itself in P. Running infected P allows V to make copies of itself and infect (and possibly damage) other programs as well Example: A Trojan virus may hide itself in other programs, recording keystrokes, passwords, etc. Worm: A program that makes copies of itself, “tunneling” across the network

Viruses and Worms (Malware) Do not click on attachment or links without verifying it is from a trusted source. Even then be cautious: Friends may unwittingly pass along Malware Be especially cautious of.exe files. Is there a reason why someone is ing you an.exe file? Malware can then send and attachments to those in your address book “Bots” = Malware programs that pretend to be humans visit Facebook, etc., post notes, URLs to update soft- ware that is actually Malware Install and use up-to-date anti-virus software (Some Malware says “You have a virus, click here, and download this anti-virus software and then … Shazam!)

Intellectual Property and Copyright Intellectual Property: Any human creation (photos, music, books, artwork, computer programs, etc.) You automatically own the copyright of what you create in the U.S. and most other nations. That copy-”right” includes: - making a copy of the work - using it as a spring-board for other work - publishing or distributing it, physically or electronically - performing or displaying the work If you don’t own the copyright you are free to: - view, read or listen to it (if its in the public domain) - use for educational purposes: limited quoting, review - access it for “Fair Use” (What use? How used? How much will be used? Market effect?) – Consult an expert.

Privacy and Property Do you own the work, information, images, music, phone number lists, etc? If you are in business, do you have the right to use customer information (names, addresses, phone numbers, personal info, etc) for anything beyond the transaction? (i.e. Re-using, remarketing, a customer’s personal info. usually requires the customer’s approval.) U.S. and Europe have laws to protect privacy. China does not. You are responsible for maintaining and securing the privacy of information for which you are responsible. The government has no obligation to do this for you.

Cookies Cookie: A record with multiple fields, stored on the client’s computer, that uniquely identifies a client’s session on a website. The server can ask to see your Cookie when you go to that website. This can tell them you are the same user from page to page as you browse the web. You can - turn off cookies altogether - require the server to ask each time it wants to see your cookie - accept all cookies

Encryption Encryption: encodes data so that it is not readable or recognizable without a “key” Used to safely pass sensitive information over the internet and/or through Use Encryption algorithms and keys that are hard to break Decryption: Reverses the Encryption

Encryption Example Pass the secret message/info “Hi” using an XOR “key” In ASCII “Hi” = = Encryption Key: Encrypted Message: XOR: % s

Encryption The “key” is to have the Encryption key held privately on each computer – never passed over the internet – or if it is, encoded in some way To break the code, you must have the key The stronger the key, the better the Encryption Many possibilities/algorithms for encrypting (not just XOR) Public key rely on large prime numbers

Back-Ups Lots of redundancy (multiple copies) is a big key Do automatically – daily, to keep changes – or whatever the cycle is that defines what you cannot afford to lose Can set up a script or batch file to do this automatically Date Back-ups. Restore most recent one first. Keep in separate locations (fire, floods, etc.) (Give copies of precious information – photos, journals, etc. to other family members)