LEGAL AND ETHICAL USE AND PRACTICE Board Report on Technology Threats.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Riverside Community School District
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Information Security Information Technology and Computing Services Information Technology and Computing Services
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Telecommunications Communication over a long distance; Distant communication.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Digital Citizenship Project Amanda Friscia University of West Alabama ED 505--Fall 2011 Online.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
DIGITAL CITIZENSHIP PROJECT Susan Abernathy. THINGS TO REMEMBER DURING THE UPCOMING YEAR!
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
Student Technology Code of Ethics
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
We are here to help you… Fight something like this Brownies !
NETIQUET TE COURTESY IN COMMUNICATIONS. Netiquette Is a set of rules for behaving properly online.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Computer security By Isabelle Cooper.
Data Security.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
HalFILE 2.1 Network Protection & Disaster Recovery.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Digital Citizen Project By: Frances Murphey Technology and Education.
Randall E. Jackson ED 505 Dr. Ray  Netiquette is essentially manners for the internet. It is rules for how you should behave online.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Any criminal action perpetrated primarily through the use of a computer.
Computer Security Sample security policy Dr Alexei Vernitski.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SECURE DATA TRANSFER Melvin Freeman The Next Step Public Charter School.
Using your manners when you’re on-line. Sometimes the online world can feel "pretend" because you cannot see the person with whom you are communicating.
Chapter 40 Internet Security.
Securing Information Systems
What is Netiquette? Internet etiquette and mailing lists
Chapter 5 Electronic Commerce | Security Threats - Solution
Chapter 5 Electronic Commerce | Security Threats - Solution
The Internet of Unsecure Things
Unit 4 IT Security Kerris Davies.
Presentation transcript:

LEGAL AND ETHICAL USE AND PRACTICE Board Report on Technology Threats

Three Potential Threats  Penetration of systems at all levels or points-of- entry  Damage or Tampering through code manipulations  Disaster Recovery Plans

Penetration of Systems  Firewall penetration, Computer terminals, Server access, Kiosk  Hackers  Negligent users

Damage or Tampering  Spam  Viruses  Worms

Disaster Recovery Plans  Fire  Flood,  Terrorist,  Acts of god

Type of Systems Threatened  Student Information Systems  VirtualUnited the Course Management System (CMS)  Outlook Web Access - Student System

Student Information Systems  Protection Solutions, Practice and Procedure Recommendations  Window Servers: Lock Servers Secure with Socket Layer (SSL) Software  Computer Access Personal access Password protection Frequently change passwords

Student Information Systems cont.  Kiosk  Lock Cabinets  Secure all Ports- CD-ROM drives, Serial ports, Parallel Ports, USB Ports, FireWire Ports, Ethernet ports

Course Management Systems  Protection Solutions, Practice and Procedure Recommendations  Database moved from root directory  Passwords changed  Computers Locked  Offices Locked

Outlook Web Access  Protection Solutions, Practice and Procedure Recommendations  Multiple spam filters  Separate Wi-Fi Internet  Firewalls  Frequent scanning of system  LDAP system  Back-up storage  Locking servers

Etiquette  Etiquette  You may want to SHOUT only a single word or two to emphasize a point.  Don't send private messages through .  Use an appropriate subject line; this will help the recipient locate you message  Pay attention to grammar and spelling.  Sign all of your s with your name.  Don't forward s without permission. Assume all material is copyright.

Etiquette  Discussion Board Etiquette  Be sensitive to others. Treat other people with respect and courtesy, especially in reference to social, cultural, and ethnic differences.  Don't use sarcasm. It often falls flat and doesn't come across as you intended.  Be careful with humor. The reader doesn't have the benefit of your facial expression, body language, or tone of voice. You can use emoticons or " body language" such as ;) for a wink or :( for a frown.  Cooperate and share. Consider yourself a quest on the system just as if you were in someone's home. Be willing to share information with others on the Internet. In exchange for help and information you receive, be willing to answer questions and to share your resources.  Carefully consider copyright. Just because something can be copied electronically doesn't mean it should be distributed without permission. Unless stated otherwise, all material on the Internet is copyrighted.  Be alert for obscenity.  (Smaldino, 2008, pg. 198)