Download presentation
Presentation is loading. Please wait.
Published byWilla Andrews Modified over 9 years ago
1
US Copyright Law & Protecting Your Privacy On-Line Marty Manjak Information Security Officer
2
US Copyright Law Signed by Pres. Washington in 1790 Protects authors of “maps, charts, and books” Author possesses sole authority to print, publish, and sell Violators fined $.50 for each unauthorized copy
3
Intellectual Property Roberto (Law) has an idea Roberto commits his idea to “tangible form” (paper, electronic) Roberto’s idea is now copyrighted No one else may copy, distribute, or sell his idea without his permission
4
Intellectual Property (IP) Copyright protects IP Examples: choreography, sculpture, films, books, screenplays, essays, scripts, diagrams, paintings, drawings, research, designs, maps, architectural drawings, songs, poems, non-fiction….. All are protected against theft…in any format
5
Digital Millennium Copyrigh Act-1998 DMCA: written to protect IP from digital copying and distribution. If university receives a DMCA complaint: They must remove the copyrighted material from their network Or, be liable for financial penalties
6
File Sharing and Peer-to-Peer File sharing software (Limeware and BitTorrent) can violate copyright law Sharing protected works without permission Worse-They can cost you thousands of dollars! Up to $250,000 per item! Recent awards: $54,000-$67,5000
7
Be Careful with file sharing! Don’t embarrass your host school Don’t embarrass yourself Don’t become liable for financial penalties
8
The Copyright Test If you don’t have permission, you can’t share it
9
On-line Protection Cyber crime is big business You will be a target You need to be pro-active in protecting your privacy and your computer
10
The Torpig Botnet Researchers at UC Santa Barbara gained control of botnet for 10 days 180,000 machines were infected 70Gbs (7 x 10 10) of personal data collected 8,310 account passwords 410 financial institutions 1,660 credit card numbers
11
Scareware Fake antivirus products earn promoters $100 million (for starters) http://www.interpol.int/public/Data/Wante d/Notices/Data/2009/45/2009_13445.asp http://www.interpol.int/public/Data/Wante d/Notices/Data/2009/45/2009_13445.asp http://www.thenewnewinternet.com/2010/ 05/28/swede-u-s-citizen-accused-of- running-scareware-scam/ http://www.thenewnewinternet.com/2010/ 05/28/swede-u-s-citizen-accused-of- running-scareware-scam
12
How were machines infected? Drive-by downloads from legitimate web sites. Good web sites have been compromised and seeded with malicious code that attacks your computer Malware will attack your browser and other software (Adobe products [Flash, Reader], iTunes, Quicktime, Java)
13
Protection #1 Don’t use the web with administrator privileges Use less privileged “User” accounts This is standard with Vista and Windows 7 machines
14
Protection #2 Keep EVERYTHING patched secunia.com/vulnerability_scanning/online/ Secunia will check for missing patches and vulnerable software Install the Personal version: http://secunia.com/vulnerability_scanning/ personal/
15
Protection #3 Use anti-malware products Anti-virus Anti-spyware Spyware Blaster Spybot Search and Destroy Windows Defender Keep them up-to-date!
16
Protection #4 Use long passphrases (> 14 characters), even on Facebook! J’aimedespommesfr!t3S = 86 21 Use different passphrases for different services Use KeePass2 to remember your passphrases http://keepass.info/download.html
17
Protection #2 Keep EVERYTHING patched secunia.com/vulnerability_scanning/online/ Secunia will check for missing patches and vulnerable software Install the Personal version: http://secunia.com/vulnerability_scanning/ personal/
18
Protection #5 Use a firewall Most operating systems (Windows, Mac OS X) come with built in firewalls Don’t turn them off!
19
Protection #6 Beware of social engineering Most malware is installed by the victim Fake video codecs Poison links in email messages Phishing: “Send us your password now!” Fraudulent messages from “friends” Fake anti-virus warnings Criminals will pose as friends, victims, and authorities
20
Protection: Bonus Points Use the Firefox browser with No Script Forces you to decide what content you will allow Will break a lot of web pages But will also stop 99% of web attacks https://addons.mozilla.org/en- US/firefox/addon/722/
21
More Firefox Bonus Points Browser Plug-in: AdBlock Plus https://addons.mozilla.org/en- US/firefox/addon/1865/ https://addons.mozilla.org/en- US/firefox/addon/1865/ Browser Plug-in: Better Privacy Deletes persistent cookies https://addons.mozilla.org/en- US/firefox/addon/6623/
22
Review 1. Don’t run as admin 2. Keep EVERYTHING patched 3. Use Anti-virus software 4. Different site; Different passphrase 5. Firewalls: don’t disable 6. Be wary of social engineering
23
Thank you! And good luck!!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.