Bowhuis Group Ppt Draft5
-
Upload
lisamulka -
Category
Technology
-
view
1.032 -
download
2
Transcript of Bowhuis Group Ppt Draft5
![Page 1: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/1.jpg)
![Page 2: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/2.jpg)
Operating System Market Shares
Ryan (2008)
![Page 3: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/3.jpg)
We need to question whether or not Windows is indeed the best, or more importantly, the safest operating system!
Is windows the safest Operating System?
Absolutely Not!Why?
Why?Why?
How?
Let me explain why technology is bad!
![Page 4: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/4.jpg)
Insecure Design
Windows PCs
Viruses
Trojans
Malware
Spyware
Security Weak Points
Open Ports
Firewall
Unrestricted Access
99% of time computer is being run as Admin
(“Microsoft Windows:Insecure by Design,” 2003, p. F07)
![Page 5: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/5.jpg)
Mac and Linux Permissions
99% of the time you can, and SHOULD, use the PC as a
normal user that does NOT have access to change or modify the
system
(“Microsoft Windows:Insecure by Design,” 2003, p. F07)
![Page 6: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/6.jpg)
So why doesn't Windows offer more secure options?
Unrestricted access is simple.Huge market share means no
pressure to change.
![Page 7: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/7.jpg)
A Checklist to Help Secure Your Windows system
Use NTFS on all your partitions
Disable Simple File Sharing
Use passwords on all user accounts (windows lets you create users that don't have passwords!)
Disable the Guest Account
Use a firewall better than Windows version.
Install Anti Virus and Spyware programs
Keep up to date with hotfixes and service packs
Make sure that Remote Desktop is disabled
Disable unnecessary services (such as the “messenger service” we discussed earlier)
Disable default shares
Keep in mind, all these changes still don't guarantee a secure system because most users have unrestricted access!
Windows XP Security Checklist. (2006)
![Page 8: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/8.jpg)
Steps to Secure Mac and Linux
Turn on computerCreate administrator accountCheck firewallCreate restricted user account to use 99% of the timeGet automatic updates when available
![Page 9: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/9.jpg)
Why should you be concerned?
Top viruses and threats to computers.
http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20Nightmares%20Nov%202002.htm
![Page 10: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/10.jpg)
How bad can it really be?Crime:In 1988, one of the first Internet worms was created by a Cornell University student named Robert T. Morris The worm, rightfully called Morris, crippled approximately 6,000 of the 60,000 computers online at that time. That's 10%! It caused between an estimated $10 and $100 million dollars in damage.
Punishment:$10,050 fine3 years probationTeaching gig at MIT!
![Page 11: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/11.jpg)
Crime:The Melissa Virus was named after a Florida lap dancer favored by it's author David L. Smith. The Melissa virus was so severe it forced Alcatel-Lucent, Intel, and even Microsoft to shut down their e-mail systems.
Punishment:$150,000 fine and 40 years in prisonreduced to 20 months and $5000!for working undercover for the FBI to help catch other hackers.
![Page 12: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/12.jpg)
Crime:Code Red and Nimda of 2001 took the world by storm!
Nimda took just 22 minutes to spread worldwide by creating masses of e-mails and sending itself! You could also get this worm simply by visiting an infected website!
Code Red infected Microsoft IIS Web servers and drastically slowed Internet connectivity world wide costing an estimated $2.6 Billion in damage.
Punishment: None! Authors never found.
![Page 13: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/13.jpg)
Crime: Sasser 2004 spread across Windows XP and Win2000 machines forcing Australian trains to halt, and grounding 40 trans-Altantic flights from Delta Air.
Punishment:21-month suspended sentence!The code was written by a German teenager who was tried as a minor!
(Kretkowski,2007)
![Page 14: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/14.jpg)
Threats of the past?
What about now?
What about the future?
What about new operating systems like Vista?
Surely the world must care?
And be doing something about it!
I rarely use the computer
So how much does it really affect me?
![Page 15: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/15.jpg)
Some Recent Headlines!
"UNDERWORLD fraudsters are using random number generators to tap into the bank accounts of Irish customers.”
HACKED OFFSunday Mirror, Aug 3, 2008LISA O'CONNOR
![Page 16: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/16.jpg)
Gary McKinnon, due to be extradited to the US, accused of hacking into the
Pentagon from his home in north London
Hacked offIndependent, The (London), Aug 2, 2008
![Page 17: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/17.jpg)
Key Player In TJX Cards Data Breach Pleads Guilty“23-year-old Damon Toey agreed to testify against his
accomplices in thefts at TJX, BJ Wholesale Club, Sports Authority, OfficeMax, Dave & Buster's, Barnes & Noble and several others which cost credit unions millions of dollars to replace cards and pay for fraud
losses. The card information was sold openly over the Internet and used to manufacture counterfeit cards.”
Credit Union Journal, The, September, 2008
Ed Roberts
![Page 18: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/18.jpg)
“Instances of identity theft continue to affect millions of Americans. In 2007 alone, the crime affected 8.4
million people nationwide”
Resolution Services Combat Workplace Productivity Loss Related to ID Theft Crime
Market Wire, June, 2008
![Page 19: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/19.jpg)
User Error costs Millions and
it's our own fault
![Page 20: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/20.jpg)
As much as 50 percent of the Tyler Medicaid fraud division's files were destroyed in July when a server
being repaired by a state vendor wouldn't restart. In all, 81 criminal cases and eight months of work in the attorney general's 13-person Tyler Medicaid fraud
office were lost.
Medicaid data lost in computer crash, report saysFROM STAFF AND WIRE REPORTS
Friday, October 24, 2008
![Page 21: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/21.jpg)
Palisade Systems Announces Consistent Trend of Data Loss By U.S. Organizations, Projecting
4,200,000 Violations AnnuallyPR Newswire, August 19, 2008
Annual Violation July Projected Type Totals Totals Credit Card Number (PCI violations) 207 2,000 Social Security Number (GLBA violations) 1,214 63,128 Personal Health Information (HIPAA violations) 44,373 2,307,396 Personal Financial Information (GLBA violations 14,528 174,336
![Page 22: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/22.jpg)
Technology is not bad
The users lack of understanding technology is bad!Technology can NOT exist without the user!Until society is ready to take the time to learn and understand the dangers we cannot risk such vast use of technology that we currently utilize!Our finances. Our confidentiality. Even our LIVES are at risk!
![Page 23: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/23.jpg)
More Looming Threats…
Morals and Ethics of
Information Technology
![Page 24: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/24.jpg)
Entry Level Standards for Michigan Teachers
Standard 7:
Demonstrate knowledge of equitable, ethical, legal, social, physical, and
psychological issues concerning use of information technology.
![Page 25: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/25.jpg)
Who Is Responsible?
TEACHERS
STUDENTS
![Page 26: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/26.jpg)
Teacher Roles In Technology
Teachers have the power to do good with technology…BUT they must follow
ETHICAL
MORAL
LEGAL
S T A N D A R D S
![Page 27: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/27.jpg)
Teacher Roles In Technology
Common Reasons for Improper Technology Use
Irresponsibility
Naivety
Unawareness
Lack of Knowledge and Actions
![Page 28: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/28.jpg)
Example One– Irresponsibility
“A Charlotte-Mecklenburg Schools teacher faces firing for posting derogatory comments about students on
Facebook, while four others have been disciplined for posts involving ‘poor judgment and bad taste’”
(Doss Helm, 2008)
![Page 29: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/29.jpg)
Teacher Roles in Technology
Poor Leadership
Disrespectful to Students
Inappropriate Behavior
Poor Role Modeling
Pictured above is the teacher in question
![Page 30: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/30.jpg)
Teacher Roles in Technology
Reader responses to the Charlotte teacher:
“Issues of proper social networking behavior face our schools every day. Students (and teachers) need an effective curriculum that teaches expectations and
protocol.”
“I am completely shocked! I think it's everyone's right to social networking. However, as teachers, we have to
know where and when to draw the line.”
(Doss Helm, 2008)
![Page 31: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/31.jpg)
Example Two—Inappropriate Actions
“If there was any doubt about the power of blogs, consider the case of Michael Gee. A part-time journalism professor at Boston University, Gee
was fired recently after he posted comments in a blog about the looks of a female student in his
course.”
(Roberts, 2005)
![Page 32: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/32.jpg)
Teacher Roles in Technology
Gee was guilty of:
“Violating the trust essential to the student-teacher relationship."
(Roberts, 2005)
![Page 33: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/33.jpg)
Example Three– Naivety & Unawareness
Jeffrey Spanierman, a teacher from Connecticut, created a MySpace page
"to communicate with students about homework, to learn more about the students so he could
relate to them better, and to conduct casual, non-school related discussions”
BUT…
![Page 34: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/34.jpg)
Teacher Roles in Technology
One of his colleagues reported the page which contained nudity, inappropriate comments, and
personal conversations with students
RESULT: TERMINATION
(Neuburger, 2008)
![Page 35: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/35.jpg)
Legal Issues
-- Is the school public or private?
-- Are there state statutes that impose standards on the teacher, or obligations on the school with respect to teacher discipline? -- Did the conduct involve expression that may be protected by the First Amendment?
-- Did the conduct have a connection to the school environment?
(Neuburger, 2008)
![Page 36: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/36.jpg)
Teacher Roles in Technology
Word of Caution
Anything you post on the Web can be potentially viewed
![Page 37: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/37.jpg)
Teacher Roles in Technology
Additional Concerns
1. Lack of clear expectations2. Specific and purposeful guidelines3. Rules and standards
![Page 38: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/38.jpg)
Student Roles in Technology
While Teachers Develop Expectations and Standards…
Students Must Follow Through
![Page 39: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/39.jpg)
Student Roles in Technology
Common Reasons For Improper Technology Use:
Cyber bullying
Inappropriateness
Misuse
![Page 40: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/40.jpg)
Example One– Cyber Bullying
-- Kylie Kenney, an 8th grader from Vermont
-- Harassed with websites created by her classmates
-- Threatened, degraded with homophobic remarks and crude comments
(“Stories of Cyber Bullying,” 2008)
Kylie Kenney speaking out on Cyber Bullying
![Page 41: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/41.jpg)
Example Two– Inappropriateness
--Two Penn State students mocked Virginia Tech's shooting victims on Facebook.
-- Displayed photos of students dressed in costumes with VT t-shirts and fake gunshot wounds
(Zywusko, 2008)
![Page 42: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/42.jpg)
Example Three– Misuse
-- Cut & paste plagiarism
-- In 2001, A University of Virginia physics professor checked student papers for plagiarism using a homemade computer program
-- 158 students were charged!
(“Technology Sniffs Out Student Plagiarism, 2007)
![Page 43: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/43.jpg)
Who Else Has A Role in Technology?
Parents
Schools
Community
![Page 44: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/44.jpg)
Closing Remarks
![Page 45: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/45.jpg)
Closing Remarks
In The Future…
Act with caution
Acknowledge possible threats
Be aware, alert and attentive
Additional Technology Concerns…
Accessibility
Credibility
The Unknown
![Page 46: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/46.jpg)
ReferencesDoss Helms, Ann . "Teachers Disciplined for Facebook Postings." Charlotte Observer 12 Nov. 2008. 20 Nov.
2008 <www.charlotteobserver.com>.
Neuburger, Jeffrey. "Teacher Fired for Inappropriate Behavior on MySpace Page." Media Shift . 28 Nov. 2008 <http://www.pbs.org/mediashift/2008/10/teacher-fired-for-inappropriate-behavior-on-myspace-page289.html>.
Roberts, Paul. "Journalism Teacher Fired For Lewd Blog Comments." E Week . 25 Nov. 2008 <http://www.eweek.com/c/a/Messaging-and-Collaboration/Journalism-Teacher-Fired-for-Lewd-Blog-Comments/>.
"Stories of Cyber Bullying in the News, Schools, Myspace, Facebook." Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment. 30 Nov. 2008 <http://www.cyberbullyalert.com/blog/2008/10/stories-of-cyber-bullying/>.
"Technology Sniffs Out Student Plagiarism, With Unsourced Copying On The Rise, New Software Programs Are Being Used To Combat Cut-And-Paste - CBS News." CBS News - Breaking News Headlines: Business, Entertainment & World News . 30 Nov. 2008 <http://www.cbsnews.com/stories/2007/03/17/tech/main2580771.shtml>.
Zywusko, Ashley. "PSU students mock VT tragedy on Facebook - Midstate Buzz with PennLive.com." Read your favorite Central Pennsylvania blogs - PennLive.com. 30 Nov. 2008 <http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html>.
Images
Students--http://www.ocms.org.uk/images/students-at-computers.jpg
Kylie Kenney--http://www.fightcrime.org/images/home_page/dc081706.gif
Morals and Ethics--http://www.ldesign.com/KGLPhoto/Photos/OnEthics/OnEthics3/Graph.jpg
Technology Saves--http://teaching.mrbelshaw.co.uk/wp-content/uploads/2007/02/cartoon-technology.gif
Virginia Tech--http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html
![Page 47: Bowhuis Group Ppt Draft5](https://reader034.fdocuments.us/reader034/viewer/2022052601/558c7468d8b42aaa468b45b8/html5/thumbnails/47.jpg)
References
Ryan, (2008). Cybernet Retrieved November 29, 2008 from http://cybernetnews.com/2008/01/10/os-browser-market-share-history/
Kretkowski, P. (2007). ITSecurity. Retrieved November 29, 2008 fromhttp://www.itsecurity.com/features/10-worst-virus-attacks-111207/
Windows XP Security Checklist. (2006). Retrieved November 29, 2008 from http://labmice.techtarget.com/articles/winxpsecuritychecklist.htm
Microsoft Windows:Insecure by Design. (2003, August 24). The Washington Post, pp. F07 Retrieved November 29, 2008 from http://soundingcircle.com/newslog2.php/__show_article/_a000195-000451.htm
ImagesMatrix Background - http://www.overclock.net/other-software/114179-finally-matrix-screensaver-rocks.htmlMarket Share -http://cybernetnews.com/2008/01/10/os-browser-market-share-history/Threats -http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20Nightmares%20Nov%202002.htm