File - Shelby Foster

advertisement
Shelby Foster
 Cyber Stalking- Use of internet or electronic devices to
harass an individual or organization
“Cyber stalking usually involves a course of
conduct, more than one instance, that would cause a
reasonable person fear," - Michael Kaiser, the Executive
Director of the National Cyber Security Alliance.
 Cyberbullying- extension of bullying through
electronic devices
-releasing photos without consent, posing threats,
false accusations, harassment, peer pressure, bribery
Threats of death or bodily harm to a person or
member of his family-threats to commit serious bodily
harm to persons on school property
A) Any person who knowingly communicates
including electronically transmitted communication, a
threat to kill or do bodily injury to a person, is guilty of
class 6 felony
-Identity theft includes stealing of
Name
Money
Credit
Social Security
 What’s needed to steal Social SecurityAddress, phone number, birthday, full name, then
hackers begin guessing your social until they get it right
 Only a couple hundred numbers…
 Accessed by anybody
 Don’t do anything on a computer involving sensitive
information
 Not logging out, and only exiting the browser= Not
good
-people can browse your history and login to the site you
never logged out on.
 Be careful what information you share online
 Consider using a nickname
 Maintain a current knowledge of current privacy
settings for everything
Ex:
Facebook, twitter, Instagram, Myspace…
 Do an Internet search regularly
 Don’t be gullible
 Don’t respond to messages in anger
 Ignore and Save
 Don’t care
 Don’t use the Internet at all
 Phishing Websites
- Social Security
-Credit card #
-Bank account #
-Drivers License #
-Home address and phone #
 Use anti-virus software
 Use unique passwords
 Definition- is the requirement to maintain the survival
of the state through the use of economic power,
diplomacy, power projection and political power.
How they maintain security:
Phones
Emails
Social Media
Text Messages
 Fourth Amendment’s provisions against warrantless
searches.
 First Amendment – “right of association”
- People might not want to be in the association, if they
know they’re being watched, creating an intimidation
factor
 Can hand over information
 Monitors internationally and Domestically
 Busch warranted warrantless surveillance in 2005
 NSA won’t say whether it spies on Congress.
 New documents reveal massive scope of NSA spying in
60 countries, targeting regulators, aid organizations
and many others with no connection to terrorist or
illegal activities.
 NSA can access private data on iPhones, BlackBerry
and Android devices.
http://www.youtube.com/watch?v=Q_qdnyEqCPk
Download