Refers to the protection of Data,
Programs, and Information stored on disks, networks, hard drives, etc.
Includes the issues of:
– Privacy
– Ethics
– Loss Prevention
The Snappy Screen Saver
Download and install a screensaver. BUT your computer stops working afterwards.
Surfing the Net
Download “free” software from the Web.
But you are later named in a law suit for distributing student data.
(Viruses, Trojans, Unwanted Access)
Only install necessary and trusted software.
Beware of *free* games, screen savers, and graphics.
Run and UPDATE anti-virus software!!
Keep a hard copy of the copyright release for all “free” products!
Virus Growth
60000
50000
40000
30000
20000
10000
0
1988 1990 1993
1988: Less than 10 known viruses
1990: New virus found every day
1993: 10-30 new viruses per week
2000 and beyond: 45,000 viruses and variants
Source: McAfee
1999
Viruses
Trojan Horses
Worms
Logic Bomb
Trapdoors
Restrict Incoming and Outgoing Information
Provides you with control over your system.
Physical Firewalls v. Software-based Firewalls
Zone Alarm: http://www.zonealarm.com
–
VERY Effective
– Easy to Use
– Blocks Incoming/Outgoing
http://www.svsu.edu/support/?doc_id=2289
Hard Drive Replaced...erased all of your data. No Back-ups are available.
Laptop is stolen.
No Backups are available.
Unprotected confidential information.
(File Management, Lost Information, Lost Equipment)
Try not to advertise secure spots.
Minimize external access:
– Maintain appropriate locks
– Additional security features if necessary
Keep a “safe” climate
– Fix the temp. between 50-80F
Protect cables, wires, etc. from feet!
Lock laptops when not in use.
Use a log in for general Windows use.
Keep drinks and food away from equipment!
MAKE BACK-Ups!!!!!!!
– Store on a separate disk!
– Keep the disk in a separate location!
– Keep a hard copy of critical information.
– Pay attention to where you are saving documents.
– Clearly label disks and files.
– Keep all magnets away from equipment.
(Protecting sensitive information)
Encoding information
– Like a Secret Code Ring
– or like Pig Latin
*Most* common applications offer password protection.
Confidential (not critical)---USE ENCRYPTION!!!!
NEVER send HIGHLY SENSITIVE information through email. (email should *never* be considered secure!)
Without the proper keys...
the message is unreadable.
1.
2.
3.
4.
Do not post or store your password near your computer.
Require passwords to be at least 8 characters long.
Use non-alpha characters and capital letters.
Boiler*makeR Iam@1016 KaTis15 Ge+>Smar+
Do not use easy to guess selections.
password 123456 computer hello love
6.
7.
5.
8.
9.
10.
Use non-personal selections.
Avoid: name, spouse’s name, kids, ss#
Maintain zero tolerance for password sharing.
Warn users not to type their passwords when someone is watching.
Urge users to change passwords. (2-3 weeks!)
Always remember to log out!
Constantly reinforce the importance of password security.
E-mail is similar to a postcard.
E-mail is *not* secure —nor is it private.
Encryption is the only way to help in preventing others from reading your e-mail.
Question Unsolicited Documents.
Use attachments only when necessary.
Question ALL executable programs received via email. These are files that end in .exe
Notify the sender of infected emails!
Pay attention to file extensions...
Resource: http://www.matisse.net/files/formats.html
Extension Type
.html .htm
Webpage
.doc
.gif .jpg
.exe
Word Document
Graphic
Program —self extracting (*caution!)
Finding File
Extensions in
Windows-based machines:
1. Click on START.
2. Select SETTINGS
3. Select CONTROL
PANEL
4. Select FOLDER
OPTIONS
5. Select VIEW
Make sure that this box is *not* checked.
Internet “Junk” Mail
Unsolicited email —usually sent to many people
According to the Gartner Group, a research firm, about 90% of email users receive spam.
Costs Money.
– Recipient of the advertisement pays for the connection time, disk space, bandwidth, etc.
Lost Productivity.
– Time, Time, Time
Clogged Email.
– May be prevent receipt of important messages.
Discourages Internet Use.
– May discourage others from seeing the benefits of the
WWW.
Chain Letters:
– A message that urges readers to pass the letter on in order to receive a reward.
Hoaxes:
– Chain letter that is based upon a fictitious scenario or circumstance.
Urban Legends:
– Email messages providing “safety” messages or warnings.
http://urbanlegends.about.com/
Use a “dummy” account for online promotions, games, etc.
Request that your information be removed from
Internet “white pages”.
Be sure to HIDE your information when joining a listserv or mailing list.
Cut and Paste funny stories, poems, etc. rather than just forwarding them.
– Encourage others to do the same!
http://www.junkbusters.com
Supplement to overall AUPs
Details expectations of the students
Opens dialogue on information security issues
Protects the teacher---responsibility is placed upon the choices made by students
Guide students on the Internet---keep them on track and task orientated.
ALWAYS supervise students using the
WWW!
Remember that a filter cannot be 100% secure
Beware of “FREEBIE” offers!
Never open attachments that you do not expect OR that are from someone you do not know!
Update your anti-virus software frequently!
Yahoo
Lycos
AltaVista
Dogpile (meta search engine)
Kid-Friendly Search Engines
Yahooligans
KidsClick
Ask Jeeves for Kids
Awesome Library
Supersnooper
Searchopolis
Online Methods of Collecting Personal
Information:
Direct Data Collection: online users voluntarily complete surveys or information requests in exchange for a benefit.
Indirect Data Collection: Web site owners obtain information by depositing “cookies” onto your hard drive. These cookies are small files that could include any of the following: name of your ISP, the
“specs” of your machine, passwords, past online purchases, last site visited, areas viewed on current site, etc.
Notice: consumers have the right to be notified that data are being collected, how the data will be used, and to whom it will be disclosed.
Choice: consumers should be able to limit the use of information beyond what is needed to complete the transaction
Access: consumers should have a timely and inexpensive way to view data gathered about them and contest its accuracy
Security: organizations that gather data from consumers must reasonably ensure that the information they keep is secure against loss of unauthorized use
Enforcement: effective enforcement against privacy violators is critical to the protection of personal information
FERPA:
– Family Educational Rights and Privacy
Act (1974) requires that educators demonstrate “due diligence” in protecting student data, information, records, and other sensitive information.
– Teachers can be personally held liable for failing to maintain the integrity of such data.
COPPA:
– Children’s Online Privacy Protection Act (1998) requires that commercial Web sites targeted at children under the age of 13 must follow a detailed series of procedures (including obtaining parental permission and review) prior to gathering data.
– In a school setting, teacher may grant such permission for educational purposes.
Practical Privacy Techniques for
Teachers:
3.
4.
1.
2.
5.
1.
Practice Proper Information
Security Techniques
E-Mail Awareness
Download Precautions
Close the Cookie Jar
Read Privacy Statements
Set up a Second Online Account
As technology is introduced into schools, it is critical to combine the technical skills with the soft (ethical) skills surrounding the media.
Attention needs to given to both teachers and students upon this topic.
Teachers must practice privacy techniques daily---to protect the information and serve as a positive role model.