SecurityPrivacy

advertisement

Security and Privacy

What is Information

Security?

 Refers to the protection of Data,

Programs, and Information stored on disks, networks, hard drives, etc.

 Includes the issues of:

– Privacy

– Ethics

– Loss Prevention

The Snappy Screen Saver

Download and install a screensaver. BUT your computer stops working afterwards.

Surfing the Net

Download “free” software from the Web.

But you are later named in a law suit for distributing student data.

Software Security :

(Viruses, Trojans, Unwanted Access)

 Only install necessary and trusted software.

 Beware of *free* games, screen savers, and graphics.

 Run and UPDATE anti-virus software!!

 Keep a hard copy of the copyright release for all “free” products!

Virus Growth

60000

50000

40000

30000

20000

10000

0

1988 1990 1993

 1988: Less than 10 known viruses

1990: New virus found every day

1993: 10-30 new viruses per week

 2000 and beyond: 45,000 viruses and variants

Source: McAfee

1999

Viruses, Malicious Code,

& Other Nasty Stuff

Examples of

Nasty Stuff:

 Viruses

 Trojan Horses

 Worms

 Logic Bomb

 Trapdoors

Firewalls:

Restrict Incoming and Outgoing Information

Provides you with control over your system.

Physical Firewalls v. Software-based Firewalls

Zone Alarm: http://www.zonealarm.com

VERY Effective

– Easy to Use

– Blocks Incoming/Outgoing

 http://www.svsu.edu/support/?doc_id=2289

Problem of No Backups

Hard Drive Replaced...erased all of your data. No Back-ups are available.

Stolen Laptop

Laptop is stolen.

No Backups are available.

Unprotected confidential information.

Physical Security Practices

(File Management, Lost Information, Lost Equipment)

 Try not to advertise secure spots.

 Minimize external access:

– Maintain appropriate locks

– Additional security features if necessary

Keep a “safe” climate

– Fix the temp. between 50-80F

Physical cont’d…

 Protect cables, wires, etc. from feet!

 Lock laptops when not in use.

 Use a log in for general Windows use.

 Keep drinks and food away from equipment!

Physical Security cont’d….

 MAKE BACK-Ups!!!!!!!

– Store on a separate disk!

– Keep the disk in a separate location!

– Keep a hard copy of critical information.

– Pay attention to where you are saving documents.

– Clearly label disks and files.

– Keep all magnets away from equipment.

Encryption

(Protecting sensitive information)

 Encoding information

– Like a Secret Code Ring

– or like Pig Latin

 *Most* common applications offer password protection.

 Confidential (not critical)---USE ENCRYPTION!!!!

 NEVER send HIGHLY SENSITIVE information through email. (email should *never* be considered secure!)

Without the proper keys...

the message is unreadable.

Password Protection

1.

2.

3.

4.

Do not post or store your password near your computer.

Require passwords to be at least 8 characters long.

Use non-alpha characters and capital letters.

Boiler*makeR Iam@1016 KaTis15 Ge+>Smar+

Do not use easy to guess selections.

password 123456 computer hello love

Passwords Continued…

6.

7.

5.

8.

9.

10.

Use non-personal selections.

Avoid: name, spouse’s name, kids, ss#

Maintain zero tolerance for password sharing.

Warn users not to type their passwords when someone is watching.

Urge users to change passwords. (2-3 weeks!)

Always remember to log out!

Constantly reinforce the importance of password security.

E-mail Basics

 E-mail is similar to a postcard.

 E-mail is *not* secure —nor is it private.

 Encryption is the only way to help in preventing others from reading your e-mail.

Email Security

Fundamentals

 Question Unsolicited Documents.

 Use attachments only when necessary.

 Question ALL executable programs received via email. These are files that end in .exe

 Notify the sender of infected emails!

 Pay attention to file extensions...

Common File

Extensions

Resource: http://www.matisse.net/files/formats.html

Extension Type

.html .htm

Webpage

.doc

.gif .jpg

.exe

Word Document

Graphic

Program —self extracting (*caution!)

Finding File

Extensions in

Windows-based machines:

1. Click on START.

2. Select SETTINGS

3. Select CONTROL

PANEL

4. Select FOLDER

OPTIONS

5. Select VIEW

Make sure that this box is *not* checked.

SPAM

Internet “Junk” Mail

 Unsolicited email —usually sent to many people

 According to the Gartner Group, a research firm, about 90% of email users receive spam.

Why Should I be

Concerned about Spam?

 Costs Money.

– Recipient of the advertisement pays for the connection time, disk space, bandwidth, etc.

 Lost Productivity.

– Time, Time, Time

 Clogged Email.

– May be prevent receipt of important messages.

 Discourages Internet Use.

– May discourage others from seeing the benefits of the

WWW.

Types of Spam

 Chain Letters:

– A message that urges readers to pass the letter on in order to receive a reward.

 Hoaxes:

– Chain letter that is based upon a fictitious scenario or circumstance.

 Urban Legends:

– Email messages providing “safety” messages or warnings.

 http://urbanlegends.about.com/

Ways to Reduce Your

Daily Intake of Spam

Use a “dummy” account for online promotions, games, etc.

 Request that your information be removed from

Internet “white pages”.

 Be sure to HIDE your information when joining a listserv or mailing list.

 Cut and Paste funny stories, poems, etc. rather than just forwarding them.

– Encourage others to do the same!

Resource to find out more about Spam and about Cookies:

 http://www.junkbusters.com

Acceptable Use

Policies

Develop Classroom

Technology Guidelines

 Supplement to overall AUPs

 Details expectations of the students

 Opens dialogue on information security issues

 Protects the teacher---responsibility is placed upon the choices made by students

Reducing “RISK” of Internet Use

 Guide students on the Internet---keep them on track and task orientated.

 ALWAYS supervise students using the

WWW!

Remember that a filter cannot be 100% secure

Beware of “FREEBIE” offers!

 Never open attachments that you do not expect OR that are from someone you do not know!

 Update your anti-virus software frequently!

Recommended Search Engines--for teachers or secondary students

 Google

 Yahoo

 Lycos

 AltaVista

 Dogpile (meta search engine)

Kid-Friendly Search Engines

 Yahooligans

 KidsClick

 Ask Jeeves for Kids

 Awesome Library

 Supersnooper

 Searchopolis

Online Methods of Collecting Personal

Information:

 Direct Data Collection: online users voluntarily complete surveys or information requests in exchange for a benefit.

 Indirect Data Collection: Web site owners obtain information by depositing “cookies” onto your hard drive. These cookies are small files that could include any of the following: name of your ISP, the

“specs” of your machine, passwords, past online purchases, last site visited, areas viewed on current site, etc.

Online Privacy Rights:

Notice: consumers have the right to be notified that data are being collected, how the data will be used, and to whom it will be disclosed.

Choice: consumers should be able to limit the use of information beyond what is needed to complete the transaction

Access: consumers should have a timely and inexpensive way to view data gathered about them and contest its accuracy

Security: organizations that gather data from consumers must reasonably ensure that the information they keep is secure against loss of unauthorized use

Enforcement: effective enforcement against privacy violators is critical to the protection of personal information

Privacy Legislation for

Educators

 FERPA:

– Family Educational Rights and Privacy

Act (1974) requires that educators demonstrate “due diligence” in protecting student data, information, records, and other sensitive information.

– Teachers can be personally held liable for failing to maintain the integrity of such data.

Legislation continued...

 COPPA:

– Children’s Online Privacy Protection Act (1998) requires that commercial Web sites targeted at children under the age of 13 must follow a detailed series of procedures (including obtaining parental permission and review) prior to gathering data.

– In a school setting, teacher may grant such permission for educational purposes.

Practical Privacy Techniques for

Teachers:

3.

4.

1.

2.

5.

1.

Practice Proper Information

Security Techniques

E-Mail Awareness

Download Precautions

Close the Cookie Jar

Read Privacy Statements

Set up a Second Online Account

Privacy Conclusion:

 As technology is introduced into schools, it is critical to combine the technical skills with the soft (ethical) skills surrounding the media.

 Attention needs to given to both teachers and students upon this topic.

 Teachers must practice privacy techniques daily---to protect the information and serve as a positive role model.

Download