Acceptable use policy
Download
1 / 9

cgs3175ch02 - PowerPoint PPT Presentation


  • 221 Views
  • Uploaded on

Acceptable Use Policy The Acceptable Use Policy defines the rules of the machine and internet connection you are on. Specific policies differ by machine owner. Most companies and universities require some form to be signed stating that the machines will be used acceptably.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'cgs3175ch02' - adamdaniel


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Acceptable use policy l.jpg
Acceptable Use Policy

  • The Acceptable Use Policy defines the rules of the machine and internet connection you are on.

  • Specific policies differ by machine owner.

  • Most companies and universities require some form to be signed stating that the machines will be used acceptably.

  • Most service providers require some acknowledgment that you are aware of and will abide by a set of rules.

  • They typically require that you will not run your own business, violate copyrights, perform illegal or harassing activities, or view pornographic material.


Internet privacy l.jpg
Internet Privacy

  • There is no privacy on the Internet – yet.

  • Passwords - The basic defensive measure.

    • Hackers use machines to rapidly try combinations of passwords.

    • Phishing attacks attempt to fool you into giving away your password or other account information.

    • Use more than 6 characters and special characters (!@#$%) to increase combinations possible.

  • Protecting Files

    • Access to files is typically given to user, group, and world. More complex schemes can be incorporated within software.

    • Keep truly sensitive files disconnected from the internet.

  • Firewalls

    • Attempts to control your machines access to the internet

    • Attempts to block unwanted access to your machine


Internet attacks general l.jpg
Internet Attacks, General

  • All software must be executed or run before it can do anything

  • How does the software get on your machine?

    • Through an infected file.

    • By downloading unsafe software deliberately designed to contain the harmful software.

    • Email attachments.

    • HTML links running scripts.

    • Placed there by software.

    • Placed there by hackers.

  • Protection

    • Virus scanning software with constant updates.

    • Firewall to limit access to your machine.

    • Good policies:

      • Don’t automatically open email

      • Don’t use program until scanned

      • Update scanner frequently (to get the latest viruses)


Internet attacks viruses l.jpg
Internet Attacks, Viruses

  • Viruses

    • Act like biological viruses in that they attach themselves to a host program or email.

    • Viruses cannot infect the machine until the host is executed.

    • Viruses propagate by moving the infected file from one machine to another.

    • Can be harmless or very harmful

    • Tend to affect MS products as MS is so popular.


Internet attacks l.jpg
Internet Attacks

  • Trojan Horses

    • Are embedded within useful software.

    • Performs a secondary function while the software is in operation.

  • Worms

    • Standalone software that propagates through the internet

    • Tries to find a host machine on which to run without the owners knowledge.


Internet attacks6 l.jpg
Internet Attacks

  • Email Attacks

    • These viruses, etc, use the email system to propagate.

    • They all need your help – be careful opening attachments.

    • They use your address book to forward themselves to others.

  • Denial of Service Attacks

    • Floods a server with requests using multiple “robots” on multiple machines.

    • Currently popular form of attack

    • Robots can be set up over time and instructed to “attack” at once.

    • Protection is very difficult right now – multiple servers.


Hoaxes and scams l.jpg
Hoaxes and Scams

  • Hoaxes and scams use human gullibility to achieve their aims.

  • Hoaxes

    • Designed to use up internet resources (bandwidth and your time)

    • Hoaxes use humans to propagate.

  • Recognizing them:

    • “Send this to everyone you know!” is a big tip off.

    • Typically has good sounding jargon that is really meaningless.

    • Typically references some authority (often non-existent)

  • What to do?

    • If suspicious, don’t send it out.

    • Check with web sites like http://hoaxbusters.ciac.org


Hoaxes and scams8 l.jpg
Hoaxes and Scams

  • Scams

    • Designed to separate you from your money

    • May try to get information from you (passwords, account numbers).

    • Online auctions – caveat emptor!

  • Recognizing them:

    • Unwanted solicitation

    • Request for instant cash (credit card # or faxing a check)

    • No real way to get in touch with a human (street address, phone)

  • What to do?

    • Be suspicious! Ignore un-asked for solicitations.

    • Check with web sites like http://www.scambusters.com

  • Online Auctions

    • Caveat Emptor: check out the seller’s history.


Internet privacy9 l.jpg
Internet Privacy

  • Identity Theft occurs when somebody uses your personal identification to obtain loans and services (ref http://www.identitytheft.org and www.privacyrights.org)

  • Protection (before)

    • Do not keep personal information on a web-accessible machine

    • Do not transmit personal information unless from an encrypted web site ( https:// )

    • Read through a companies security/privacy policies to be sure.

  • Protection (after)

    • Contact all known sources of credit

    • Obtain a record of your credit status

    • Consider changing SSN and driver license


ad