1 / 22

Security & Reputation

& Reputation. building or destroying?. Security & Reputation. protection or restriction?. h elen goss www .wayoutmedia.com 2012. 3pm Overview of Security on the Internet Your personal safety Safer access to social networking sites Practical Facebook session 4 .30pm BREAK

hanzila
Download Presentation

Security & Reputation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. & Reputation building or destroying? Security & Reputation protection or restriction? helengosswww.wayoutmedia.com2012

  2. 3pm Overview ofSecurity on the Internet Your personal safety Safer access to social networking sites Practical Facebook session 4.30pm BREAK 5pm Exercise in reputation building andshaping 6pm Finish

  3. Security • THE BIGGER PICTURE (macro) • The Universal Declaration of Human Rights, Article 19 • The right to freedom of speech; • “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media and regardless of frontiers.” 10th December 1948

  4. Security • THE BIGGER PICTURE (macro) • Who is in control? Parents, Schools, Universities, Employers, Commerical Companies, Internet Cafes, ISP’s and Governments at different levels • Why do they control? • Child Protection: Protecting children from material perceived as inappropriate, or limiting their contact with people who may harm them • Spam: Reducing the barrage of unwanted commercial offers by e-mail or on the Web • Data Allowance: Controlling the size of the flow of data any one user is able to access at one time • Protecting intellectual property: Preventing employees from sharing information that is viewed as the property of their employer • Protecting resources: Stopping people from using their work time or an employer's technical resources for personal activities. • Restricting access: Control access to materials or online activities that are banned or regulated in a specific jurisdiction (for example a country or an organization like a school) such as explicit sexual or violent materials, drugs or alcohol, gambling and prostitution. Stopping access to religious, political or other groups or ideas that are deemed to be dangerous, using the excuses that ‘they’ are preserving cultural norms and religious values or protecting national security.

  5. Security • THE BIGGER PICTURE (macro) • When is it censorship? • Some people control their own experience of the Internet • Others restrict how people use the Internet and what they can and cannot access • Who is blocking or Filtering in the extreme? • National Governments restrict entire populations access to the Internet or whole categories of information or to share information freely • See the OpenNet Initiative http://opennet.net • “Internet censorship and surveillance are growing global phenomena. ONI’s mission is to identify and document Internet filtering and surveillance, and to promote and inform wider public dialogues about such practices. “ Who has the ability? Whoever has control of specific parts of the technical infrastructure Many parts of the international infrastructure that supports the Internet areunder control of gov or gov controlled agencies Some countries openly admit and publish about it

  6. image: chopshopnat.blogspot.com

  7. image: freehacktools.com

  8. Security • THE BIGGER PICTURE (macro) Who is fighting for the rights to freedom of speech on the Internet?

  9. I invented the Web just because I needed it, really, because it was so frustrating that it didn't exist. . . . The concept of the Web is of universal readership. . . ” “ The dream behind the Web is of a common information space in which we communicate by sharing information. Tim Berners-Lee ” image: http://xlterrestrials.org/plog/?p=8611

  10. Tim Berners-Lee “ I’m trying to make the world a more open place ” Mark Zuckerberg image: http://xlterrestrials.org/plog/?p=8611

  11. From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.

  12. We [Anonymous] just happen to be a group of people on the internet who need . . . just kind of an outlet to do as we wish, that we wouldn't be able to do in regular society . . . That's more or less the point of it. Do as you wish . . . ” Trent Peacock: The face of Anonymous

  13. Security • THE BIGGER PICTURE (macro) • Bypassing filtering • Ways of bypassing filters are called ‘circumvention methods/tools’ • They all work in practically the same way, they instruct your web browser to take a detour through an intermediary computer called a ‘proxy’ that is; • Located somewhere that is not subject to Internet Censorship • Has not been blocked from your location • Knows how to fetch and return content for users like you

  14. Security • THE BIGGER PICTURE (macro) What are the risks of circumvention tools? • It is up to you to decide whether there are significant risks involved in accessing the information you want. This may not be because there is a law against it, there may not, but other risks may be of consequence eg harassment, losing your job or worse. • Can you be traced/found out using a proxy server (circumvention tool)? • If your server is detecting suspicious activity you could be reported.

  15. How do I do learn more? • More information on the floss manuals site ‘Bypassing internet censorship’; • It describes how the Internet works • Various forms of online censorship • It elaborates on a number of tools and techniques that might help you circumvent these barriers to free expression • The issue of digital privacy and security is considered throughout which begins by covering the basics, adds a few advanced topics before ending with some masterclasses image: 404systemerror.com

  16. Your Personal Control • THE SMALLER PICTURE (micro) Safer Social Networking Facebookmasterclass Overview of Google+ Looking after your reputation and building a presence on the Internet

  17. Safer access to social networking sites • Edit your default privacy settings in the social networking platform • Know precisely what information you are sharing with whom • Make sure that you understand the default geolocation settings, and edit them if needed • Only accept into your network people who you really know and trust • Only accept into your network people who will be savvy enough to also protect the private information that you share with them, or train them to do so • Be aware that even the most savvy people in your network might give up information if they are threatened by your adversary, so consider limiting who has access to which information • Be aware that accessing your social networking platform via a circumvention tool will not automatically protect you from most of the threats to your privacy. • Also accessing through smart phones discloses the locations of the user of a social networking platform at any given moment

  18. Facebook privacy masterclass

  19. Exercise in reputation building and shaping

  20. Questions and Answers

  21. Whats Google +? about circles http://youtu.be/e-AlxC400y8

More Related