SlideShare uma empresa Scribd logo
1 de 47
Operating System Market Shares




Ryan (2008)
We need to question whether or not
 Windows is indeed the best, or more
 importantly, the safest operating
 system!
             Is windows the safest
             Operating System?
Absolutely Not!         Let me
    Why?
                        explain why
         Why?
                        technology is
               Why?     bad!
                   How?
Insecure Design
Windows PCs                                        Security Weak Points
Viruses                                            Open Ports
Trojans                                            Firewall
Malware                                            Unrestricted Access
Spyware                                            99% of time computer
                                                     is being run as Admin




       (“Microsoft Windows:Insecure by Design,” 2003, p. F07)
Mac and Linux Permissions


  99% of the time you can, and
   SHOULD, use the PC as a
normal user that does NOT have
 access to change or modify the
             system
      (“Microsoft Windows:Insecure by Design,” 2003, p. F07)
So why doesn't Windows offer more
         secure options?



 Unrestricted access is simple.
 Huge market share means no
     pressure to change.
A Checklist to Help Secure Your
           Windows system
Use NTFS on all your partitions                    Install Anti Virus and Spyware programs

Disable Simple File Sharing                        Keep up to date with hotfixes and service packs

Use passwords on all user accounts (windows lets   Make sure that Remote Desktop is disabled
   you create users that don't have passwords!)
                                                   Disable unnecessary services (such as the
Disable the Guest Account                              “messenger service” we discussed earlier)

Use a firewall better than Windows version.        Disable default shares




Keep in mind, all these changes still don't
guarantee a secure system because most
users have unrestricted access!
                                                                     Windows XP Security Checklist. (2006)
Steps to Secure Mac and Linux


Turn on computer
Create administrator account
Check firewall
Create restricted user account to use 99% of the
time
Get automatic updates when available
Why should you be concerned?




Top viruses and
threats to computers.




    http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20Nightmares%20Nov%202002.htm
Crime: How bad can it really be?
In 1988, one of the first Internet worms was
created by a Cornell University student named
Robert T. Morris The worm, rightfully called
Morris, crippled approximately 6,000 of the 60,000
computers online at that time. That's 10%!
It caused between an estimated $10 and $100
million dollars in damage.

Punishment:
$10,050 fine
3 years probation
Teaching gig at MIT!
Crime:
The Melissa Virus was named after a
Florida lap dancer favored by it's
author David L. Smith. The Melissa
virus was so severe it forced Alcatel-
Lucent, Intel, and even Microsoft to
shut down their e-mail systems.

Punishment:
$150,000 fine and 40 years in prison
reduced to 20 months and $5000!
for working undercover for the FBI to
help catch other hackers.
Crime:
Code Red and Nimda of 2001 took the
world by storm!

Nimda took just 22 minutes to spread
worldwide by creating masses of e-mails
and sending itself! You could also get
this worm simply by visiting an infected
website!

Code Red infected Microsoft IIS Web
servers and drastically slowed Internet
connectivity world wide costing an
estimated $2.6 Billion in damage.
Punishment: None! Authors never found.
Crime:
Sasser 2004 spread across Windows
XP and Win2000 machines forcing
Australian trains to halt, and
grounding 40 trans-Altantic flights
from Delta Air.

Punishment:
21-month suspended sentence!
The code was written by a German
teenager who was tried as a minor!

                                 (Kretkowski,2007)
Threats of the past?

What about now?



                                 What about the future?


   Surely the world must care?
                                            And be doing something
                                            about it!



    What about new operating
    systems like Vista?               I rarely use the computer
                                                  So how much does
                                                  it really affect me?
Some Recent Headlines!


"UNDERWORLD fraudsters are using random
number generators to tap into the bank accounts
of Irish customers.”

HACKED OFF
Sunday Mirror, Aug 3, 2008
LISA O'CONNOR
Gary McKinnon, due to be extradited to
 the US, accused of hacking into the
   Pentagon from his home in north
               London



                 Hacked off
   Independent, The (London), Aug 2, 2008
Key Player In TJX Cards Data Breach Pleads Guilty
“23-year-old Damon Toey agreed to testify against his
  accomplices in thefts at TJX, BJ Wholesale Club,
Sports Authority, OfficeMax, Dave & Buster's, Barnes
 & Noble and several others which cost credit unions
 millions of dollars to replace cards and pay for fraud
losses. The card information was sold openly over the
 Internet and used to manufacture counterfeit cards.”


             Credit Union Journal, The,
                  September, 2008
                     Ed Roberts
“Instances of identity theft continue to affect millions
 of Americans. In 2007 alone, the crime affected 8.4
             million people nationwide”




Resolution Services Combat Workplace Productivity
          Loss Related to ID Theft Crime
            Market Wire, June, 2008
User Error costs
    Millions and
it's our own fault
As much as 50 percent of the Tyler Medicaid fraud
 division's files were destroyed in July when a server
being repaired by a state vendor wouldn't restart. In all,
  81 criminal cases and eight months of work in the
  attorney general's 13-person Tyler Medicaid fraud
                    office were lost.


Medicaid data lost in computer crash, report says
     FROM STAFF AND WIRE REPORTS
           Friday, October 24, 2008
Palisade Systems Announces Consistent Trend of
  Data Loss By U.S. Organizations, Projecting
          4,200,000 Violations Annually
         PR Newswire, August 19, 2008


Annual
 Violation                                         July
Projected
  Type                                            Totals      Totals
 Credit Card Number (PCI violations)                207       2,000
 Social Security Number (GLBA violations)         1,214
63,128
 Personal Health Information (HIPAA violations) 44,373     2,307,396
 Personal Financial Information (GLBA violations 14,528
174,336
Technology is not bad

The users lack of understanding technology is
bad!
Technology can NOT exist without the user!
Until society is ready to take the time to learn and
understand the dangers we cannot risk such vast
use of technology that we currently utilize!
Our finances.
Our confidentiality.
Even our LIVES are at risk!
More Looming Threats…



Morals and
  Ethics of
Information
Technology
Entry Level Standards for Michigan
                Teachers


             Standard 7:

 Demonstrate knowledge of equitable,
  ethical, legal, social, physical, and
psychological issues concerning use of
       information technology.
Who Is Responsible?

TEACHERS




                 STUDENTS
Teacher Roles In Technology

Teachers have the power to do good with
  technology…BUT they must follow
              ETHICAL
               MORAL
               LEGAL
          STANDARDS
Teacher Roles In Technology

Common Reasons for Improper Technology Use

              Irresponsibility

                  Naivety

               Unawareness

       Lack of Knowledge and Actions
Example One– Irresponsibility


“A Charlotte-Mecklenburg Schools teacher faces firing for
    posting derogatory comments about students on
  Facebook, while four others have been disciplined for
     posts involving ‘poor judgment and bad taste’”




                     (Doss Helm, 2008)
Teacher Roles in Technology



Poor Leadership




Disrespectful to Students




Inappropriate Behavior




Poor Role Modeling


                            Pictured above is the
                             teacher in question
Teacher Roles in Technology

  Reader responses to the Charlotte teacher:
 “Issues of proper social networking behavior face our
  schools every day. Students (and teachers) need an
   effective curriculum that teaches expectations and
                        protocol.”

“I am completely shocked! I think it's everyone's right to
  social networking. However, as teachers, we have to
        know where and when to draw the line.”
                     (Doss Helm, 2008)
Example Two—Inappropriate Actions


“If there was any doubt about the power of blogs,
   consider the case of Michael Gee. A part-time
  journalism professor at Boston University, Gee
was fired recently after he posted comments in a
   blog about the looks of a female student in his
                      course.”
                   (Roberts, 2005)
Teacher Roles in Technology

Gee was guilty of:


 “Violating the trust essential to the student-
            teacher relationship."


                     (Roberts, 2005)
Example Three– Naivety &
             Unawareness


Jeffrey Spanierman, a teacher from Connecticut,
             created a MySpace page
 "to communicate with students about homework,
   to learn more about the students so he could
relate to them better, and to conduct casual, non-
            school related discussions”
                      BUT…
Teacher Roles in Technology

One of his colleagues reported the page which
contained nudity, inappropriate comments, and
     personal conversations with students

          RESULT: TERMINATION

                (Neuburger, 2008)
Legal Issues

-- Is the school public or private?
-- Are there state statutes that impose standards on
the teacher, or obligations on the school with respect
to teacher discipline?
-- Did the conduct involve expression that may be
protected by the First Amendment?
-- Did the conduct have a connection to the school
environment?
                      (Neuburger, 2008)
Teacher Roles in Technology


     Word of Caution

Anything you post on the Web
 can be potentially viewed
Teacher Roles in Technology


          Additional Concerns

1. Lack of clear expectations
2. Specific and purposeful guidelines
3. Rules and standards
Student Roles in Technology

While Teachers Develop Expectations and
             Standards…




     Students Must Follow Through
Student Roles in Technology


Common Reasons For Improper Technology Use:

               Cyber bullying

             Inappropriateness

                  Misuse
Example One– Cyber Bullying

                         -- Kylie Kenney, an 8th
                         grader from Vermont

                         -- Harassed with websites
                         created by her classmates

                         -- Threatened, degraded
 Kylie Kenney speaking   with homophobic remarks
 out on Cyber Bullying   and crude comments
                         (“Stories of Cyber Bullying,” 2008)
Example Two– Inappropriateness

--Two Penn State students
mocked Virginia Tech's
shooting victims on
Facebook.
-- Displayed photos of
students dressed in
costumes with VT t-shirts
and fake gunshot wounds


       (Zywusko, 2008)
Example Three– Misuse

-- Cut & paste plagiarism

-- In 2001, A University of Virginia physics
professor checked student papers for plagiarism
using a homemade computer program

-- 158 students were charged!


         (“Technology Sniffs Out Student Plagiarism, 2007)
Who Else Has A Role in Technology?


             Parents


             Schools


           Community
Closing Remarks
Closing Remarks

  In The Future…       Additional Technology
                            Concerns…

  Act with caution          Accessibility

Acknowledge possible         Credibility
      threats
                           The Unknown
 Be aware, alert and
      attentive
References
Doss Helms, Ann . "Teachers Disciplined for Facebook Postings." Charlotte Observer 12 Nov. 2008. 20 Nov.
   2008 <www.charlotteobserver.com>.
Neuburger, Jeffrey. "Teacher Fired for Inappropriate Behavior on MySpace Page." Media Shift . 28 Nov. 2008
   <http://www.pbs.org/mediashift/2008/10/teacher-fired-for-inappropriate-behavior-on-myspace-
   page289.html>.
Roberts, Paul. "Journalism Teacher Fired For Lewd Blog Comments." E Week . 25 Nov. 2008
   <http://www.eweek.com/c/a/Messaging-and-Collaboration/Journalism-Teacher-Fired-for-Lewd-Blog-
   Comments/>.
"Stories of Cyber Bullying in the News, Schools, Myspace, Facebook." Cyber Bullying Alert | CyberBullying
    Prevention Software | Internet Harassment. 30 Nov. 2008
    <http://www.cyberbullyalert.com/blog/2008/10/stories-of-cyber-bullying/>.
"Technology Sniffs Out Student Plagiarism, With Unsourced Copying On The Rise, New Software Programs Are
    Being Used To Combat Cut-And-Paste - CBS News." CBS News - Breaking News Headlines: Business,
    Entertainment & World News . 30 Nov. 2008
    <http://www.cbsnews.com/stories/2007/03/17/tech/main2580771.shtml>.
Zywusko, Ashley. "PSU students mock VT tragedy on Facebook - Midstate Buzz with PennLive.com." Read your
   favorite Central Pennsylvania blogs - PennLive.com. 30 Nov. 2008
   <http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html>.
Images
Students--http://www.ocms.org.uk/images/students-at-computers.jpg
Kylie Kenney--http://www.fightcrime.org/images/home_page/dc081706.gif
Morals and Ethics--http://www.ldesign.com/KGLPhoto/Photos/OnEthics/OnEthics3/Graph.jpg
Technology Saves--http://teaching.mrbelshaw.co.uk/wp-content/uploads/2007/02/cartoon-technology.gif
Virginia Tech--http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html
References
 Kretkowski, P. (2007). ITSecurity. Retrieved November 29, 2008 from
 http://www.itsecurity.com/features/10-worst-virus-attacks-111207/

 Microsoft Windows:Insecure by Design. (2003, August 24). The
 Washington Post, pp. F07 Retrieved November 29, 2008 from
 http://soundingcircle.com/newslog2.php/__show_article/_a000195-000451.htm


 Ryan, (2008). Cybernet Retrieved November 29, 2008 from
 http://cybernetnews.com/2008/01/10/os-browser-market-share-history/


 Windows XP Security Checklist. (2006). Retrieved November 29, 2008
 from http://labmice.techtarget.com/articles/winxpsecuritychecklist.htm
Images
Matrix Background -
http://www.overclock.net/other-software/114179-finally-matrix-screensaver-rocks.html
Market Share -
http://cybernetnews.com/2008/01/10/os-browser-market-share-history/
Threats -
http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20

Mais conteúdo relacionado

Mais procurados

State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensicsSTO STRATEGY
 
Changing Dimensions Of Distributed Learning
Changing Dimensions Of Distributed LearningChanging Dimensions Of Distributed Learning
Changing Dimensions Of Distributed Learningpaulette.robinson
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSIAEME Publication
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_systemKwame Afreh
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ictACLC Antipolo
 
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan IndonesiaMakalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan Indonesiakorneliszalukhu
 
Digitalcitizenproject
DigitalcitizenprojectDigitalcitizenproject
DigitalcitizenprojectJennMinor
 

Mais procurados (20)

Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
State of art of mobile forensics
State of art of mobile forensicsState of art of mobile forensics
State of art of mobile forensics
 
La pecera 3
La pecera 3La pecera 3
La pecera 3
 
Changing Dimensions Of Distributed Learning
Changing Dimensions Of Distributed LearningChanging Dimensions Of Distributed Learning
Changing Dimensions Of Distributed Learning
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Lesson 1 Empowerment Technology
Lesson 1 Empowerment TechnologyLesson 1 Empowerment Technology
Lesson 1 Empowerment Technology
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
La Pecera 4
La Pecera 4La Pecera 4
La Pecera 4
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ict
 
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan IndonesiaMakalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
 
Digitalcitizenproject
DigitalcitizenprojectDigitalcitizenproject
Digitalcitizenproject
 
Webdesign
WebdesignWebdesign
Webdesign
 

Semelhante a Bowhuis Group Ppt Draft5

Why Home Computing is a Mess
Why Home Computing is a MessWhy Home Computing is a Mess
Why Home Computing is a Messschroedinger
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03kbzdox ivanovich
 
Fears about technology bushra h
Fears about technology bushra hFears about technology bushra h
Fears about technology bushra h100435412hasan
 
Fears about technology bushra h
Fears about technology bushra hFears about technology bushra h
Fears about technology bushra h100435412hasan
 
38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY100743646balingoay
 
38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY100743646balingoay
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaGeorge Braga
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultSOCVault
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!UltraUploader
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 

Semelhante a Bowhuis Group Ppt Draft5 (20)

Why Home Computing is a Mess
Why Home Computing is a MessWhy Home Computing is a Mess
Why Home Computing is a Mess
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
 
Fears about technology bushra h
Fears about technology bushra hFears about technology bushra h
Fears about technology bushra h
 
Fears about technology bushra h
Fears about technology bushra hFears about technology bushra h
Fears about technology bushra h
 
38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY
 
38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY38 FEARS ABOUT COMPUTER TECHNOLOGY
38 FEARS ABOUT COMPUTER TECHNOLOGY
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Attack of the killer virus!
Attack of the killer virus!Attack of the killer virus!
Attack of the killer virus!
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 

Mais de lisamulka

Final Reflection
Final ReflectionFinal Reflection
Final Reflectionlisamulka
 
Stair Project Report
Stair Project ReportStair Project Report
Stair Project Reportlisamulka
 
Stair Design Form
Stair Design FormStair Design Form
Stair Design Formlisamulka
 
Argumentative Writing
Argumentative WritingArgumentative Writing
Argumentative Writinglisamulka
 
Personal Technology Plan
Personal Technology PlanPersonal Technology Plan
Personal Technology Planlisamulka
 
Standards Matrix For Educational Technology
Standards Matrix For Educational TechnologyStandards Matrix For Educational Technology
Standards Matrix For Educational Technologylisamulka
 
Tech Quest Final Draft
Tech Quest Final DraftTech Quest Final Draft
Tech Quest Final Draftlisamulka
 
Analysis Of Technology Innovation In The Classroom
Analysis Of Technology Innovation In The ClassroomAnalysis Of Technology Innovation In The Classroom
Analysis Of Technology Innovation In The Classroomlisamulka
 
Implementing A Model Lesson Plan
Implementing A Model Lesson PlanImplementing A Model Lesson Plan
Implementing A Model Lesson Planlisamulka
 
Personal Introduction Document In Word
Personal Introduction Document In WordPersonal Introduction Document In Word
Personal Introduction Document In Wordlisamulka
 
Educational Application Of Word
Educational Application Of WordEducational Application Of Word
Educational Application Of Wordlisamulka
 
Designing Online
Designing OnlineDesigning Online
Designing Onlinelisamulka
 

Mais de lisamulka (12)

Final Reflection
Final ReflectionFinal Reflection
Final Reflection
 
Stair Project Report
Stair Project ReportStair Project Report
Stair Project Report
 
Stair Design Form
Stair Design FormStair Design Form
Stair Design Form
 
Argumentative Writing
Argumentative WritingArgumentative Writing
Argumentative Writing
 
Personal Technology Plan
Personal Technology PlanPersonal Technology Plan
Personal Technology Plan
 
Standards Matrix For Educational Technology
Standards Matrix For Educational TechnologyStandards Matrix For Educational Technology
Standards Matrix For Educational Technology
 
Tech Quest Final Draft
Tech Quest Final DraftTech Quest Final Draft
Tech Quest Final Draft
 
Analysis Of Technology Innovation In The Classroom
Analysis Of Technology Innovation In The ClassroomAnalysis Of Technology Innovation In The Classroom
Analysis Of Technology Innovation In The Classroom
 
Implementing A Model Lesson Plan
Implementing A Model Lesson PlanImplementing A Model Lesson Plan
Implementing A Model Lesson Plan
 
Personal Introduction Document In Word
Personal Introduction Document In WordPersonal Introduction Document In Word
Personal Introduction Document In Word
 
Educational Application Of Word
Educational Application Of WordEducational Application Of Word
Educational Application Of Word
 
Designing Online
Designing OnlineDesigning Online
Designing Online
 

Último

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Bowhuis Group Ppt Draft5

  • 1.
  • 2. Operating System Market Shares Ryan (2008)
  • 3. We need to question whether or not Windows is indeed the best, or more importantly, the safest operating system! Is windows the safest Operating System? Absolutely Not! Let me Why? explain why Why? technology is Why? bad! How?
  • 4. Insecure Design Windows PCs Security Weak Points Viruses Open Ports Trojans Firewall Malware Unrestricted Access Spyware 99% of time computer is being run as Admin (“Microsoft Windows:Insecure by Design,” 2003, p. F07)
  • 5. Mac and Linux Permissions 99% of the time you can, and SHOULD, use the PC as a normal user that does NOT have access to change or modify the system (“Microsoft Windows:Insecure by Design,” 2003, p. F07)
  • 6. So why doesn't Windows offer more secure options? Unrestricted access is simple. Huge market share means no pressure to change.
  • 7. A Checklist to Help Secure Your Windows system Use NTFS on all your partitions Install Anti Virus and Spyware programs Disable Simple File Sharing Keep up to date with hotfixes and service packs Use passwords on all user accounts (windows lets Make sure that Remote Desktop is disabled you create users that don't have passwords!) Disable unnecessary services (such as the Disable the Guest Account “messenger service” we discussed earlier) Use a firewall better than Windows version. Disable default shares Keep in mind, all these changes still don't guarantee a secure system because most users have unrestricted access! Windows XP Security Checklist. (2006)
  • 8. Steps to Secure Mac and Linux Turn on computer Create administrator account Check firewall Create restricted user account to use 99% of the time Get automatic updates when available
  • 9. Why should you be concerned? Top viruses and threats to computers. http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20Nightmares%20Nov%202002.htm
  • 10. Crime: How bad can it really be? In 1988, one of the first Internet worms was created by a Cornell University student named Robert T. Morris The worm, rightfully called Morris, crippled approximately 6,000 of the 60,000 computers online at that time. That's 10%! It caused between an estimated $10 and $100 million dollars in damage. Punishment: $10,050 fine 3 years probation Teaching gig at MIT!
  • 11. Crime: The Melissa Virus was named after a Florida lap dancer favored by it's author David L. Smith. The Melissa virus was so severe it forced Alcatel- Lucent, Intel, and even Microsoft to shut down their e-mail systems. Punishment: $150,000 fine and 40 years in prison reduced to 20 months and $5000! for working undercover for the FBI to help catch other hackers.
  • 12. Crime: Code Red and Nimda of 2001 took the world by storm! Nimda took just 22 minutes to spread worldwide by creating masses of e-mails and sending itself! You could also get this worm simply by visiting an infected website! Code Red infected Microsoft IIS Web servers and drastically slowed Internet connectivity world wide costing an estimated $2.6 Billion in damage. Punishment: None! Authors never found.
  • 13. Crime: Sasser 2004 spread across Windows XP and Win2000 machines forcing Australian trains to halt, and grounding 40 trans-Altantic flights from Delta Air. Punishment: 21-month suspended sentence! The code was written by a German teenager who was tried as a minor! (Kretkowski,2007)
  • 14. Threats of the past? What about now? What about the future? Surely the world must care? And be doing something about it! What about new operating systems like Vista? I rarely use the computer So how much does it really affect me?
  • 15. Some Recent Headlines! "UNDERWORLD fraudsters are using random number generators to tap into the bank accounts of Irish customers.” HACKED OFF Sunday Mirror, Aug 3, 2008 LISA O'CONNOR
  • 16. Gary McKinnon, due to be extradited to the US, accused of hacking into the Pentagon from his home in north London Hacked off Independent, The (London), Aug 2, 2008
  • 17. Key Player In TJX Cards Data Breach Pleads Guilty “23-year-old Damon Toey agreed to testify against his accomplices in thefts at TJX, BJ Wholesale Club, Sports Authority, OfficeMax, Dave & Buster's, Barnes & Noble and several others which cost credit unions millions of dollars to replace cards and pay for fraud losses. The card information was sold openly over the Internet and used to manufacture counterfeit cards.” Credit Union Journal, The, September, 2008 Ed Roberts
  • 18. “Instances of identity theft continue to affect millions of Americans. In 2007 alone, the crime affected 8.4 million people nationwide” Resolution Services Combat Workplace Productivity Loss Related to ID Theft Crime Market Wire, June, 2008
  • 19. User Error costs Millions and it's our own fault
  • 20. As much as 50 percent of the Tyler Medicaid fraud division's files were destroyed in July when a server being repaired by a state vendor wouldn't restart. In all, 81 criminal cases and eight months of work in the attorney general's 13-person Tyler Medicaid fraud office were lost. Medicaid data lost in computer crash, report says FROM STAFF AND WIRE REPORTS Friday, October 24, 2008
  • 21. Palisade Systems Announces Consistent Trend of Data Loss By U.S. Organizations, Projecting 4,200,000 Violations Annually PR Newswire, August 19, 2008 Annual Violation July Projected Type Totals Totals Credit Card Number (PCI violations) 207 2,000 Social Security Number (GLBA violations) 1,214 63,128 Personal Health Information (HIPAA violations) 44,373 2,307,396 Personal Financial Information (GLBA violations 14,528 174,336
  • 22. Technology is not bad The users lack of understanding technology is bad! Technology can NOT exist without the user! Until society is ready to take the time to learn and understand the dangers we cannot risk such vast use of technology that we currently utilize! Our finances. Our confidentiality. Even our LIVES are at risk!
  • 23. More Looming Threats… Morals and Ethics of Information Technology
  • 24. Entry Level Standards for Michigan Teachers Standard 7: Demonstrate knowledge of equitable, ethical, legal, social, physical, and psychological issues concerning use of information technology.
  • 26. Teacher Roles In Technology Teachers have the power to do good with technology…BUT they must follow ETHICAL MORAL LEGAL STANDARDS
  • 27. Teacher Roles In Technology Common Reasons for Improper Technology Use Irresponsibility Naivety Unawareness Lack of Knowledge and Actions
  • 28. Example One– Irresponsibility “A Charlotte-Mecklenburg Schools teacher faces firing for posting derogatory comments about students on Facebook, while four others have been disciplined for posts involving ‘poor judgment and bad taste’” (Doss Helm, 2008)
  • 29. Teacher Roles in Technology Poor Leadership  Disrespectful to Students  Inappropriate Behavior  Poor Role Modeling  Pictured above is the teacher in question
  • 30. Teacher Roles in Technology Reader responses to the Charlotte teacher: “Issues of proper social networking behavior face our schools every day. Students (and teachers) need an effective curriculum that teaches expectations and protocol.” “I am completely shocked! I think it's everyone's right to social networking. However, as teachers, we have to know where and when to draw the line.” (Doss Helm, 2008)
  • 31. Example Two—Inappropriate Actions “If there was any doubt about the power of blogs, consider the case of Michael Gee. A part-time journalism professor at Boston University, Gee was fired recently after he posted comments in a blog about the looks of a female student in his course.” (Roberts, 2005)
  • 32. Teacher Roles in Technology Gee was guilty of: “Violating the trust essential to the student- teacher relationship." (Roberts, 2005)
  • 33. Example Three– Naivety & Unawareness Jeffrey Spanierman, a teacher from Connecticut, created a MySpace page "to communicate with students about homework, to learn more about the students so he could relate to them better, and to conduct casual, non- school related discussions” BUT…
  • 34. Teacher Roles in Technology One of his colleagues reported the page which contained nudity, inappropriate comments, and personal conversations with students RESULT: TERMINATION (Neuburger, 2008)
  • 35. Legal Issues -- Is the school public or private? -- Are there state statutes that impose standards on the teacher, or obligations on the school with respect to teacher discipline? -- Did the conduct involve expression that may be protected by the First Amendment? -- Did the conduct have a connection to the school environment? (Neuburger, 2008)
  • 36. Teacher Roles in Technology Word of Caution Anything you post on the Web can be potentially viewed
  • 37. Teacher Roles in Technology Additional Concerns 1. Lack of clear expectations 2. Specific and purposeful guidelines 3. Rules and standards
  • 38. Student Roles in Technology While Teachers Develop Expectations and Standards… Students Must Follow Through
  • 39. Student Roles in Technology Common Reasons For Improper Technology Use: Cyber bullying Inappropriateness Misuse
  • 40. Example One– Cyber Bullying -- Kylie Kenney, an 8th grader from Vermont -- Harassed with websites created by her classmates -- Threatened, degraded Kylie Kenney speaking with homophobic remarks out on Cyber Bullying and crude comments (“Stories of Cyber Bullying,” 2008)
  • 41. Example Two– Inappropriateness --Two Penn State students mocked Virginia Tech's shooting victims on Facebook. -- Displayed photos of students dressed in costumes with VT t-shirts and fake gunshot wounds (Zywusko, 2008)
  • 42. Example Three– Misuse -- Cut & paste plagiarism -- In 2001, A University of Virginia physics professor checked student papers for plagiarism using a homemade computer program -- 158 students were charged! (“Technology Sniffs Out Student Plagiarism, 2007)
  • 43. Who Else Has A Role in Technology? Parents Schools Community
  • 45. Closing Remarks In The Future… Additional Technology Concerns… Act with caution Accessibility Acknowledge possible Credibility threats The Unknown Be aware, alert and attentive
  • 46. References Doss Helms, Ann . "Teachers Disciplined for Facebook Postings." Charlotte Observer 12 Nov. 2008. 20 Nov. 2008 <www.charlotteobserver.com>. Neuburger, Jeffrey. "Teacher Fired for Inappropriate Behavior on MySpace Page." Media Shift . 28 Nov. 2008 <http://www.pbs.org/mediashift/2008/10/teacher-fired-for-inappropriate-behavior-on-myspace- page289.html>. Roberts, Paul. "Journalism Teacher Fired For Lewd Blog Comments." E Week . 25 Nov. 2008 <http://www.eweek.com/c/a/Messaging-and-Collaboration/Journalism-Teacher-Fired-for-Lewd-Blog- Comments/>. "Stories of Cyber Bullying in the News, Schools, Myspace, Facebook." Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment. 30 Nov. 2008 <http://www.cyberbullyalert.com/blog/2008/10/stories-of-cyber-bullying/>. "Technology Sniffs Out Student Plagiarism, With Unsourced Copying On The Rise, New Software Programs Are Being Used To Combat Cut-And-Paste - CBS News." CBS News - Breaking News Headlines: Business, Entertainment & World News . 30 Nov. 2008 <http://www.cbsnews.com/stories/2007/03/17/tech/main2580771.shtml>. Zywusko, Ashley. "PSU students mock VT tragedy on Facebook - Midstate Buzz with PennLive.com." Read your favorite Central Pennsylvania blogs - PennLive.com. 30 Nov. 2008 <http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html>. Images Students--http://www.ocms.org.uk/images/students-at-computers.jpg Kylie Kenney--http://www.fightcrime.org/images/home_page/dc081706.gif Morals and Ethics--http://www.ldesign.com/KGLPhoto/Photos/OnEthics/OnEthics3/Graph.jpg Technology Saves--http://teaching.mrbelshaw.co.uk/wp-content/uploads/2007/02/cartoon-technology.gif Virginia Tech--http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html
  • 47. References Kretkowski, P. (2007). ITSecurity. Retrieved November 29, 2008 from http://www.itsecurity.com/features/10-worst-virus-attacks-111207/ Microsoft Windows:Insecure by Design. (2003, August 24). The Washington Post, pp. F07 Retrieved November 29, 2008 from http://soundingcircle.com/newslog2.php/__show_article/_a000195-000451.htm Ryan, (2008). Cybernet Retrieved November 29, 2008 from http://cybernetnews.com/2008/01/10/os-browser-market-share-history/ Windows XP Security Checklist. (2006). Retrieved November 29, 2008 from http://labmice.techtarget.com/articles/winxpsecuritychecklist.htm Images Matrix Background - http://www.overclock.net/other-software/114179-finally-matrix-screensaver-rocks.html Market Share - http://cybernetnews.com/2008/01/10/os-browser-market-share-history/ Threats - http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20