Cit101 social aspects_and_issues_of_the_internet spring 2012


Published on

Internet Privacy, Security, and Social Issues

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cit101 social aspects_and_issues_of_the_internet spring 2012

  1. 1. Privacy and securityonline; social issuesfor a social networkCIT101I: Using the InternetApril 18, 2012
  2. 2. Wireless LAN Uses a wireless medium — such as radio frequency transmissions — to connect computers, printers, and other devices RF is most common for WiFi hotspots IR or Bluetooth for short2 range devices
  3. 3. Networking Basics3
  4. 4. Location-Based Servicesand GPS  Handheld wireless devices, such as smartphones and tablets, are ubiquitous in today’s modern mobile societies 4
  5. 5. Location-Based Servicesand GPS Location-based services (LBS) are wireless services offered to customers based on their physical location  E9-1-1 At the heart of this and other LBSs are the global positioning system (GPS) satellite network and receivers mounted in automobiles or placed in cell phones or other handheld devices 5 Chapter 6: Understanding Internet Technologies and Security
  6. 6. Location-Based Servicesand GPS  Geosocial networking is a term used to describe the combination of LBS with social networking providers  Foursquare  Yelp  Google Latitude 6 Chapter 6: Understanding Internet Technologies and Security
  7. 7. Internet Telephony and Web Conferencing Internet telephony  Voice over IP (VoIP)  Uses TCP/IP and packet switching to send voice transmissions over private or public IP network • E-businesses, such as Vonage, offer digital telephony services • Computer to computer calling using special software, such as Skype 7 Chapter 6: Understanding Internet Technologies and Security
  8. 8. Internet Telephony and WebConferencing8 Chapter 6: Understanding Internet Technologies and Security
  9. 9. Security/privacy Security: how safe is our data and equipment? Privacy: how safe is my information?  Passwords (biometrics?)  Firewalls  Viruses  Data encryption  Spam and spyware  Cookies  Browser history and cache  Cyberstalking  Cyberbullying Questions to ask about sharing information online:  Who, what, when, where, why, and how?
  10. 10. Network Security Issues and Technologies Internal threats  Security policies and procedures  Authorized network access  Wireless network security  Data backup and restore  Disaster recovery planning 10
  11. 11. Network Security Issues and Technologies External threats  Unauthorized network access  Computer viruses  Web page hacking  Firewalls and proxy servers  Internet filtering software  Security audits 11
  12. 12. Network Security Issues and Technologies Transactional risks  Protecting and validating online transaction information 12
  13. 13. Virtual Private Networks 13 Chapter 6: Understanding Internet Technologies and Security
  14. 14. The digital divide Nearly 1 in 5 American adults does not use the Internet (78% do, plus 95% of teens) Least likely users (% who use Internet):  Adults over 65 – 41%  <$30,000 household income – 62%  No HS diploma – 43% 62% have broadband, 3% dial-up, lots of mobile use (88% have cell phones) 65% of Internet users use social networks (50% of adults) What can’t you do without the Internet? (48% of non- users say it’s not relevant to their lives) Pew Internet and American Life Survey in 2012
  15. 15. Copyright & file sharing Print, e-books, MP3 audio, video Protecting copyright of digital items Easier digitization of existing items Easier sharing of illegal copies (file sharing, etc.) Lack of legislative guidance (old law) DRM – Digital Rights Management  Limiting copying and printing  Breaks fair use exemptions? Stopping file sharing networks