3. We need to question whether or not
Windows is indeed the best, or more
importantly, the safest operating
system!
Is windows the safest
Operating System?
Absolutely Not! Let me
Why?
explain why
Why?
technology is
Why? bad!
How?
4. Insecure Design
Windows PCs Security Weak Points
Viruses Open Ports
Trojans Firewall
Malware Unrestricted Access
Spyware 99% of time computer
is being run as Admin
(“Microsoft Windows:Insecure by Design,” 2003, p. F07)
5. Mac and Linux Permissions
99% of the time you can, and
SHOULD, use the PC as a
normal user that does NOT have
access to change or modify the
system
(“Microsoft Windows:Insecure by Design,” 2003, p. F07)
6. So why doesn't Windows offer more
secure options?
Unrestricted access is simple.
Huge market share means no
pressure to change.
7. A Checklist to Help Secure Your
Windows system
Use NTFS on all your partitions Install Anti Virus and Spyware programs
Disable Simple File Sharing Keep up to date with hotfixes and service packs
Use passwords on all user accounts (windows lets Make sure that Remote Desktop is disabled
you create users that don't have passwords!)
Disable unnecessary services (such as the
Disable the Guest Account “messenger service” we discussed earlier)
Use a firewall better than Windows version. Disable default shares
Keep in mind, all these changes still don't
guarantee a secure system because most
users have unrestricted access!
Windows XP Security Checklist. (2006)
8. Steps to Secure Mac and Linux
Turn on computer
Create administrator account
Check firewall
Create restricted user account to use 99% of the
time
Get automatic updates when available
9. Why should you be concerned?
Top viruses and
threats to computers.
http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20Nightmares%20Nov%202002.htm
10. Crime: How bad can it really be?
In 1988, one of the first Internet worms was
created by a Cornell University student named
Robert T. Morris The worm, rightfully called
Morris, crippled approximately 6,000 of the 60,000
computers online at that time. That's 10%!
It caused between an estimated $10 and $100
million dollars in damage.
Punishment:
$10,050 fine
3 years probation
Teaching gig at MIT!
11. Crime:
The Melissa Virus was named after a
Florida lap dancer favored by it's
author David L. Smith. The Melissa
virus was so severe it forced Alcatel-
Lucent, Intel, and even Microsoft to
shut down their e-mail systems.
Punishment:
$150,000 fine and 40 years in prison
reduced to 20 months and $5000!
for working undercover for the FBI to
help catch other hackers.
12. Crime:
Code Red and Nimda of 2001 took the
world by storm!
Nimda took just 22 minutes to spread
worldwide by creating masses of e-mails
and sending itself! You could also get
this worm simply by visiting an infected
website!
Code Red infected Microsoft IIS Web
servers and drastically slowed Internet
connectivity world wide costing an
estimated $2.6 Billion in damage.
Punishment: None! Authors never found.
13. Crime:
Sasser 2004 spread across Windows
XP and Win2000 machines forcing
Australian trains to halt, and
grounding 40 trans-Altantic flights
from Delta Air.
Punishment:
21-month suspended sentence!
The code was written by a German
teenager who was tried as a minor!
(Kretkowski,2007)
14. Threats of the past?
What about now?
What about the future?
Surely the world must care?
And be doing something
about it!
What about new operating
systems like Vista? I rarely use the computer
So how much does
it really affect me?
15. Some Recent Headlines!
"UNDERWORLD fraudsters are using random
number generators to tap into the bank accounts
of Irish customers.”
HACKED OFF
Sunday Mirror, Aug 3, 2008
LISA O'CONNOR
16. Gary McKinnon, due to be extradited to
the US, accused of hacking into the
Pentagon from his home in north
London
Hacked off
Independent, The (London), Aug 2, 2008
17. Key Player In TJX Cards Data Breach Pleads Guilty
“23-year-old Damon Toey agreed to testify against his
accomplices in thefts at TJX, BJ Wholesale Club,
Sports Authority, OfficeMax, Dave & Buster's, Barnes
& Noble and several others which cost credit unions
millions of dollars to replace cards and pay for fraud
losses. The card information was sold openly over the
Internet and used to manufacture counterfeit cards.”
Credit Union Journal, The,
September, 2008
Ed Roberts
18. “Instances of identity theft continue to affect millions
of Americans. In 2007 alone, the crime affected 8.4
million people nationwide”
Resolution Services Combat Workplace Productivity
Loss Related to ID Theft Crime
Market Wire, June, 2008
20. As much as 50 percent of the Tyler Medicaid fraud
division's files were destroyed in July when a server
being repaired by a state vendor wouldn't restart. In all,
81 criminal cases and eight months of work in the
attorney general's 13-person Tyler Medicaid fraud
office were lost.
Medicaid data lost in computer crash, report says
FROM STAFF AND WIRE REPORTS
Friday, October 24, 2008
21. Palisade Systems Announces Consistent Trend of
Data Loss By U.S. Organizations, Projecting
4,200,000 Violations Annually
PR Newswire, August 19, 2008
Annual
Violation July
Projected
Type Totals Totals
Credit Card Number (PCI violations) 207 2,000
Social Security Number (GLBA violations) 1,214
63,128
Personal Health Information (HIPAA violations) 44,373 2,307,396
Personal Financial Information (GLBA violations 14,528
174,336
22. Technology is not bad
The users lack of understanding technology is
bad!
Technology can NOT exist without the user!
Until society is ready to take the time to learn and
understand the dangers we cannot risk such vast
use of technology that we currently utilize!
Our finances.
Our confidentiality.
Even our LIVES are at risk!
24. Entry Level Standards for Michigan
Teachers
Standard 7:
Demonstrate knowledge of equitable,
ethical, legal, social, physical, and
psychological issues concerning use of
information technology.
26. Teacher Roles In Technology
Teachers have the power to do good with
technology…BUT they must follow
ETHICAL
MORAL
LEGAL
STANDARDS
27. Teacher Roles In Technology
Common Reasons for Improper Technology Use
Irresponsibility
Naivety
Unawareness
Lack of Knowledge and Actions
28. Example One– Irresponsibility
“A Charlotte-Mecklenburg Schools teacher faces firing for
posting derogatory comments about students on
Facebook, while four others have been disciplined for
posts involving ‘poor judgment and bad taste’”
(Doss Helm, 2008)
29. Teacher Roles in Technology
Poor Leadership
Disrespectful to Students
Inappropriate Behavior
Poor Role Modeling
Pictured above is the
teacher in question
30. Teacher Roles in Technology
Reader responses to the Charlotte teacher:
“Issues of proper social networking behavior face our
schools every day. Students (and teachers) need an
effective curriculum that teaches expectations and
protocol.”
“I am completely shocked! I think it's everyone's right to
social networking. However, as teachers, we have to
know where and when to draw the line.”
(Doss Helm, 2008)
31. Example Two—Inappropriate Actions
“If there was any doubt about the power of blogs,
consider the case of Michael Gee. A part-time
journalism professor at Boston University, Gee
was fired recently after he posted comments in a
blog about the looks of a female student in his
course.”
(Roberts, 2005)
32. Teacher Roles in Technology
Gee was guilty of:
“Violating the trust essential to the student-
teacher relationship."
(Roberts, 2005)
33. Example Three– Naivety &
Unawareness
Jeffrey Spanierman, a teacher from Connecticut,
created a MySpace page
"to communicate with students about homework,
to learn more about the students so he could
relate to them better, and to conduct casual, non-
school related discussions”
BUT…
34. Teacher Roles in Technology
One of his colleagues reported the page which
contained nudity, inappropriate comments, and
personal conversations with students
RESULT: TERMINATION
(Neuburger, 2008)
35. Legal Issues
-- Is the school public or private?
-- Are there state statutes that impose standards on
the teacher, or obligations on the school with respect
to teacher discipline?
-- Did the conduct involve expression that may be
protected by the First Amendment?
-- Did the conduct have a connection to the school
environment?
(Neuburger, 2008)
36. Teacher Roles in Technology
Word of Caution
Anything you post on the Web
can be potentially viewed
37. Teacher Roles in Technology
Additional Concerns
1. Lack of clear expectations
2. Specific and purposeful guidelines
3. Rules and standards
38. Student Roles in Technology
While Teachers Develop Expectations and
Standards…
Students Must Follow Through
39. Student Roles in Technology
Common Reasons For Improper Technology Use:
Cyber bullying
Inappropriateness
Misuse
40. Example One– Cyber Bullying
-- Kylie Kenney, an 8th
grader from Vermont
-- Harassed with websites
created by her classmates
-- Threatened, degraded
Kylie Kenney speaking with homophobic remarks
out on Cyber Bullying and crude comments
(“Stories of Cyber Bullying,” 2008)
41. Example Two– Inappropriateness
--Two Penn State students
mocked Virginia Tech's
shooting victims on
Facebook.
-- Displayed photos of
students dressed in
costumes with VT t-shirts
and fake gunshot wounds
(Zywusko, 2008)
42. Example Three– Misuse
-- Cut & paste plagiarism
-- In 2001, A University of Virginia physics
professor checked student papers for plagiarism
using a homemade computer program
-- 158 students were charged!
(“Technology Sniffs Out Student Plagiarism, 2007)
43. Who Else Has A Role in Technology?
Parents
Schools
Community
45. Closing Remarks
In The Future… Additional Technology
Concerns…
Act with caution Accessibility
Acknowledge possible Credibility
threats
The Unknown
Be aware, alert and
attentive
46. References
Doss Helms, Ann . "Teachers Disciplined for Facebook Postings." Charlotte Observer 12 Nov. 2008. 20 Nov.
2008 <www.charlotteobserver.com>.
Neuburger, Jeffrey. "Teacher Fired for Inappropriate Behavior on MySpace Page." Media Shift . 28 Nov. 2008
<http://www.pbs.org/mediashift/2008/10/teacher-fired-for-inappropriate-behavior-on-myspace-
page289.html>.
Roberts, Paul. "Journalism Teacher Fired For Lewd Blog Comments." E Week . 25 Nov. 2008
<http://www.eweek.com/c/a/Messaging-and-Collaboration/Journalism-Teacher-Fired-for-Lewd-Blog-
Comments/>.
"Stories of Cyber Bullying in the News, Schools, Myspace, Facebook." Cyber Bullying Alert | CyberBullying
Prevention Software | Internet Harassment. 30 Nov. 2008
<http://www.cyberbullyalert.com/blog/2008/10/stories-of-cyber-bullying/>.
"Technology Sniffs Out Student Plagiarism, With Unsourced Copying On The Rise, New Software Programs Are
Being Used To Combat Cut-And-Paste - CBS News." CBS News - Breaking News Headlines: Business,
Entertainment & World News . 30 Nov. 2008
<http://www.cbsnews.com/stories/2007/03/17/tech/main2580771.shtml>.
Zywusko, Ashley. "PSU students mock VT tragedy on Facebook - Midstate Buzz with PennLive.com." Read your
favorite Central Pennsylvania blogs - PennLive.com. 30 Nov. 2008
<http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html>.
Images
Students--http://www.ocms.org.uk/images/students-at-computers.jpg
Kylie Kenney--http://www.fightcrime.org/images/home_page/dc081706.gif
Morals and Ethics--http://www.ldesign.com/KGLPhoto/Photos/OnEthics/OnEthics3/Graph.jpg
Technology Saves--http://teaching.mrbelshaw.co.uk/wp-content/uploads/2007/02/cartoon-technology.gif
Virginia Tech--http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html
47. References
Kretkowski, P. (2007). ITSecurity. Retrieved November 29, 2008 from
http://www.itsecurity.com/features/10-worst-virus-attacks-111207/
Microsoft Windows:Insecure by Design. (2003, August 24). The
Washington Post, pp. F07 Retrieved November 29, 2008 from
http://soundingcircle.com/newslog2.php/__show_article/_a000195-000451.htm
Ryan, (2008). Cybernet Retrieved November 29, 2008 from
http://cybernetnews.com/2008/01/10/os-browser-market-share-history/
Windows XP Security Checklist. (2006). Retrieved November 29, 2008
from http://labmice.techtarget.com/articles/winxpsecuritychecklist.htm
Images
Matrix Background -
http://www.overclock.net/other-software/114179-finally-matrix-screensaver-rocks.html
Market Share -
http://cybernetnews.com/2008/01/10/os-browser-market-share-history/
Threats -
http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20