Operating System Market Shares




Ryan (2008)
We need to question whether or not
 Windows is indeed the best, or more
 importantly, the safest operating
 system!
      ...
Insecure Design
Windows PCs                                        Security Weak Points
Viruses                           ...
Mac and Linux Permissions


  99% of the time you can, and
   SHOULD, use the PC as a
normal user that does NOT have
 acce...
So why doesn't Windows offer more
         secure options?



 Unrestricted access is simple.
 Huge market share means no
...
A Checklist to Help Secure Your
           Windows system
Use NTFS on all your partitions                    Install Anti ...
Steps to Secure Mac and Linux


Turn on computer
Create administrator account
Check firewall
Create restricted user accoun...
Why should you be concerned?




Top viruses and
threats to computers.




    http://craigchamberlain.dreamhosters.com/ma...
Crime: How bad can it really be?
In 1988, one of the first Internet worms was
created by a Cornell University student name...
Crime:
The Melissa Virus was named after a
Florida lap dancer favored by it's
author David L. Smith. The Melissa
virus was...
Crime:
Code Red and Nimda of 2001 took the
world by storm!

Nimda took just 22 minutes to spread
worldwide by creating mas...
Crime:
Sasser 2004 spread across Windows
XP and Win2000 machines forcing
Australian trains to halt, and
grounding 40 trans...
Threats of the past?

What about now?



                                 What about the future?


   Surely the world mus...
Some Recent Headlines!


"UNDERWORLD fraudsters are using random
number generators to tap into the bank accounts
of Irish ...
Gary McKinnon, due to be extradited to
 the US, accused of hacking into the
   Pentagon from his home in north
           ...
Key Player In TJX Cards Data Breach Pleads Guilty
“23-year-old Damon Toey agreed to testify against his
  accomplices in t...
“Instances of identity theft continue to affect millions
 of Americans. In 2007 alone, the crime affected 8.4
            ...
User Error costs
    Millions and
it's our own fault
As much as 50 percent of the Tyler Medicaid fraud
 division's files were destroyed in July when a server
being repaired by...
Palisade Systems Announces Consistent Trend of
  Data Loss By U.S. Organizations, Projecting
          4,200,000 Violation...
Technology is not bad

The users lack of understanding technology is
bad!
Technology can NOT exist without the user!
Until...
More Looming Threats…



Morals and
  Ethics of
Information
Technology
Entry Level Standards for Michigan
                Teachers


             Standard 7:

 Demonstrate knowledge of equitabl...
Who Is Responsible?

TEACHERS




                 STUDENTS
Teacher Roles In Technology

Teachers have the power to do good with
  technology…BUT they must follow
              ETHIC...
Teacher Roles In Technology

Common Reasons for Improper Technology Use

              Irresponsibility

                 ...
Example One– Irresponsibility


“A Charlotte-Mecklenburg Schools teacher faces firing for
    posting derogatory comments ...
Teacher Roles in Technology



Poor Leadership




Disrespectful to Students




Inappropriate Behavior




Poor Role M...
Teacher Roles in Technology

  Reader responses to the Charlotte teacher:
 “Issues of proper social networking behavior fa...
Example Two—Inappropriate Actions


“If there was any doubt about the power of blogs,
   consider the case of Michael Gee....
Teacher Roles in Technology

Gee was guilty of:


 “Violating the trust essential to the student-
            teacher rela...
Example Three– Naivety &
             Unawareness


Jeffrey Spanierman, a teacher from Connecticut,
             created a...
Teacher Roles in Technology

One of his colleagues reported the page which
contained nudity, inappropriate comments, and
 ...
Legal Issues

-- Is the school public or private?
-- Are there state statutes that impose standards on
the teacher, or obl...
Teacher Roles in Technology


     Word of Caution

Anything you post on the Web
 can be potentially viewed
Teacher Roles in Technology


          Additional Concerns

1. Lack of clear expectations
2. Specific and purposeful guid...
Student Roles in Technology

While Teachers Develop Expectations and
             Standards…




     Students Must Follow...
Student Roles in Technology


Common Reasons For Improper Technology Use:

               Cyber bullying

             Ina...
Example One– Cyber Bullying

                         -- Kylie Kenney, an 8th
                         grader from Vermont...
Example Two– Inappropriateness

--Two Penn State students
mocked Virginia Tech's
shooting victims on
Facebook.
-- Displaye...
Example Three– Misuse

-- Cut & paste plagiarism

-- In 2001, A University of Virginia physics
professor checked student p...
Who Else Has A Role in Technology?


             Parents


             Schools


           Community
Closing Remarks
Closing Remarks

  In The Future…       Additional Technology
                            Concerns…

  Act with caution   ...
References
Doss Helms, Ann . "Teachers Disciplined for Facebook Postings." Charlotte Observer 12 Nov. 2008. 20 Nov.
   200...
References
 Kretkowski, P. (2007). ITSecurity. Retrieved November 29, 2008 from
 http://www.itsecurity.com/features/10-wor...
Bowhuis Group Ppt Draft5
Upcoming SlideShare
Loading in …5
×

Bowhuis Group Ppt Draft5

1,173 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,173
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bowhuis Group Ppt Draft5

  1. 1. Operating System Market Shares Ryan (2008)
  2. 2. We need to question whether or not Windows is indeed the best, or more importantly, the safest operating system! Is windows the safest Operating System? Absolutely Not! Let me Why? explain why Why? technology is Why? bad! How?
  3. 3. Insecure Design Windows PCs Security Weak Points Viruses Open Ports Trojans Firewall Malware Unrestricted Access Spyware 99% of time computer is being run as Admin (“Microsoft Windows:Insecure by Design,” 2003, p. F07)
  4. 4. Mac and Linux Permissions 99% of the time you can, and SHOULD, use the PC as a normal user that does NOT have access to change or modify the system (“Microsoft Windows:Insecure by Design,” 2003, p. F07)
  5. 5. So why doesn't Windows offer more secure options? Unrestricted access is simple. Huge market share means no pressure to change.
  6. 6. A Checklist to Help Secure Your Windows system Use NTFS on all your partitions Install Anti Virus and Spyware programs Disable Simple File Sharing Keep up to date with hotfixes and service packs Use passwords on all user accounts (windows lets Make sure that Remote Desktop is disabled you create users that don't have passwords!) Disable unnecessary services (such as the Disable the Guest Account “messenger service” we discussed earlier) Use a firewall better than Windows version. Disable default shares Keep in mind, all these changes still don't guarantee a secure system because most users have unrestricted access! Windows XP Security Checklist. (2006)
  7. 7. Steps to Secure Mac and Linux Turn on computer Create administrator account Check firewall Create restricted user account to use 99% of the time Get automatic updates when available
  8. 8. Why should you be concerned? Top viruses and threats to computers. http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20Nightmares%20Nov%202002.htm
  9. 9. Crime: How bad can it really be? In 1988, one of the first Internet worms was created by a Cornell University student named Robert T. Morris The worm, rightfully called Morris, crippled approximately 6,000 of the 60,000 computers online at that time. That's 10%! It caused between an estimated $10 and $100 million dollars in damage. Punishment: $10,050 fine 3 years probation Teaching gig at MIT!
  10. 10. Crime: The Melissa Virus was named after a Florida lap dancer favored by it's author David L. Smith. The Melissa virus was so severe it forced Alcatel- Lucent, Intel, and even Microsoft to shut down their e-mail systems. Punishment: $150,000 fine and 40 years in prison reduced to 20 months and $5000! for working undercover for the FBI to help catch other hackers.
  11. 11. Crime: Code Red and Nimda of 2001 took the world by storm! Nimda took just 22 minutes to spread worldwide by creating masses of e-mails and sending itself! You could also get this worm simply by visiting an infected website! Code Red infected Microsoft IIS Web servers and drastically slowed Internet connectivity world wide costing an estimated $2.6 Billion in damage. Punishment: None! Authors never found.
  12. 12. Crime: Sasser 2004 spread across Windows XP and Win2000 machines forcing Australian trains to halt, and grounding 40 trans-Altantic flights from Delta Air. Punishment: 21-month suspended sentence! The code was written by a German teenager who was tried as a minor! (Kretkowski,2007)
  13. 13. Threats of the past? What about now? What about the future? Surely the world must care? And be doing something about it! What about new operating systems like Vista? I rarely use the computer So how much does it really affect me?
  14. 14. Some Recent Headlines! "UNDERWORLD fraudsters are using random number generators to tap into the bank accounts of Irish customers.” HACKED OFF Sunday Mirror, Aug 3, 2008 LISA O'CONNOR
  15. 15. Gary McKinnon, due to be extradited to the US, accused of hacking into the Pentagon from his home in north London Hacked off Independent, The (London), Aug 2, 2008
  16. 16. Key Player In TJX Cards Data Breach Pleads Guilty “23-year-old Damon Toey agreed to testify against his accomplices in thefts at TJX, BJ Wholesale Club, Sports Authority, OfficeMax, Dave & Buster's, Barnes & Noble and several others which cost credit unions millions of dollars to replace cards and pay for fraud losses. The card information was sold openly over the Internet and used to manufacture counterfeit cards.” Credit Union Journal, The, September, 2008 Ed Roberts
  17. 17. “Instances of identity theft continue to affect millions of Americans. In 2007 alone, the crime affected 8.4 million people nationwide” Resolution Services Combat Workplace Productivity Loss Related to ID Theft Crime Market Wire, June, 2008
  18. 18. User Error costs Millions and it's our own fault
  19. 19. As much as 50 percent of the Tyler Medicaid fraud division's files were destroyed in July when a server being repaired by a state vendor wouldn't restart. In all, 81 criminal cases and eight months of work in the attorney general's 13-person Tyler Medicaid fraud office were lost. Medicaid data lost in computer crash, report says FROM STAFF AND WIRE REPORTS Friday, October 24, 2008
  20. 20. Palisade Systems Announces Consistent Trend of Data Loss By U.S. Organizations, Projecting 4,200,000 Violations Annually PR Newswire, August 19, 2008 Annual Violation July Projected Type Totals Totals Credit Card Number (PCI violations) 207 2,000 Social Security Number (GLBA violations) 1,214 63,128 Personal Health Information (HIPAA violations) 44,373 2,307,396 Personal Financial Information (GLBA violations 14,528 174,336
  21. 21. Technology is not bad The users lack of understanding technology is bad! Technology can NOT exist without the user! Until society is ready to take the time to learn and understand the dangers we cannot risk such vast use of technology that we currently utilize! Our finances. Our confidentiality. Even our LIVES are at risk!
  22. 22. More Looming Threats… Morals and Ethics of Information Technology
  23. 23. Entry Level Standards for Michigan Teachers Standard 7: Demonstrate knowledge of equitable, ethical, legal, social, physical, and psychological issues concerning use of information technology.
  24. 24. Who Is Responsible? TEACHERS STUDENTS
  25. 25. Teacher Roles In Technology Teachers have the power to do good with technology…BUT they must follow ETHICAL MORAL LEGAL STANDARDS
  26. 26. Teacher Roles In Technology Common Reasons for Improper Technology Use Irresponsibility Naivety Unawareness Lack of Knowledge and Actions
  27. 27. Example One– Irresponsibility “A Charlotte-Mecklenburg Schools teacher faces firing for posting derogatory comments about students on Facebook, while four others have been disciplined for posts involving ‘poor judgment and bad taste’” (Doss Helm, 2008)
  28. 28. Teacher Roles in Technology Poor Leadership  Disrespectful to Students  Inappropriate Behavior  Poor Role Modeling  Pictured above is the teacher in question
  29. 29. Teacher Roles in Technology Reader responses to the Charlotte teacher: “Issues of proper social networking behavior face our schools every day. Students (and teachers) need an effective curriculum that teaches expectations and protocol.” “I am completely shocked! I think it's everyone's right to social networking. However, as teachers, we have to know where and when to draw the line.” (Doss Helm, 2008)
  30. 30. Example Two—Inappropriate Actions “If there was any doubt about the power of blogs, consider the case of Michael Gee. A part-time journalism professor at Boston University, Gee was fired recently after he posted comments in a blog about the looks of a female student in his course.” (Roberts, 2005)
  31. 31. Teacher Roles in Technology Gee was guilty of: “Violating the trust essential to the student- teacher relationship." (Roberts, 2005)
  32. 32. Example Three– Naivety & Unawareness Jeffrey Spanierman, a teacher from Connecticut, created a MySpace page "to communicate with students about homework, to learn more about the students so he could relate to them better, and to conduct casual, non- school related discussions” BUT…
  33. 33. Teacher Roles in Technology One of his colleagues reported the page which contained nudity, inappropriate comments, and personal conversations with students RESULT: TERMINATION (Neuburger, 2008)
  34. 34. Legal Issues -- Is the school public or private? -- Are there state statutes that impose standards on the teacher, or obligations on the school with respect to teacher discipline? -- Did the conduct involve expression that may be protected by the First Amendment? -- Did the conduct have a connection to the school environment? (Neuburger, 2008)
  35. 35. Teacher Roles in Technology Word of Caution Anything you post on the Web can be potentially viewed
  36. 36. Teacher Roles in Technology Additional Concerns 1. Lack of clear expectations 2. Specific and purposeful guidelines 3. Rules and standards
  37. 37. Student Roles in Technology While Teachers Develop Expectations and Standards… Students Must Follow Through
  38. 38. Student Roles in Technology Common Reasons For Improper Technology Use: Cyber bullying Inappropriateness Misuse
  39. 39. Example One– Cyber Bullying -- Kylie Kenney, an 8th grader from Vermont -- Harassed with websites created by her classmates -- Threatened, degraded Kylie Kenney speaking with homophobic remarks out on Cyber Bullying and crude comments (“Stories of Cyber Bullying,” 2008)
  40. 40. Example Two– Inappropriateness --Two Penn State students mocked Virginia Tech's shooting victims on Facebook. -- Displayed photos of students dressed in costumes with VT t-shirts and fake gunshot wounds (Zywusko, 2008)
  41. 41. Example Three– Misuse -- Cut & paste plagiarism -- In 2001, A University of Virginia physics professor checked student papers for plagiarism using a homemade computer program -- 158 students were charged! (“Technology Sniffs Out Student Plagiarism, 2007)
  42. 42. Who Else Has A Role in Technology? Parents Schools Community
  43. 43. Closing Remarks
  44. 44. Closing Remarks In The Future… Additional Technology Concerns… Act with caution Accessibility Acknowledge possible Credibility threats The Unknown Be aware, alert and attentive
  45. 45. References Doss Helms, Ann . "Teachers Disciplined for Facebook Postings." Charlotte Observer 12 Nov. 2008. 20 Nov. 2008 <www.charlotteobserver.com>. Neuburger, Jeffrey. "Teacher Fired for Inappropriate Behavior on MySpace Page." Media Shift . 28 Nov. 2008 <http://www.pbs.org/mediashift/2008/10/teacher-fired-for-inappropriate-behavior-on-myspace- page289.html>. Roberts, Paul. "Journalism Teacher Fired For Lewd Blog Comments." E Week . 25 Nov. 2008 <http://www.eweek.com/c/a/Messaging-and-Collaboration/Journalism-Teacher-Fired-for-Lewd-Blog- Comments/>. "Stories of Cyber Bullying in the News, Schools, Myspace, Facebook." Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment. 30 Nov. 2008 <http://www.cyberbullyalert.com/blog/2008/10/stories-of-cyber-bullying/>. "Technology Sniffs Out Student Plagiarism, With Unsourced Copying On The Rise, New Software Programs Are Being Used To Combat Cut-And-Paste - CBS News." CBS News - Breaking News Headlines: Business, Entertainment & World News . 30 Nov. 2008 <http://www.cbsnews.com/stories/2007/03/17/tech/main2580771.shtml>. Zywusko, Ashley. "PSU students mock VT tragedy on Facebook - Midstate Buzz with PennLive.com." Read your favorite Central Pennsylvania blogs - PennLive.com. 30 Nov. 2008 <http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html>. Images Students--http://www.ocms.org.uk/images/students-at-computers.jpg Kylie Kenney--http://www.fightcrime.org/images/home_page/dc081706.gif Morals and Ethics--http://www.ldesign.com/KGLPhoto/Photos/OnEthics/OnEthics3/Graph.jpg Technology Saves--http://teaching.mrbelshaw.co.uk/wp-content/uploads/2007/02/cartoon-technology.gif Virginia Tech--http://blog.pennlive.com/midstatebuzz/2007/12/psu_students_mock_vt.html
  46. 46. References Kretkowski, P. (2007). ITSecurity. Retrieved November 29, 2008 from http://www.itsecurity.com/features/10-worst-virus-attacks-111207/ Microsoft Windows:Insecure by Design. (2003, August 24). The Washington Post, pp. F07 Retrieved November 29, 2008 from http://soundingcircle.com/newslog2.php/__show_article/_a000195-000451.htm Ryan, (2008). Cybernet Retrieved November 29, 2008 from http://cybernetnews.com/2008/01/10/os-browser-market-share-history/ Windows XP Security Checklist. (2006). Retrieved November 29, 2008 from http://labmice.techtarget.com/articles/winxpsecuritychecklist.htm Images Matrix Background - http://www.overclock.net/other-software/114179-finally-matrix-screensaver-rocks.html Market Share - http://cybernetnews.com/2008/01/10/os-browser-market-share-history/ Threats - http://craigchamberlain.dreamhosters.com/malware/Skoudis%20-%20Infosec%27s%20Worst%20

×