1 / 9

Acceptable Use Policy

Acceptable Use Policy The Acceptable Use Policy defines the rules of the machine and internet connection you are on. Specific policies differ by machine owner. Most companies and universities require some form to be signed stating that the machines will be used acceptably.

adamdaniel
Télécharger la présentation

Acceptable Use Policy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Acceptable Use Policy • The Acceptable Use Policy defines the rules of the machine and internet connection you are on. • Specific policies differ by machine owner. • Most companies and universities require some form to be signed stating that the machines will be used acceptably. • Most service providers require some acknowledgment that you are aware of and will abide by a set of rules. • They typically require that you will not run your own business, violate copyrights, perform illegal or harassing activities, or view pornographic material.

  2. Internet Privacy • There is no privacy on the Internet – yet. • Passwords - The basic defensive measure. • Hackers use machines to rapidly try combinations of passwords. • Phishing attacks attempt to fool you into giving away your password or other account information. • Use more than 6 characters and special characters (!@#$%) to increase combinations possible. • Protecting Files • Access to files is typically given to user, group, and world. More complex schemes can be incorporated within software. • Keep truly sensitive files disconnected from the internet. • Firewalls • Attempts to control your machines access to the internet • Attempts to block unwanted access to your machine

  3. Internet Attacks, General • All software must be executed or run before it can do anything • How does the software get on your machine? • Through an infected file. • By downloading unsafe software deliberately designed to contain the harmful software. • Email attachments. • HTML links running scripts. • Placed there by software. • Placed there by hackers. • Protection • Virus scanning software with constant updates. • Firewall to limit access to your machine. • Good policies: • Don’t automatically open email • Don’t use program until scanned • Update scanner frequently (to get the latest viruses)

  4. Internet Attacks, Viruses • Viruses • Act like biological viruses in that they attach themselves to a host program or email. • Viruses cannot infect the machine until the host is executed. • Viruses propagate by moving the infected file from one machine to another. • Can be harmless or very harmful • Tend to affect MS products as MS is so popular.

  5. Internet Attacks • Trojan Horses • Are embedded within useful software. • Performs a secondary function while the software is in operation. • Worms • Standalone software that propagates through the internet • Tries to find a host machine on which to run without the owners knowledge.

  6. Internet Attacks • Email Attacks • These viruses, etc, use the email system to propagate. • They all need your help – be careful opening attachments. • They use your address book to forward themselves to others. • Denial of Service Attacks • Floods a server with requests using multiple “robots” on multiple machines. • Currently popular form of attack • Robots can be set up over time and instructed to “attack” at once. • Protection is very difficult right now – multiple servers.

  7. Hoaxes and Scams • Hoaxes and scams use human gullibility to achieve their aims. • Hoaxes • Designed to use up internet resources (bandwidth and your time) • Hoaxes use humans to propagate. • Recognizing them: • “Send this to everyone you know!” is a big tip off. • Typically has good sounding jargon that is really meaningless. • Typically references some authority (often non-existent) • What to do? • If suspicious, don’t send it out. • Check with web sites like http://hoaxbusters.ciac.org

  8. Hoaxes and Scams • Scams • Designed to separate you from your money • May try to get information from you (passwords, account numbers). • Online auctions – caveat emptor! • Recognizing them: • Unwanted solicitation • Request for instant cash (credit card # or faxing a check) • No real way to get in touch with a human (street address, phone) • What to do? • Be suspicious! Ignore un-asked for solicitations. • Check with web sites like http://www.scambusters.com • Online Auctions • Caveat Emptor: check out the seller’s history.

  9. Internet Privacy • Identity Theft occurs when somebody uses your personal identification to obtain loans and services (ref http://www.identitytheft.org and www.privacyrights.org) • Protection (before) • Do not keep personal information on a web-accessible machine • Do not transmit personal information unless from an encrypted web site ( https:// ) • Read through a companies security/privacy policies to be sure. • Protection (after) • Contact all known sources of credit • Obtain a record of your credit status • Consider changing SSN and driver license

More Related