26
ADVANCED NETWORKS PRESENTATION Cedric Kehi – Social Impact on Networks Joshua Bell - Environmental & Health Effects of Network Solutions Robel Teferi – Privacy & the Abuse of Personal Data Karl Sene – Ethical Issues on Open/Closed Networks Chris Lisasi – Security & Crime

N3275466 - Final Presentation Advance network (1)

Embed Size (px)

Citation preview

Page 1: N3275466 - Final Presentation  Advance network (1)

ADVANCED NETWORKS PRESENTATION Cedric Kehi – Social Impact on Networks Joshua Bell - Environmental & Health Effects of

Network Solutions Robel Teferi – Privacy & the Abuse of Personal Data Karl Sene – Ethical Issues on Open/Closed Networks Chris Lisasi – Security & Crime

Page 2: N3275466 - Final Presentation  Advance network (1)

SOCIAL IMPACTS OF NETWORKS Transform the world environment Introduced New technology

Page 3: N3275466 - Final Presentation  Advance network (1)

SOCIAL IMPACT OF NETWORKS IN THE INDUSTRY(BANKS)

Page 4: N3275466 - Final Presentation  Advance network (1)

SOCIAL IMPACT OF NETWORKS IN THE INDUSTRY(EDUCATION PLATFORMS)

Page 5: N3275466 - Final Presentation  Advance network (1)

SOCIAL IMPACT OF NETWORKS ON SOCIAL MEDIA

Page 6: N3275466 - Final Presentation  Advance network (1)

ENVIRONMENTAL AND HEALTH EFFECTS OF NETWORK SOLUTIONS

By Joshua Bell

Page 7: N3275466 - Final Presentation  Advance network (1)

HOW DO NETWORKS AFFECT THE ENVIRONMENT AND OUR HEALTH

Power consumption is a costly issue which represents a huge impact to the environment and business.

Wireless network frequencies are known to affect the habitat, causing the disorientation of birds and causing their migration patterns to change dramatically.

With the growing presence of social networks it’s unsurprising that claims have been made which indicate it could be affecting our health for example: it can be addictive, cause anti-social behaviour and is known to attribute to diabetes and actual health issues.

Page 8: N3275466 - Final Presentation  Advance network (1)

POSITIVE USES FOR NETWORKING SOLUTIONS Networks aren’t all bad for example :

They are used to monitor the environment and local habitats in order to detect minor/ dramatic changes which on account of climate change, due to the worlds excessive power and population requirements.

Networks make our lives easier, more organised and manageable, they keep people connected and support interconnected team operations.

Networking solutions are established everywhere and have greatly improved national security through many means, such as behavioural analysis, automated security systems and .

Page 9: N3275466 - Final Presentation  Advance network (1)

CONCLUSION Networks can be used in ways that dramatically effect the

environment and the health of individual users. Although its affects are the same as any technology, the main contributor to environmental degradation is the power requirements and the material waste that is created because of it.

In conclusion I can say that networks aren’t the main contributing factor when discussing environmental damage although the waste created once the hardware is replaced is an unresolved factor.

Page 10: N3275466 - Final Presentation  Advance network (1)

PRIVACY AND THE ABUSE OF PERSONAL DATA

Robel Teferi

Page 11: N3275466 - Final Presentation  Advance network (1)

WHAT IS PERSONAL INFORMATION ?Any kind of information that can identify an individual

• Name• Address, ID • DOB• Finger prints• Computer IP address• CCTV footage• Health records• Etc..

Why is Privacy so important?

• Privacy can affect many aspects of an individual’s life from commerce to healthcare to work or recreation.

• Examples: Consumer privacy, medical and health care privacy, employee and workplace privacy and so forth.

Page 12: N3275466 - Final Presentation  Advance network (1)

TECHNOLOGY AND PRIVACY: GATHERING PERSONAL DATA

Smart phones and tablets capability of audio-visual recording Sensors for location data and near field communication Collection of data using online interaction with applications(Facebook, twitter,

Instagram…) Internet cookies

Sophisticated devices support rich data collection,

CCTV cameras Google Street view

make used of our cameras, satellite and GPS software’s to record and gather information (fined euro 100,000 by France)

Page 13: N3275466 - Final Presentation  Advance network (1)

TECHNOLOGY VS PRIVACY: CONSIDERATION Amount of personal information that can be

collected personal information

Speed at which persona information can be transmitted can be transferred in milliseconds

Duration of time that the information can be retained data can be stored forever

Kind of information that can be acquired and exchanged Purchases made and other information.

Page 14: N3275466 - Final Presentation  Advance network (1)

PRIVACY THREATS AND ABUSE Cyber Crimes:

Identity theft Spam, phishing and malware

GPS eased location tracking individuals and other agencies easily track individuals movement.

Data is sold for big companies for sales and marketing purposes Data mining (Used to find individual record of interest)

Hackers may steal and abuse personal data credit cards, medical data, login..

Page 15: N3275466 - Final Presentation  Advance network (1)

PRIVACY AND DATA PROTECTION Imposing strong data protection practices with effective

legislation Data Protection Act

Principles => Fair and lawful, purpose, adequacy, accuracy, retention and right

Encryption Imposing Penalties Increase awareness

Protecting sensitive data Risks of personal data

Page 16: N3275466 - Final Presentation  Advance network (1)

ETHICAL ISSUES IN AN OPEN /CLOSED NETWORK

What are we going to talk about during this section:

• Ethical Issues on Open Network • Ethical Issues on Closed Network

•Advantages •Disadvantages •Which is better depending on its purpose

Page 17: N3275466 - Final Presentation  Advance network (1)

ETHICAL ISSUES ON CLOSED NETWORK

•Copyright ?

•E-mail?

•What will be allowed on the Network ?

•Privacy? What Extent?

•Access? Who? What? Where?

•Data Sharing? Who can Share?

•Taking & Sharing ? Who and What Can Share Information ?

•Knowing & Destroying ? Who can do what?

Page 18: N3275466 - Final Presentation  Advance network (1)

ETHICAL ISSUES ON OPEN NETWORK

•Copyright ?

•E-mail?

•What will be allowed on the Network ?

•Privacy? What Extent?

•Access? Who? What? Where?

•Data Sharing? Who can Share?

•Taking & Sharing ? Who and What Can Share Information ?

•Knowing & Destroying ? Who can do what?

Page 19: N3275466 - Final Presentation  Advance network (1)

REFERENCING

•Shinder, D. (2005) Ethical issues for IT security professionals. Available at: http://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-professionals.html (Accessed: 15 April 2016).•2015 (2000) Ethical issues in electronic information systems. Available at: http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html (Accessed: 15 April 2016).

Page 20: N3275466 - Final Presentation  Advance network (1)

SECURITY AND CRIME

N3275466- Chris Lisasi SCHOOL OF COMPUTING

Advance Network [2015-2016] 12/03/2016

Page 21: N3275466 - Final Presentation  Advance network (1)

WHAT IS CYBERCRIME? Is a crime committed using a computer and internet to

steal a person identity or illegal imports or malicious programs . Online activities are just as vulnerable to crime and can compromise personal safety just as affectivity as common everyday crimes, lawmakers, law enforcement and individuals need to know how to protect themselves and the persons for which they are responsible. The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment ,business ,sport or education. Cyber crime – illegal.Cyber securityInvolves protection of sensitive personal & business information through prevention, detection and response to different online attacksProtects from attacks by detecting and preventing

Page 22: N3275466 - Final Presentation  Advance network (1)

REASONS FOR CYBER CRIME Capacity to store data in comparatively small space Easy to access Loss of evidence, Negligence Theft use illegally copying genuine programs. MOTIVATION Espionage Money extortion /theft Mischief Phishing example

Page 23: N3275466 - Final Presentation  Advance network (1)

SAFETY TIPS FOR CYBER CRIME Use of antivirus software Insert firewalls Uninstall unnecessary software Stay anonymous Never give your full name or address to strangers Learn more about internet privacy Be careful to illegal import Maintain backup Check security settings. Open attachments carefully Use spam filters, delete spam immediately Disable file sharing ,turnoff internet when not in use Use strong passwords, don’t give personal information unless

required (not even phone number)

Page 24: N3275466 - Final Presentation  Advance network (1)

TYPES OF CYBER CRIME Hacking Computer vandalism DoS attack Virus Dissemination Software Piracy Net extortion Phishing Spoofing DENIAL OF SERVICE ATTACKS: Is the act by criminals

who floods the bandwidth of the victims network of fills his E-mail box with spam mail

VIRUS DISSMINITION: malicious sofwares

Page 25: N3275466 - Final Presentation  Advance network (1)

ADVANTAGES OF CYBER SECURITY It establish rules and measure to use against attacks defend us from critical attacks,brownse the safe website. It helps us to browse the safe website. Internet security process all the incoming and outgoing data on our

computer. THE CHALLENGES Cyber security explosion of computer and broadband internet availability Low priority of security for software developers. Challenge of timely patching vulnerabilities on all systems.Identity theft Identity theft happens when fraudsters access enough information about

someone’s identity (such as their name, date of birth, current or previous addresses) to commit identity fraud. Identity theft can take place whether the fraud victim is alive or deceased.

If you’re a victim of identity theft, it can lead to fraud that can have a direct impact on your personal finances and could also make it difficult for you to obtain loans, credit cards or a mortgage until the matter is resolved.

Page 26: N3275466 - Final Presentation  Advance network (1)

CONCLUSION

Capacity of human mind is unfathomable. Elimination of cyber crime is impossible in cyber space. The main possible step is creating awareness in its duties and rights. I would like to conclude with a word of caution for the prolegislation school that provisions of cyber law are not made. Protect your information at home and at work.

Treat your password like you treat your toothbrush. Never give it to anyone else to use, and charge it every few months.

The only system which is truly secure is one which is switched off and unplugged.

Only way to be safe is to pay attention and act smart.