Upload
christopher-lisasi
View
61
Download
0
Embed Size (px)
Citation preview
ADVANCED NETWORKS PRESENTATION Cedric Kehi – Social Impact on Networks Joshua Bell - Environmental & Health Effects of
Network Solutions Robel Teferi – Privacy & the Abuse of Personal Data Karl Sene – Ethical Issues on Open/Closed Networks Chris Lisasi – Security & Crime
SOCIAL IMPACTS OF NETWORKS Transform the world environment Introduced New technology
SOCIAL IMPACT OF NETWORKS IN THE INDUSTRY(BANKS)
SOCIAL IMPACT OF NETWORKS IN THE INDUSTRY(EDUCATION PLATFORMS)
SOCIAL IMPACT OF NETWORKS ON SOCIAL MEDIA
ENVIRONMENTAL AND HEALTH EFFECTS OF NETWORK SOLUTIONS
By Joshua Bell
HOW DO NETWORKS AFFECT THE ENVIRONMENT AND OUR HEALTH
Power consumption is a costly issue which represents a huge impact to the environment and business.
Wireless network frequencies are known to affect the habitat, causing the disorientation of birds and causing their migration patterns to change dramatically.
With the growing presence of social networks it’s unsurprising that claims have been made which indicate it could be affecting our health for example: it can be addictive, cause anti-social behaviour and is known to attribute to diabetes and actual health issues.
POSITIVE USES FOR NETWORKING SOLUTIONS Networks aren’t all bad for example :
They are used to monitor the environment and local habitats in order to detect minor/ dramatic changes which on account of climate change, due to the worlds excessive power and population requirements.
Networks make our lives easier, more organised and manageable, they keep people connected and support interconnected team operations.
Networking solutions are established everywhere and have greatly improved national security through many means, such as behavioural analysis, automated security systems and .
CONCLUSION Networks can be used in ways that dramatically effect the
environment and the health of individual users. Although its affects are the same as any technology, the main contributor to environmental degradation is the power requirements and the material waste that is created because of it.
In conclusion I can say that networks aren’t the main contributing factor when discussing environmental damage although the waste created once the hardware is replaced is an unresolved factor.
PRIVACY AND THE ABUSE OF PERSONAL DATA
Robel Teferi
WHAT IS PERSONAL INFORMATION ?Any kind of information that can identify an individual
• Name• Address, ID • DOB• Finger prints• Computer IP address• CCTV footage• Health records• Etc..
Why is Privacy so important?
• Privacy can affect many aspects of an individual’s life from commerce to healthcare to work or recreation.
• Examples: Consumer privacy, medical and health care privacy, employee and workplace privacy and so forth.
TECHNOLOGY AND PRIVACY: GATHERING PERSONAL DATA
Smart phones and tablets capability of audio-visual recording Sensors for location data and near field communication Collection of data using online interaction with applications(Facebook, twitter,
Instagram…) Internet cookies
Sophisticated devices support rich data collection,
CCTV cameras Google Street view
make used of our cameras, satellite and GPS software’s to record and gather information (fined euro 100,000 by France)
TECHNOLOGY VS PRIVACY: CONSIDERATION Amount of personal information that can be
collected personal information
Speed at which persona information can be transmitted can be transferred in milliseconds
Duration of time that the information can be retained data can be stored forever
Kind of information that can be acquired and exchanged Purchases made and other information.
PRIVACY THREATS AND ABUSE Cyber Crimes:
Identity theft Spam, phishing and malware
GPS eased location tracking individuals and other agencies easily track individuals movement.
Data is sold for big companies for sales and marketing purposes Data mining (Used to find individual record of interest)
Hackers may steal and abuse personal data credit cards, medical data, login..
PRIVACY AND DATA PROTECTION Imposing strong data protection practices with effective
legislation Data Protection Act
Principles => Fair and lawful, purpose, adequacy, accuracy, retention and right
Encryption Imposing Penalties Increase awareness
Protecting sensitive data Risks of personal data
ETHICAL ISSUES IN AN OPEN /CLOSED NETWORK
What are we going to talk about during this section:
• Ethical Issues on Open Network • Ethical Issues on Closed Network
•Advantages •Disadvantages •Which is better depending on its purpose
ETHICAL ISSUES ON CLOSED NETWORK
•Copyright ?
•E-mail?
•What will be allowed on the Network ?
•Privacy? What Extent?
•Access? Who? What? Where?
•Data Sharing? Who can Share?
•Taking & Sharing ? Who and What Can Share Information ?
•Knowing & Destroying ? Who can do what?
ETHICAL ISSUES ON OPEN NETWORK
•Copyright ?
•E-mail?
•What will be allowed on the Network ?
•Privacy? What Extent?
•Access? Who? What? Where?
•Data Sharing? Who can Share?
•Taking & Sharing ? Who and What Can Share Information ?
•Knowing & Destroying ? Who can do what?
REFERENCING
•Shinder, D. (2005) Ethical issues for IT security professionals. Available at: http://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-professionals.html (Accessed: 15 April 2016).•2015 (2000) Ethical issues in electronic information systems. Available at: http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html (Accessed: 15 April 2016).
SECURITY AND CRIME
N3275466- Chris Lisasi SCHOOL OF COMPUTING
Advance Network [2015-2016] 12/03/2016
WHAT IS CYBERCRIME? Is a crime committed using a computer and internet to
steal a person identity or illegal imports or malicious programs . Online activities are just as vulnerable to crime and can compromise personal safety just as affectivity as common everyday crimes, lawmakers, law enforcement and individuals need to know how to protect themselves and the persons for which they are responsible. The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment ,business ,sport or education. Cyber crime – illegal.Cyber securityInvolves protection of sensitive personal & business information through prevention, detection and response to different online attacksProtects from attacks by detecting and preventing
REASONS FOR CYBER CRIME Capacity to store data in comparatively small space Easy to access Loss of evidence, Negligence Theft use illegally copying genuine programs. MOTIVATION Espionage Money extortion /theft Mischief Phishing example
SAFETY TIPS FOR CYBER CRIME Use of antivirus software Insert firewalls Uninstall unnecessary software Stay anonymous Never give your full name or address to strangers Learn more about internet privacy Be careful to illegal import Maintain backup Check security settings. Open attachments carefully Use spam filters, delete spam immediately Disable file sharing ,turnoff internet when not in use Use strong passwords, don’t give personal information unless
required (not even phone number)
TYPES OF CYBER CRIME Hacking Computer vandalism DoS attack Virus Dissemination Software Piracy Net extortion Phishing Spoofing DENIAL OF SERVICE ATTACKS: Is the act by criminals
who floods the bandwidth of the victims network of fills his E-mail box with spam mail
VIRUS DISSMINITION: malicious sofwares
ADVANTAGES OF CYBER SECURITY It establish rules and measure to use against attacks defend us from critical attacks,brownse the safe website. It helps us to browse the safe website. Internet security process all the incoming and outgoing data on our
computer. THE CHALLENGES Cyber security explosion of computer and broadband internet availability Low priority of security for software developers. Challenge of timely patching vulnerabilities on all systems.Identity theft Identity theft happens when fraudsters access enough information about
someone’s identity (such as their name, date of birth, current or previous addresses) to commit identity fraud. Identity theft can take place whether the fraud victim is alive or deceased.
If you’re a victim of identity theft, it can lead to fraud that can have a direct impact on your personal finances and could also make it difficult for you to obtain loans, credit cards or a mortgage until the matter is resolved.
CONCLUSION
Capacity of human mind is unfathomable. Elimination of cyber crime is impossible in cyber space. The main possible step is creating awareness in its duties and rights. I would like to conclude with a word of caution for the prolegislation school that provisions of cyber law are not made. Protect your information at home and at work.
Treat your password like you treat your toothbrush. Never give it to anyone else to use, and charge it every few months.
The only system which is truly secure is one which is switched off and unplugged.
Only way to be safe is to pay attention and act smart.