Web Monitoring & Content Filtering



Similar documents
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

DIOCESE OF DALLAS. Computer Internet Policy

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Acceptable Use Policy ("AUP")

BOBCAT COMPUTING POLICY

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

Acceptable Use Policy

Acceptable Use and Publishing Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

RIVERVIEW SCHOOL DISTRICT

COMPUTER, NETWORK AND INTERNET USE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY

ACCEPTABLE USE POLICY

Acceptable Use Policy

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

BOARD OF EDUCATION Cherry Hill, New Jersey

RAMPART HOSTING, LLC ACCEPTABLE USE POLICY ("AUP")

THE SCHOOL DISTRICT OF PHILADELPHIA

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

Sample Employee Network and Internet Usage and Monitoring Policy

Service Protection Under The Provider's Acceptable Use Policy

section 15 Computers, , Internet, and Communications

North Clackamas School District 12

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

MINNETONKA PUBLIC SCHOOLS

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

Code of Virginia, 1950, as amended, Sections , :1, , , and

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT , INTERNET AND COMPUTER USE

TECHNOLOGY USAGE POLICY

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February Purpose.

CT Communications Internet Handbook

Bedford Public Library Acceptable Public Access Computer and Wireless Use Policy

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

How To Use The Blog Safely And Responsibly

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND USAGE POLICY

Acceptable Use of Computing and Information Technology Resources

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Internet Acceptable Use Policy

Highwinds Media Group, Inc. - Terms of Service Wholesale Account

Online Communication Services - TAFE NSW Code of Expected User Behaviour

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

The Top Ten Of Public Computers And Their Perpetuation

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Dauphin County Technical School

Nondiscrimination. 1 of 10

region16.net Acceptable Use Policy ( AUP )

Electronic Communications System

Acceptable Use Policy

BOARD OF EDUCATION POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

Broadband Acceptable Use Policy

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy

Sample Policies for Internet Use, and Computer Screensavers

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Cablelynx Acceptable Use Policy

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

INTERNET ACCEPTABLE USE POLICY

Acceptable Use Policy

13. Acceptable Use Policy

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

I. PERSONAL RESPONSIBILITY

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

SOUTH DAKOTA BOARD OF REGENTS. Policy Manual

How To Deal With Social Media At Larks Hill J & I School

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

JHSPH Acceptable Use Policy

Acceptable Use of Electronic Networked Resources & Internet Safety

Delaware State University Policy

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Acceptable Use Policy Holy Spirit Catholic School

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

PERSONNEL - Certified and Noncertified

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.

Revelstoke Board of Education Policy Manual

Westwood Baptist Church Computer use Policy

How To Monitor The Internet In Idaho

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY

Commonwealth Office of Technology

How To Behave At A School

Information Technology Acceptable Use Policy

Acceptable use policy DEECD Information, Communications and Technology (ICT) Resources. Effective March 2011

STUDENTS Children s Internet Protection Act, Pub. Law , codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250

E-Safety and Acceptable Use Policy

Student & Staff Access and Use of Networked Information Resources and Communications

CENTRAL CAMBRIA SCHOOL DISTRICT

Transcription:

Web Monitoring & Content Filtering IA340 Introduction to IA Supplementary Notes for CSH6 Chapter 31 M. E. Kabay, PhD, CISSP-ISSMP Prof of Computer Information Systems School of Business & Management, Norwich University mailto:mkabay@norwich.edu V: 802.479.7937 1 Copyright 2015 M. E. Kabay. All rights reserved.

Objectives This set of notes supplements CSH6 Chapter 31 However, the materials do not correspond to the structure of the chapter Much of this slide deck is devoted to exploring the functional requirements and difficulties of schools and public libraries There are detailed notes for some of the slides you can use the NOTES format to view them with the slides 2 Copyright 2015 M. E. Kabay. All rights reserved.

Topics Case Study: Schools and Public Libraries Corporations Filtering Technology Management Alternatives 3 Copyright 2015 M. E. Kabay. All rights reserved.

Case Study: Schools and Public Libraries Problems on the Internet Responsibilities to Stakeholders Legal Context Political context: conflicting pressures 4 Copyright 2015 M. E. Kabay. All rights reserved.

Problems on the Internet Pedophiles Hate groups Pornography Plagiarism Stolen music & video Warez Viruses Criminal hackers Games 5 Copyright 2015 M. E. Kabay. All rights reserved.

Pedophiles Misrepresentation as youngsters Chat rooms E-mail Video films Bus/Airline tickets -- meetings 6 Copyright 2015 M. E. Kabay. All rights reserved.

Hate Groups Growing movements across world Anti-everything racist anti-catholic, anti-jewish, anti-.... homophobic Recruiting young people through Web hate-rock propaganda 7 Copyright 2015 M. E. Kabay. All rights reserved.

Pornography Widespread massive amount of content Misleading URLs trademark violations, variant domains http://www.whitehouse.com (still active) misspellings http://www.micosoft.com (no longer active) Junk e-mail invitations e.g., new CompuServe accounts receive invitation for Russian porn from St Petersburg 8 Copyright 2015 M. E. Kabay. All rights reserved.

Plagiarism Buy / trade copies of essays, term papers wide range of subjects, styles choose your preferred grade (A+, B-...) Write-to-order graduate students Anti-plagiarism sites available for teachers check student paper against database of stolen papers 9 Copyright 2015 M. E. Kabay. All rights reserved.

Stolen Music & Video Napster, MP3, Gnutella, Wrapster.... trading copies of music most without permission copyright violations lawsuits against companies & individuals Gnutella, Wrapster extending trades to other files Problems bandwidth saturation many colleges legal liability 10 Copyright 2015 M. E. Kabay. All rights reserved.

Warez Stolen software violation of copyright law often virus-infected many Trojan Horse programs Sites warez exchanges individual exchanges electronic auction services Severe penalties for school systems Los Angeles: $5M fines 11 Copyright 2015 M. E. Kabay. All rights reserved.

Malware Self-replicating code program infectors boot-sector viruses Internet-enabled worms Non-replicating code: Trojan Horse programs Sources accident deliberate infection virus-exchange sites Damaging availability, integrity, confidentiality 12 Copyright 2015 M. E. Kabay. All rights reserved.

Criminal Hackers Propaganda USENET groups Web sites printed magazines regular meetings (2600) Appeals to kids group affiliation rebellion power video-game syndrome 13 Copyright 2015 M. E. Kabay. All rights reserved.

(Hacker sites) 14 Copyright 2015 M. E. Kabay. All rights reserved.

(Hacker sites) 15 Copyright 2015 M. E. Kabay. All rights reserved.

Games Cooperative multiplayer games Quake Doom Gambling More a nuisance than a danger high bandwidth utilization 16 Copyright 2015 M. E. Kabay. All rights reserved.

Responsibilities to Stakeholders Schools Provide access to information Protect children against abuse Respect wishes of parents Comply with educational standards Libraries Provide access to information Comply with legal requirements against illegal materials Avoid violating 1 st Amendment 17 Copyright 2015 M. E. Kabay. All rights reserved.

Corporations Private industry can regulate use of corporate assets Key issue is policy awareness Policy must be clear and unambiguous All employees must know and understand the policies on appropriate use Policies compliance must be monitored and enforced consistently Failure to protect employees against exposure to offensive materials may be grounds for tort: hostile work environment 18 Copyright 2015 M. E. Kabay. All rights reserved.

Costs of Inappropriate Use of Internet Access Massive costs Some cases where 20-40% of user time spent misusing Internet access Gross waste of resources and wages Demoralizes hard-working staff Decreases respect for lax management Increases petty violations of other policies and rules (e.g., theft of supplies) 19 Copyright 2015 M. E. Kabay. All rights reserved.

Technology Monitoring tools for reviewing what users are doing on the Net Filtering tools for limiting what users are doing on the Net 20 Copyright 2015 M. E. Kabay. All rights reserved.

Monitoring 21 Copyright 2015 M. E. Kabay. All rights reserved.

Monitoring 22 Copyright 2015 M. E. Kabay. All rights reserved.

Monitoring 23 Copyright 2015 M. E. Kabay. All rights reserved.

Monitoring 24 Copyright 2015 M. E. Kabay. All rights reserved.

Monitoring 25 Copyright 2015 M. E. Kabay. All rights reserved.

Monitoring Audit trails disk files browser URL trail browser disk cache anti-virus products anti-game software anti-mp3-music software Real-time alerts Web page suspect e-mail content Human inspection remote-access software supervising by walking around 26 Copyright 2015 M. E. Kabay. All rights reserved.

Filtering Anti-virus products Firewalls Self-rating & filtering proposals Censorware 27 Copyright 2015 M. E. Kabay. All rights reserved.

Firewalls Corporate Can block access to specific types of traffic E.g., P2P file/music/video sharing Often integrates antivirus capabilities Workstation firewalls Zone-Alarm BlackIce Norton McAfee 28 Copyright 2015 M. E. Kabay. All rights reserved.

Self-rating & Filtering Proposals ICRA Internet Content Rating Association RSACi system already works with common browsers PICS Platform for Internet Content Selection Fundamental question: Why would objectionable sites rate themselves at all? 29 Copyright 2015 M. E. Kabay. All rights reserved.

RSACi Standards 30 Copyright 2015 M. E. Kabay. All rights reserved.

Censorware Types Site-specific exclusion lists of forbidden sites updated often Content recognition Problems lists of forbidden terms nudity-recognition algorithms very high false-positive rates (rejecting sites unrelated to targets) political bias (rejecting educational sites whose philosophy the makers reject) 31 Copyright 2015 M. E. Kabay. All rights reserved.

Censorware 32 Copyright 2015 M. E. Kabay. All rights reserved.

Censorware 33 Copyright 2015 M. E. Kabay. All rights reserved.

Censorware 34 Copyright 2015 M. E. Kabay. All rights reserved.

Legal Context: Disclaimer I am not a lawyer and this is not legal advice. For legal advice, consult an attorney with expertise in the area of law of concern to you who is licensed to practice law in your jurisdiction. 35 Copyright 2015 M. E. Kabay. All rights reserved.

Legal Context: First Amendment Law (USA ONLY) Complex area much subtle reasoning Ultra-simple summary: Who cannot censor speech? governments acting against others as sovereign to control unprotected speech governments acting against protected speech Who can censor speech? governments controlling their own speech or that of their agents within limits, anyone else dealing with private speech on their own property 36 Copyright 2015 M. E. Kabay. All rights reserved.

Legal Context (cont d) How do we decide if restrictions are constitutional or unconstitutional? Determine capacity in which government is acting Determine degree of protection of specific speech 37 Copyright 2015 M. E. Kabay. All rights reserved.

Determine Capacity Sovereign least power to regulate speech Employer can regulate speech Proprietor can regulate K-12 educator broad but not unlimited power University educator less discretion to control Speaker complete power to control speech Subsidizer complete power 38 Copyright 2015 M. E. Kabay. All rights reserved.

Determine Protection Constitutionally valueless speech deliberate or reckless falsehoods obscenity (difficult issue) child pornography incitement to lawless conduct threats criminal solicitation or conspiracy Intermediate protection commercial advertising that is not false or misleading sexually explicit but not obscene speech 39 Copyright 2015 M. E. Kabay. All rights reserved.

Obscenity & Indecency Obscenity Average person Community standards Patently offensive Prurient interests Lacking in serious value Not protected by 1 st Amendment Indecency Primarily regulated for children Protected by 1 st Amendment Literary Artistic Political Scientific Child porn felony Making Transmitting Storing 40 Copyright 2015 M. E. Kabay. All rights reserved.

Determine Protection (cont d) Fully-protected: all other speech political, social, religious, philosophical, scientific art, literature, music, poetry jokes, gossip, entertainment, casual chat 41 Copyright 2015 M. E. Kabay. All rights reserved.

Political Context: Conflicting Pressures For filtering concerned parents right-wing religious fundamentalists Against filtering concerned parents libertarians civil liberties advocates privacy activists 42 Copyright 2015 M. E. Kabay. All rights reserved.

Pro-Filtering 43 Copyright 2015 M. E. Kabay. All rights reserved.

Anti-Filtering 44 Copyright 2015 M. E. Kabay. All rights reserved.

Recommendations: Schools & Libraries Define standards of acceptable use for children, students, teachers and staff important issue is the discussion safeguard children against harm respect other people 45 Copyright 2015 M. E. Kabay. All rights reserved.

Recommendations (cont d) School/Library Internet oversight group include all concerned students parents teachers staff explicitly discuss each issue protecting children against bad people protecting others against children intellectual property rights training in critical thinking 46 Copyright 2015 M. E. Kabay. All rights reserved.

Recommendations (cont d) Provide educational resources for all concerned acceptable-use guidelines limited expectation of privacy pamphlets URLs 47 Copyright 2015 M. E. Kabay. All rights reserved.

Recommendations (cont d) At home, in libraries and schools Use supervision-by-walking-around Install monitoring software, not blocking software Discuss infractions with all concerned parents, students, staff, teachers 48 Copyright 2015 M. E. Kabay. All rights reserved.

DISCUSSION 49 Copyright 2015 M. E. Kabay. All rights reserved.