Académique Documents
Professionnel Documents
Culture Documents
Lab 1 Policies/Auditing/Privacy
Policies
Review the Eastern Florida State College Technical/Internet Ethics &
Acceptable Use Policy at this link
(http://www.easternflorida.edu/administration-departments/it/internet-ethicsand-use-policy.cfm). Specifically the Policy Monitoring and Passwords
section:
a. Does EFSC guarantee privacy when utilizing their systems? Explain.
No EFSC does not guarantee privacy when using email or Internet
communications
b. Does the policy explain if any form of filtering is done on the EFSC
network? The policy doesnt mention any form of filtering in it.
c. Is the use of the system a right or a privilege? The use of the system is
a privilege, because if you violate the terms of use they reserve the
right to revoke access to the system.
d. How does this policy protect EFSC? EFSC is not responsible for the
actions of the user.
Auditing
Research and explain how an organization can audit access to a specific
folder in a Windows Active Directory environment. The name of the folder
and the server are not relevant. Provide an overview of how this is done. I
do not need commands or screen shots or step by step instructions. Hint: It
takes several steps. This is done through Group Policy you can go and set
local policy.
Privacy - Cookies
Review this article: http://kb.wisc.edu/page.php?id=936 and answer the
following questions
a. How can cookies affect your privacy when you browse the internet?
When you visit some sites, the server gives you a cookie that acts as
your id card. Upon each return visit to that site, your browser passes
that cookie back to the server. In this way, a Web server can gather
information about which Web pages are viewed the most, and which
pages you going back to the most.
b. Clear the cookies on your PC. Access a site of one site of your
choosing. Provide the following information:
Lab 1 CTSC 2120 Summer 2015 r1.0
1
i. Site visited:reddit.com
ii. Number of cookies dropped: 68
c. Open one of the cookies using notepad or a text editor and comment
on what you discover. That a cookie holds a lot more info about my
browser than I realized.
d. Explain any possible security issues with cookies. If you packet sniff
you can intercepts traffic between a computer and the Internet and
use a log in cookie you can use it to simulate the same session
elsewhere by manually setting the cookie.
Privacy - Browser
1. What is the name and version of browser that you are using? Google Chrome
Version 47.0.2526.111 m
2. Describe three settings which enhance the protection of your browser.
To make the necessary changes in the Content settings window, you will need to
scroll down in order to access the other options.
1. If you want to restrict cookies from being stored on your browser and using
the collected information about your browsing habits, use the available
options. Another option in that area is to disable JavaScript, a vulnerability
issue exploited by hackers over the years.
2. You can control the behavior of your browser plug-ins, you can block pop-ups
from disturbing your browsing session and you can stop a website from
tracking your physical location.
3. If you continue scrolling down to the bottom of the Content settings window,
you will find the option to block websites from using a plug-in to access your
computer.
3. Newer browsers offer private browser capability. Research and explain how
this function works.
Private browsing is a privacy feature in some web browsers to disable
browsing history and the web cache. This allows a person to browse the Web
without storing local data that could be retrieved at a later date.
4.
Read the following article and explain how it relates to question 3 above:
http://arstechnica.com/security/news/2010/08/private-browsing-not-soprivate.ars
Lab 1 CTSC 2120 Summer 2015 r1.0
2
Any actions that place secure data at risk (i.e. FERPA and/or HIPPA violations)
Violating the conditions of the State of Florida Education Code dealing with
student's rights or privacy
Other actions that are not in accordance with The Code of Ethics and Principles
of Professional Conduct of the Education Profession of Florida
Any student, faculty, staff, or community user who improperly utilizes or accesses
EFSCS information technology (hardware and or software) and in the course of
improper access or utilization causes any damage, loss of service or interruption of
services due to willful or negligent behavior, may be liable for all direct and
consequential damages resulting from such willful or negligent misuse.
Additionally, all students, faculty, staff, and community users must comply with
federal and state laws, college rules and policies, and the terms of applicable
contracts including software licenses while using the colleges information
technology resources. Examples of applicable laws, rules and policies include the
laws of libel, privacy, copyright, trademark, Florida Computer Crimes Act, the
Electronic Communications Privacy Act and the Computer Fraud and Abuse Act, all
other international, federal, state and local laws, including the Florida State Board of
Education Rules for Community Colleges, and the colleges sexual harassment
policy and student code of conduct. Users who engage in electronic
communications with persons in other states or countries or on other systems or
networks may also be subject to the laws of those jurisdictions and the rules and
policies of those other systems and networks.
Any student, faculty, staff, or community user utilizing the printing function of any
standalone or networked computer must comply with all departmental policies and
procedures regarding such printing function. This includes, but may not be limited
to, all limitations on the number of pages printed and or payment for the cost of
such printing.
Lab 1 CTSC 2120 Summer 2015 r1.0
5
Copyright
Current technology easily allows users to duplicate and distribute copyrighted video
images, audio recordings and other digital materials. The receipt of, possession of,
or distribution of copyrighted material without the permission of the copyright
holder is prohibited and is in violation of the laws of the United States (Title 17, U.S.
Code). Violators of copyright law could be subject to felony charges in state or
federal court, and may also be sued by the copyright holder in civil court.
Additionally, such improper use may be a violation of the EFSCs student code of
conduct and may amount to actionable plagiarism. U.S. Copyright Act (Title 17,
U.S.C.101-810) prohibits the unauthorized reproduction or distribution of
copyrighted materials, except as permitted by the principles of "fair use. Users are
responsible for any consequences of copyright infringement and the college
disclaims any liability or responsibility resulting from such use.
All software loaded on campus computers must be licensed by the college. Faculty,
staff, students, and community users are prohibited from downloading software to
individual campus computers or servers; if found, unlicensed software will be
removed, and access to campus computing resources may be suspended and/or
terminated.
The Digital Millennium Copyright Act of 1998 requires the college to file with the
Copyright Office a designation of an agent to receive notifications of claimed
infringement. The colleges agent is listed at http://www.copyright.gov/onlinesp/list.
E-mail
For purposes of this document, e-mail and Titan e-mail includes point-to-point
messages, listserves, and any electronic messaging involving computers and
computer networks. EFSC Titan e-mail is the official email account for students.
Students are responsible for accessing their Titan e-mail accounts and retrieving all
communications sent to the students from the college.
The college has adopted Titan e-mail protocol and procedures which are routinely
outlined in student publications. The use of the EFSC provided Course Management
Systems (i.e. BlackBoard) communication tools, also requires adherence to all
protocols and procedures for the use of Imail. Organizational e-mail accounts,
including those used by student organizations, are held to the same standards as
those for individual use by other students, faculty, or staff. E-mail is also generally
subject to the Florida Public Records Law to the same extent as it would be on
paper.
Examples of inappropriate and unacceptable uses of e-mail and Imail may include
but are not limited to:
Chain mail that misuses or disrupts resources - e-mail sent repeatedly from
user to user, with requests to send to others
A full version of the Technology and Internet Ethics and Acceptable Use Policy
and procedures will be placed in the Eastern Florida State College Procedures
Manual. A copy of this manual is available on the colleges intranet.
A complete copy of the Technology and Internet Ethics and Acceptable Use
Procedures will be prominently displayed within the colleges
websitewww.easternflorida.edu.