You're about to create your best presentation ever

Free Information Security Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Free information

Transcript: On social media One more question: Uno Langmann Collection Digital archives Our other goal: to not confuse you. Jefferson vs. Brandeis Our goal: to connect Christen to one of RBSC's digital archives (photographs from the Uno Langmann family collection) Now you talk! We don't see the First Nations people as they would portray themselves, but instead through the filter of the white settler photographer Photos used for Western interest and knowledge-gathering Archival silence - they can be seen, but their voices are not heard Our account is always through the colonizer, not first-hand Public? Private? Christen asks if open access and the research commons can exist “side-by-side with those alternative systems of knowledge production that rely instead on social relations maintained and forged through negotiated interdependencies”? (2880) ...in other words, can we use digital archives in combination with other forms that rely on a relationship between the archived and the archive user? (And what about when that relationship is contentious? "Openness is valued in Western societies." (2877) “assumption that information freedom will be a social and political benefit in all cases” (2878) "Unrestricted sharing" Her main focus: digitally 'archived' information, how it's collected, and how it relates to the "information wants to be free" meme (in particular, indigenous communities) Issue of accessibility Is this information "free" so it can be exploited for Western benefit? Openness and colonization (not neutral space) Taking things out of context “We can create both movements and tools that allow for an expansive notion of openness and access, but do so without sacrificing diversity or appealing to universal goals and generalized needs’ (2889) Some Christen quotes: “The universal goal of “unrestricted sharing” defines a terrain where any type of access control or differing notions of sharing are incompatible and must be overcome.” (2878) Justice Louis Brandeis: "the noblest of human productions – knowledge, truths ascertained, conceptions, and ideas – become, after voluntary communication to others, free as the air to common use" (2876) “We are stuck thinking about open or closed, free or proprietary, public or private, and so on, even though in such common online experiences as using social media platforms Facebook and Twitter, or when reading through legal parameters for the use and reuse of digital information, these binaries rarely exist.” (2874) First Nations photographs Notion that "information wants to be free" Digital rights management, intellectual property rights Knowledge as a public resource (accessibility) and information spread Christen on "free information"; digital archives Introduction to Christen Do you agree or disagree? "Free" information - Kimberly Christen and First Nations photographs "Openness" and freedom Do you think there is a 'public or private' binary now that we sign our lives away to social media 'terms and conditions'? In particular, how do you foresee this changing as social media becomes the norm? Do you agree with Vaidhyanathan's claim that we are "blind to the ways in which Google exerts control over its domain?" (2878) Finally, what about apps like Snapchat and the accusation that all photos are saved somewhere in its database? Is anything private anymore? Edward Curtis connection Thomas Jefferson: "ideas should freely spread from one to another over the globe" (2876)

Information security

Transcript: Netiquette When you choose content from the internet you must be careful what you use because the laws of copyright are strict. The copyright rules are usually found on legit sites with proof of copyright somewhere on their page so you should always look before you use any information, pictures or videos. When working in IT you must be careful when using emails and prevent the inbox from overflowing with spam and other unwanted e-mails. If you do not recognize the sender of an e-mail then delete the email or block the sender. The main reason why e-mails can be so dangerous to a business is because any e-mail may contain a virus or another form of malicious software. Identity theft is dangerous for the victim because the thief steals personal details and uses those details for illegal transactions and other activities, it is more troublesome when the thief cannot be tracked so that means the only person who can account for the crime (s) is the victim. While surfing the internet you may encounter people you think are real but are using false accounts which means that they could want to meet you and you wish to meet them and when you finally meet they are a different age, look different and may have a different name When you are in the workplace you must consider security issues such as the way you sit while handling information on the computer to make sure that only you can see it and that all client information stays confidential. You must also think about making sure that only you can access that computer by creating a user name and password and make sure that all ant-virus and firewalls are up and running to prevent any spyware from infiltrating. Inappropriate behaviour will almost always be encountered whilst surfing the internet. It is very common when using social web sites like Facebook, Myspace, Twitter and many others. If you are becoming a victim of such behaviour then you should be able to either block or report the sender to the administrator of the site. When giving personal details you must always be careful when deciding when to give it and when you do, decide what information to hold back. The information that are okay to give are your; Name Email (work e-mail only) Sort code (on trustworthy sites) The information you should never give are your; Full name Address Bank details Pin Mobile/house number Date of birth If you have given any information then the only people who should be able to see this information are other users unless you edit your privacy settings by going into your options and selecting privacy. Hoaxes pop-ups are designed to fool unwary users into downloading malicious software. They are usually easy to spot because of the message “warning! Virus detected” or similar.

powerpoint template

Transcript: Nobody knows babies like we do! Quality products . Good Customer service. Every Kid really loves this store.. BABYLOU ABOUT US About Us BabyLou was established in 2004. It has been more than a decade since we started, where we have ensured to take care of every need and want of every child and infant under one roof, true to the caption “NO BODY KNOWS BABIES LIKE WE DO”. Our benchmark is to provide 100% customer service and satisfaction and continue to deliver the same with a wide range of toys, garments and Baby Products. Play and Create We Are Best 01 02 03 Block games Building Blocks help Kids to use their brain. PLAY TO LEARN in Crusing Adventures Our Discoveries Enjoy a sunny vacation aboard a luxury yacht with the LEGO® Creator 3in1 31083 Cruising Adventures set. This ship has all the comforts you need, including a well-equipped cabin and a toilet. Sail away to a sunny bay and take the cool water scooter to the beach. Build a sandcastle, enjoy a picnic, go surfing or check out the cute sea creatures before you head back to the yacht for a spot of fishing. Escape into the mountains Disney Little Princes in Also available for your Babies..... Also... Out of The World… Our reponsibility BABYLOU…. Our Responsibility All children have the right to fun, creative and engaging play experiences. Play is essential because when children play, they learn. As a provider of play experiences, we must ensure that our behaviour and actions are responsible towards all children and towards our stakeholders, society and the environment. We are committed to continue earning the trust our stakeholders place in us, and we are always inspired by children to be the best we can be. Innovate for children We aim to inspire children through our unique playful learning experiences and to play an active role in making a global difference on product safety while being dedicated promoters of responsibility towards children.

INFORMATION SECURITY

Transcript: To be effective, policies and other security controls must be enforceable and upheld e.g. using Group policy in domain environment. All authentication attempts must be logged, and all access to a resource must leave an audit trail e.g. Printer event log Need-to-know Principle Authencity Confidentiality More of our life is moving to the web, Google Apps (CM OOH and BBDO), Prezi and Digital platforms. e-banking, e-dating, social media, file sharing, skype, Dropbox ; we are inputing and downloading more and more personal information using the web. Authorization What is Information security? Information Security Protecting confidential information is a Business requirement and also an ethical and legal requirement Access to protected information must be restricted IT restricts software installation; because of the threat of malware, unnecessary software, bittorent Parental Restriction - ATM Pin Integrity Access Control After a person has successful been identified and authenticated then it must be determined what informational resources they are permitted to access and what actions they can perform (create, delete or change) e.g. Unit based access control, internet and social media access control Centralised Controls Identification is the assertion of who someone is e.g username Authentication is the act of verifying a claim of identity e.g. password something you know, have or are. Foundations of Access Control Integrity cont. Reputation - Company /Client Information is safe Resilience - Data back-up Plan Value of Information Security to Business Patch management Endpoint security What is Information? Thank You Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. To demonstrate the need for Information Security in Business and personal life. To demonstrate why IT enforces security policies Why we are here? Email Phishing Don't open email from unknown sender, with unknown file type Website Phishing Facebook id theft Basic Principles. Information is useful Data e.g electronic Files and emails collected and transmitted by Businesses and Individuals. Check for HTTPS:// not HTTP when submitting information online.

Now you can make any subject more engaging and memorable