Title: The 3 Little Pigs in Cyber Space
1The 3 Little Pigs in Cyber Space
- Building Your House for Privacy and Safety
- Caylen Tichenor
- Oconee RESA
2Versions of the Three Little Pigs
- The Story of the Three Little Pigs (England).
- The Three Little Pigs (England).
- The Awful Fate of Mr. Wolf (African-American,
Joel Chandler Harris). - The Story of the Pigs (African-American, Joel
Chandler Harris). - The Three Goslings (Italy).
3Three Little Pigs, The PC Version Once there were
three little pigs who lived together in mutual
respect and in harmony with their environment.
Using materials that were indigenous to the area,
they each built a beautiful houses. One pig built
a house of straw, one a house of sticks, and one
a house of dung, clay, and creeper vines shaped
into bricks and baked in a small kiln. When they
were finished, the pigs were satisfied with their
work and settled back to live in peace and
self-determination. But their idyll was soon
shattered. One day, along came big, bad wolf with
expansionist ideas. He saw the pigs and grew very
hungry, in both a physical and an ideological
sense. When the pigs saw the wolf, they ran into
the house of straw. The wolf ran up to the house
and banged on the door, shouting, "Little pigs,
little pigs, let me in!" The pigs shouted back,
"Your gunboat tactics hold no fear for pigs
defending their homes and culture." But the wolf
wasn't to be denied what he thought was his
manifest destiny. So he huffed and puffed and
blew down the house of straw. The frightened pigs
ran to the house of sticks, with the wolf in hot
pursuit. Where the house of straw had stood,
other wolves bought up the land and started a
banana plantation.
4 SOMERSET PA (AP) -- A. Wolf took the stand
today in his own defense. This shocked and
stunned the media who predicted that he would not
testify in the brutal double murder trial. A.
Wolf is accused of killing (and eating) The First
Little Pig, and The Second Little Pig. This
criminal trial is expected to be followed by a
civil trial to be brought by the surviving Third
Little Pig. The case has been characterized as a
media circus. His testimony is transcribed
below "Everybody knows the story of the Three
Little Pigs. Or at least they think they do. But
I'll let you in on a little secret. Nobody knows
the real story, because nobody has ever heard my
side of the story. I'm Alexander T. Wolf. You can
call me Al. I don't know how this whole Big Bad
Wolf thing got started, but it's all wrong. Maybe
it's because of our diet. Hey, it's not my fault
wolves eat cute little animals like bunnies and
sheep and pigs. That's just the way we are. If
cheeseburgers were cute, folks would probably
think you were Big and Bad too. But like I was
saying, the whole big bad wolf thing is all
wrong. The real story is about a sneeze and a cup
of sugar
5"THE THREE LITTLE PIGS" PLEASURE PRINCIPLE VERSUS
REALITY PRINCIPLE From The Uses of Enchantment,
The Meaning and Importance of Fairy Tales by
Bruno Bettelheim, Vintage Books, NY, 1975 The
myth of Hercules deals with the choice between
following the pleasure principle or the reality
principle in life. So, likewise, does the fairy
story of "The Three Little Pigs."
6Listen out there! We're George and Harriet
Miller! We just dropped in on the pigs for
coffee! We're coming out!...We don't want
trouble!"
7(No Transcript)
8(No Transcript)
9Wolves and Pigs in the 21st Century
10Privacy Wolves
- Viruses and worms
- Trojan horses
- Web bugs
- Web spying and spoofing
- Malicious programs and spyware
- Port scanning
- War Dialing
- Password Cracking
11Privacy Wolves
- Denial of services
- Computer hijacking
- Identity theft
- Statistical research
12The Pigs
- Little Pig 1
- Either is ignorant or unafraid of wolves.
- Has attitude that wolves arent interested in
me - Takes little if any precaution against wolves.
- Unknowingly puts other little pigs in danger
13The Little Pigs
- Little Pig 2
- Knows about wolves.
- Deep down doesnt think theyre the target of
wolves. - Takes some precautions when they think about it.
- Are prone to believe hoaxes about wolves.
14The Little Pigs
- Little Pig 3
- Is very aware of wolves
- Can tell the difference
- between a real and fake wolf.
- May be viewed as unfriendly
- or suspicious by other little pigs.
- Viewed as uncooperative by wolves.
15Steps in building the brick house
- Correct any errors in your IT program.
- Build a security plan
- Determine what information will be shared on a
case by case basis. - Decide and maintain level of privacy.
16Top 10 IT mistakes
- 10. Failing to educate users on good security
practices. - 9. Running unnecessary services and applications
on servers. - 8. Failing to maintain and test backups.
- 7. Failing to install security updates.
- 6. Failing to implement and update virus
detection software
17Top 10 IT Mistakes
- 5. Connecting servers to the Internet without
changing default settings, accounts and
passwords. - 4. Relying mainly on a firewall.
- 3. Authorizing only short term fixes so problems
emerge rapidly. - 2. Taking steps to prevent theft of computer
hardware but not data.
18Top 10 IT mistakes
- Not providing adequate computer security
training for IT staffs. - Taken from Policing Your Computer Network
Scholastic Administrator Spring 2002. P.38
19If you spend more on coffee than on IT security,
then you deserve to be hacked. Richard Clark
20Eight Steps to Better Security
- Assess your vulnerabilities.
- Formulate an IT security policy.
- Consolidate your assets.
- Install every security update.
- Use centralized anti-virus software.
- Evaluate your security on an ongoing basis.
- Test your recovery strategy.
21Eight Steps to Better Security
- 8. When installing a wireless network turn on
the Wired Equivalent Privacy provision.
22Approximately 61 of wireless networks have not
been properly configured to protect against
unauthorized outside access. PC Magazine
Factoid
23Three levels of information
- Essential must have information in order to
complete transactions. - Important Information you deem necessary to
share with others - Private Information not needed to complete the
transaction or to be shared.
24Two worst privacy wolves are
The Government
and
"Statistical Researchers"
25Governmental Wolves
- The Patriot Act
- Search and Seizure issues.
- Monitoring issues
- Information gathering issues.
26Privacy Facts and Figures
- As of last count, there were 3,530 million
personal files in all federal agencies. - Thats an average of 15 files per man, woman and
child in the U.S. - ¾ of the data is held by 5 agencies
- Health and Human Services
- Treasury
- Education
- Defense
- Commerce
Factoid
27Statistical Research includes
- Registration forms (online and paper)
- Surveys
- Drawings
- Warranty cards
- Any form that requires private information or
that is used for more than one purpose.
28However
Even straw and stick houses can have some
level of privacy.
Level 1
Level 2
Level 3
29Three Levels of Privacy
- Level I
- Opt out early and often
- Dont use office equipment for personal purposes
- Dont surf personal sites at work
- Use a fake or junk email account
- Remain unlisted
- Keep personal information personal
30Three Levels of Privacy
- Level I (cont.)
- Be anti social when necessary
- Tell off telemarketers
- Check your credit report annually.
- Cancel any unused credit cards
- Use passwords
- Use them well
31Three Levels of Privacy
- Level I (cont.)
- Keep your personal email and professional email
separate. - Remember that email is considered a public record
and is subject to open records laws.
32Three Levels of Privacy
- Level II
- Close the preview pane in your email program.
- Use software that detects spy ware installed by
free applications. - Install a firewall.
- Dont open attachments from unknown sources. (or
sometimes known sources). - Ask to be removed from online directories.
- Set your browser to reject third party cookies.
33Three Levels of Privacy
- Level II (cont.)
- Unsubscribe carefully.
- Get de-listed from the DMA members list.
- Disapprove credit offers.
- List just your phone number in the phone book.
- Read privacy policies when you give out
information. - Use temporary accounts for specific projects.
34Three Levels of Privacy
- Level III
- Scramble your messages with tools such as
PGPfreeware or Sigba. - Lock your files.
- Protect your plastic. Use a low limit credit
card for online purchases. - Let your data grow old. (and obsolete)
- Never reveal important information over wireless
phones. - Use a P.O. Box
35Responsibilities and Restrictions
- You may have to give non-essential information
out if - You are involved in a credit/check transaction
- The information is directory information.
- The information is required by your immediate or
top level supervisor for a specific purpose. - - You wish to patronize a business or transact
business over the web.
36Recommended tools for building a brick house
- Virus protection Norton AntiVirus 2002.
- Cookie Manager Limited Software Cookie Crusher
2.6 - Firewall- Zone Labs ZoneAlarm 3
- All-in-one Solution- Norton Internet Security
2002 - Recommended by PCWorld June 2002
37A Final Thought
- The first Maxim of worldly wisdom, constant
Dissimulation may be good or evilIf it means
only a constant concealment from others as
others have not a right to know it is not only
lawful but commendable because when these are
divulged, our enemies may avail themselves of
the Knowledge of them. - John Adams
38Sources
- Smith, Robert Ellis Ben Franklins Web Site,
Privacy Journal 2000. - PC Basics Vol. 1 No. 4
- PC Magazine July 2002
- Scholastic Administrator Spring 2002
- Whos Watching You Online? PC Upgrade Vol. 9
No. 6