Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.
Sharing Passwords, Addresses, or Photos of Others– Any of this information in the wrong hands could prove to be detrimental to someone’s job, financials, or personal safety.
Bullying and Trolling- Simply put, using the internet to harass and be cruel to people is a problem many people, especially children must deal with in todays online world, and without proper punishments being able to be meted out, it will continue, and it will get worse.
Faking your identity online- If one is able to fake someone else’s identity online they can gain access to almost anything in that person’s life as we keep most of our important information stored digitally at this point.
Recording a VoIP Call Without Consent- Everyone should know at this point that recording something without consent is illegal, and many cases of this have led to pornographic images and videos of people being spread without consent, often ruining these people’s lives.
Collecting Information about People Younger Than 13- Anything involving a child should be self-explanatory. It is inexcusable, predatory, and should be persecuted to the fullest extent of the law.
Read ODU’s electronic communications policy. Write a paragraph describing how it relates to cybersecurity.
This policy relates to cybersecurity in many ways. Firstly, it is designed to protect the information of the students, faculty, and of the university itself from coming into unauthorized hands. They have multi-factor authentication in place using Duo Mobile to make sure accounts are only accessed by those with permission. Certain records are properly retained and destroyed under the guidelines of the Commonwealth’s Records Retention Schedules. With so many people and so many networks underneath the universities care, and even more outside of it, it is a challenge to keep everything safe and secure but through the use of proper cybersecurity techniques it is much safer than if it was left alone.