You are on page 1of 3

Ethnography Rough Draft 2 Austin Beeler Introduction Central Topic: Internet Security How it helps us and how it hinders

rs us Where it is managed and exploited Purpose: To help explain the complex concepts behind Internet Security, its tools, and the techniques related to the field in order to help a normal individual protect themselves from online threats General Context Origin of security First virus / bug Original plan to prevent Why this is ineffective today More recent viruses How they spread Why theyre made What they affect Why increased security is important What must be sacrificed Why other flexible methods are ineffective Tools used Firewalls Routing Tunnels Encryption Methods ... Language Encryption Decryption Ciphers Abbreviations of encryption methods ... Site Context - 49th Security Division Meets weekly every Wednesday UNCC Woodward Hall, Room 302 Founded 2009 with 6 members Very defined chain of command, with additional committees handling other affairs Outreach to professionals, organizations, and companies Compete in international competitions Attend several security conferences each year Typical meetings usually cover the basics of a certain area of internet security

Meeting 1: Packet Capture analysis and the tool WireShark Brief: A presenter showed how to use the tool WireShark to search for specific data in packet capture files. Definitions Packet Capture Protocols Encryption md5sum Moments of Note Presenter was confused himself about certain concepts / techniques, and asked for help from more capable members Presenter did not prepare the presentation, simply went through the steps involved Certain members of the audience seemed unattentive Questions Where do packet capture files originate from? What is an ssl strip? Answers

Engaging the Purpose Points to cover How security affects flexibility Why security is necessary Methods of security implementation Change over time of perception of security ... Observational Points How security is explored What is discussed in an average meeting ... Interview Evidence Opinion of security from an insiders point of view Personal opinion on the direction security should be going What they perceive as the best protective measure What they perceive is the biggest weakness among all systems Conclusion Widespread use of computers Why their security is important How theyve changed over the years Security Issues How viruses and hackers have evolved How security protocols have changed The Future

Where security could go if either extreme Why a healthy balance is necessary

Information to Include List of Companies that specialize in Internet Security

A stolen credit card. Access to personal information. The possibility of an entire identity being stolen. The only place that a would-be criminal could have simultaneous access to these vital pieces of information is over the massive network known colloquially as the Internet. With nearly ten billion computers capable of joining the network, and with a forecasted twenty-eight billion by 2020, cyber criminals have no end to their pick of targets. Whether it be for personal gain, defamation, or simply for fun, cybercrime is on the rise and the only combatant against it is Internet security. Criminal activity and malicious software are a constant threat for any person and computer connected to the Internet, but with the right knowledge it can be avoided entirely, prevented pre-emptively, and even counteracted. The best way to gain this knowledge is with an understanding of the basics of how Internet security works, and exactly what it protects a computer or network from. On top of the basics, an understanding of the tools and hardware that are implemented to identify threats and protect networks furthers this education. Finally, practices and prevention methods for maintaining a safe computer and network environment completes the instruction. With this information, even a computer novice could repel most advances made to gain access to his or her personal data. Internet security comes in many forms. Cybercrime is defined as (definition). The most common tools that are used in the field of Internet security are

You might also like