View
213
Download
0
Embed Size (px)
Citation preview
10-2
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Competencies
Describe concerns associated with computer technology
Discuss computer ethics
Discuss privacy issues
Describe the security threat posed by computer criminals, computer crime, and other hazards
10-3
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Competencies cont.
Discuss ways to protect security
Describe common types of risks associated with computers
Discuss what the computer industry is doing, and what you can do to protect the environment
10-4
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Information System Concerns
Privacy
Security
Ergonomics
Environment
10-5
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Privacy
Computer ethics provide guidelines for computer use
Ethics issuesPrivacy
Accuracy
Property
Access
10-6
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Large Databases
Data collected daily
Data gatherersInformation resellers or information brokers
Information profiles are created
Concerns Identify theft
Mistaken identity
10-7
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Private Networks
Employers monitor emailLegally done
Snoopware Software
Online services right to censor content
Screen and reject messages
Terminate user accounts
10-8
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Internet and Web
Illusion of anonymityNot concerned about privacy when surfing the Internet
Not concerned about privacy when sending e-mail
History file
Cookies Traditional
Ad network or adware cookies
10-10
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Computer Criminals
Employees
Outside users
Hackers and crackers
Organized crime
Terrorists
10-11
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Computer Crime
Malicious ProgramsViruses
Worms
Trojan horse
Denial of service (DoS)
Internet Scams
TheftHardware or software
Data
Computer time
Data Manipulation Computer Fraud and Abuse Act of 1986
10-12
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Other Hazards
Natural hazardsFires & floods
Winds
Hurricanes
Tornadoes
Earthquakes
Technological failures
Voltage surgeSurge protector
Human errors
Civil strife and terrorismWars
Riots
Terrorist acts
10-13
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Measures to Protect Computer Security
Encrypting messages
Restricting access
Anticipating disasters
Backing up data Encrypted e-mail
10-14
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Restricting Access
Biometric scanningFingerprint scanners
Retinal (eye) scanners
Assigning passwords
FirewallsSpecial hardware and software
Controls access to internal networks
10-16
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Ergonomics
Study of human factors related to things people use
Physical HealthEyestrain and headache
Back and neck pain
Repetitive strain injury
10-17
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
More on Ergonomics
Mental Health Noise
Electronic monitoring
TechnostressStress associated with computer use
Harmful to people
10-19
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Personal Responsibility
Conserve
Recycle
Educate
10-20
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
A Look to the FuturePresence Technology
Presence technology alerts you that someone is trying to reach you
People can locate you
People can tell which device is best to contact you
Could become a standard feature of new cars, phones, and appliances
10-21
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Key Terms
access (269)accuracy (269)ad network cookie (272)adware cookie (272)biometric scanning (280)carpal tunnel syndrome (284)chlorofluorocarbons (CFCs) (286)Code of Fair Information Practice (273)
cold site (281)
Computer Abuse Amendments Act of 1994 (277)
computer crime (276)
computer ethics (269)
Computer Fraud and Abuse Act of 1986 (279)
cookie (272)
10-22
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Key Terms
cookie-cutter program (272)
Cracker (277)
cumulative trauma disorder (283)
data security (281)
Denial of service attack (DoS) (278)
disaster recovery plan (281)
electronic monitoring (284)
electronic profile (270)
Encrypting (280)
Energy Star (285)
ergonomics (282)
ethics (269)
firewall (280)
Freedom of Information Act (271)
10-23
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Key Terms
Green PC (285)
hacker (277)
history file (272)
hot site (281)
identity theft (270)
illusion of anonymity (272)
information brokers (270)
information resellers (270)
Internet scam (278)
mistaken identity (271)
password (280)
physical security (281)
privacy (269)
property (269)
repetitive motion injury (283)
10-24
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Key Terms
repetitive strain injury (RSI) (283)
scam (278)
security (289)
snoopware (271)
Software Copyright Act of 1980 (278)
software piracy (278)
spike (279)
spyware (272)
surge protector (279)
technostress (284)
traditional cookie (272)
Trojan horse (278)
virus (277)
virus checker (278)
voltage surge (279)
worm (277)
10-25
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
FAQs
What is identity theft?
How does snoopware work?
I keep getting a lot of ads on my computer. What is spyware?
What is the difference between hackers and crackers?
My back hurts every time I sit in front of my computer. What can I do?
10-26
© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.
Discussion Questions
Explain how access can be restricted to a computer.Discuss the various malicious programs that can attack a computer system.What can you do to protect your privacy while on the Web? Do you feel that the Code of Fair Information Practice should be made into an enforceable law? Discuss your views.