25
1 1 0 0 C H A P T E R PRIVACY AND SECURITY

1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-2 Competencies Describe concerns associated with computer

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

10101010CH

AP

TE

R

PRIVACY AND SECURITY

10-2

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Competencies

Describe concerns associated with computer technology

Discuss computer ethics

Discuss privacy issues

Describe the security threat posed by computer criminals, computer crime, and other hazards

10-3

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Competencies cont.

Discuss ways to protect security

Describe common types of risks associated with computers

Discuss what the computer industry is doing, and what you can do to protect the environment

10-4

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Information System Concerns

Privacy

Security

Ergonomics

Environment

10-5

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Privacy

Computer ethics provide guidelines for computer use

Ethics issuesPrivacy

Accuracy

Property

Access

10-6

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Large Databases

Data collected daily

Data gatherersInformation resellers or information brokers

Information profiles are created

Concerns Identify theft

Mistaken identity

10-7

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Private Networks

Employers monitor emailLegally done

Snoopware Software

Online services right to censor content

Screen and reject messages

Terminate user accounts

10-8

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Internet and Web

Illusion of anonymityNot concerned about privacy when surfing the Internet

Not concerned about privacy when sending e-mail

History file

Cookies Traditional

Ad network or adware cookies

10-10

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Computer Criminals

Employees

Outside users

Hackers and crackers

Organized crime

Terrorists

10-11

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Computer Crime

Malicious ProgramsViruses

Worms

Trojan horse

Denial of service (DoS)

Internet Scams

TheftHardware or software

Data

Computer time

Data Manipulation Computer Fraud and Abuse Act of 1986

10-12

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Other Hazards

Natural hazardsFires & floods

Winds

Hurricanes

Tornadoes

Earthquakes

Technological failures

Voltage surgeSurge protector

Human errors

Civil strife and terrorismWars

Riots

Terrorist acts

10-13

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Measures to Protect Computer Security

Encrypting messages

Restricting access

Anticipating disasters

Backing up data Encrypted e-mail

10-14

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Restricting Access

Biometric scanningFingerprint scanners

Retinal (eye) scanners

Assigning passwords

FirewallsSpecial hardware and software

Controls access to internal networks

10-15

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Ergonomics

10-16

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Ergonomics

Study of human factors related to things people use

Physical HealthEyestrain and headache

Back and neck pain

Repetitive strain injury

10-17

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

More on Ergonomics

Mental Health Noise

Electronic monitoring

TechnostressStress associated with computer use

Harmful to people

10-18

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

The Environment

10-19

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Personal Responsibility

Conserve

Recycle

Educate

10-20

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

A Look to the FuturePresence Technology

Presence technology alerts you that someone is trying to reach you

People can locate you

People can tell which device is best to contact you

Could become a standard feature of new cars, phones, and appliances

10-21

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Key Terms

access (269)accuracy (269)ad network cookie (272)adware cookie (272)biometric scanning (280)carpal tunnel syndrome (284)chlorofluorocarbons (CFCs) (286)Code of Fair Information Practice (273)

cold site (281)

Computer Abuse Amendments Act of 1994 (277)

computer crime (276)

computer ethics (269)

Computer Fraud and Abuse Act of 1986 (279)

cookie (272)

10-22

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Key Terms

cookie-cutter program (272)

Cracker (277)

cumulative trauma disorder (283)

data security (281)

Denial of service attack (DoS) (278)

disaster recovery plan (281)

electronic monitoring (284)

electronic profile (270)

Encrypting (280)

Energy Star (285)

ergonomics (282)

ethics (269)

firewall (280)

Freedom of Information Act (271)

10-23

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Key Terms

Green PC (285)

hacker (277)

history file (272)

hot site (281)

identity theft (270)

illusion of anonymity (272)

information brokers (270)

information resellers (270)

Internet scam (278)

mistaken identity (271)

password (280)

physical security (281)

privacy (269)

property (269)

repetitive motion injury (283)

10-24

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Key Terms

repetitive strain injury (RSI) (283)

scam (278)

security (289)

snoopware (271)

Software Copyright Act of 1980 (278)

software piracy (278)

spike (279)

spyware (272)

surge protector (279)

technostress (284)

traditional cookie (272)

Trojan horse (278)

virus (277)

virus checker (278)

voltage surge (279)

worm (277)

10-25

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

FAQs

What is identity theft?

How does snoopware work?

I keep getting a lot of ads on my computer. What is spyware?

What is the difference between hackers and crackers?

My back hurts every time I sit in front of my computer. What can I do?

10-26

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.

Discussion Questions

Explain how access can be restricted to a computer.Discuss the various malicious programs that can attack a computer system.What can you do to protect your privacy while on the Web? Do you feel that the Code of Fair Information Practice should be made into an enforceable law? Discuss your views.