34
COMPUTER SECURITY AND SAFETY, ETHICS AND PRIVACY

Computer security privacy and ethics

Embed Size (px)

Citation preview

Page 1: Computer security privacy and ethics

COMPUTER SECURITY AND SAFETY, ETHICS

AND PRIVACY

Page 2: Computer security privacy and ethics

TECHNIQUES ON HOW TO KEEP

PERSONAL DATA PRIVATE

• Fill only necessary information on rebate, warranty and registration

forms.

• Do not preprim your telephone number or Social Security number

on personal checks.

• If Caller ID is available in your area, find out how to block your

number from displaying on the receiver system.

• Do not write your telephone number on charge or credit receipts.

Page 3: Computer security privacy and ethics

TECHNIQUES ON HOW TO KEEP

PERSONAL DATA PRIVATE

• Ask merchants not to write credit numbers, telephone numbers,

Social Security numbers and driver’s license numbers on the

back of your personal checks.

• Purchase goods with cash, rather than charge or credit receipts.

• Avoid shopping club and buyer cards.

• If merchants ask personal question, fin out why they want to

know before releasing the information.

• Inform merchants that you do not them to disturb your personal

information.

• Request, in writing, to be removed form mailing list.

Page 4: Computer security privacy and ethics

TECHNIQUES ON HOW TO KEEP

PERSONAL DATA PRIVATE

• Obtain your credit report once a year from each of the three (3)

major credit reporting agencies and correct any errors.

• Request a free copy of your medical records once a year from the

Medical Information Bureau.

• Limit the amount of information you provide to Web sites. Fill only

required information.

• Install a cookie manager to filter cookies.

• Clear your history file when you are finished browsing.

• Set up a free e-mail account. Use this e-mail address for merchant

forms.

Page 5: Computer security privacy and ethics

TECHNIQUES ON HOW TO KEEP

PERSONAL DATA PRIVATE

• Turn off file and printer sharing on your Internet account.

• Install a personal firewall.

• Sign up for e-mail filtering through your Internet access provider

or use an anti-spam program.

• Do not reply to spam for any reason.

• Surf the Web anonymously with a program through an

anonymous Web site.

Page 6: Computer security privacy and ethics

SPYWARE AND ADWARE

• Spyware

• Spyware is a program placed on a computer without the

user’s knowledge that securely collects information about

the user.

• Some vendors or employers use spyware to collect

information about program usage or employees. Internet

advertising firms often collect information about user’s

Web browsing habits by hiding spyware in adware.

Page 7: Computer security privacy and ethics

SPYWARE AND ADWARE

• Adware

• Adware is a program that displays an online advertisement

in a banner or pop-up window on Web pages, e-mail

messages or other Internet services.

• To remove spyware and adware, obtain a spyware and

adware remover that can detect spyware and adware.

Some operating systems and Web browsers include

spyware removers.

Page 8: Computer security privacy and ethics

SPAM

• Spam is an unsolicited message or newsgroup posting sent

to multiple recipients or newsgroups at once.

• spam is an Internet junk mail.

• The content of spams range from selling a product

service, to promoting a business opportunity, to

advertising offensive material.

• One study indicates more than 92% of e-mail is spam.

Page 9: Computer security privacy and ethics

SPAM

• Some spam reduction techniques:

• Use some e-mail programs that have built-pin settings that

allow users to delete spams automatically.

• Users can also sign up for e-mail filtering from their Internet

access provider.

• E-mail filtering is a service that blocks e-mail messages

from designated sources.

• Anti-spam programs are programs that attempt to remove

spams before it reaches to the user’s inbox.

• One disadvantage of e-mail filtering and anti-spam

programs is that sometimes they remove valid messages.

Page 10: Computer security privacy and ethics

PHISHING, PHARMING &

CLICKJACKING• Phishing

• Phishing is a scam in which a perpetrator sends an official looking

e-mail message that attempts to obtain your personal and financial

information.

• Some phishing e-mail message ask you to reply with your

information; others direct you to a phony Web site, or pop-up

window that looks like a Web site that collects the information.

• And If you receive an e-mail that looks legitimate and requests

you to update any of your private information, the FTC

recommends you visit the Web site directly to determine the

validity of the request. Never click a link in a e-mail message,

instead retype the Web address in you browser.

Page 11: Computer security privacy and ethics

PHISHING, PHARMING &

CLICKJACKING

• phishing filter is a program that warns or blocks you from potentially

fraudulent or suspicious Web sites. Some Web browsers include

phishing filters.

• Pharming

• Pharming is a scam similar to phishing, where a perpetrator

attempts to obtain your personal an financial information, except

they do so via spoofing.

• That is, when you type a Web address on your browser, you are

redirected to a phony Web site that looks legitimate and then

requests your confidential information.

Page 12: Computer security privacy and ethics

PHISHING, PHARMING &

CLICKJACKING

• Clickjacking

• Clickjacking is another similar scam, with clickjacking, an

object that can be clicked on a Web site such as button,

images or link that contains malicious program.

• When users click the disguised object, they may be

redirected to a phony Web site that requests personal

information, or a virus may download to their computer.

Page 13: Computer security privacy and ethics

SOCIAL ENGINEERING

• Social Engineering

• Social engineering, as related to the use of computers, is

defined as gaining unauthorized access or obtaining

confidential information by taking advantage of the trusting

human nature of some victims and the naivety of others.

• Some social engineers trick their victims into revealing

confidential information such as user names and

passwords on the telephone, or on the Internet.

Page 14: Computer security privacy and ethics

SOCIAL ENGINEERING

• Techniques they use include pretending to be an

administrator or other authoritative figure, feigning an

emergency situation or impersonation an acquaintance.

• Social engineers also obtain information from users who do

not destroy or conceal information properly.

• These perpetrator sift through company dumpsters, watch or

film people dialing telephone numbers or using TAM’s and

snoop around computers looking for openly displayed

confidential information.

Page 15: Computer security privacy and ethics

PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS

CONCERNING PRIVACY)

DATE LAW PURPOSE

2006 Telephone Records and Privacy

Protection Act

Makes it illegal to use fraudulent means to

obtain someone’s telephone records.

2003 CAN-SPAM Act Gives law enforcement the right to impose

penalties on people using the Internet to

distribute spam.

2002 Sarbanes-Oxley Act Requires corporate officers, auditors and

attorneys of publicly traded companies to follow

strict financial report guidelines.

2001 Children’s Internet Protection Act

(CIPA)

Protects minors from inappropriate content when

accessing the Internet in schools and libraries.

2001 Provide Appropriate tools Required to

Intercept and Obstruct Terrorism

(PATRIOT) Act

Give law enforcement the right to monitor

people’s activities including Web and e-mail

habits.

Page 16: Computer security privacy and ethics

PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS

CONCERNING PRIVACY)

DATE LAW PURPOSE

1999 Gramm-Lech-Bliley Act (GLBA) or

Financial Modernization Act

Protects consumers from disclosure o their

personal financial information and requires

institutions to alert consumers of information

disclosure policies.

1998 Digital Millennium Copyright Act

(DMCA)

Makes it illegal to circumvent anti-piracy

schemes on commercial software; outlaws

sales devices that copy software illegally.

1998 Children’s Online Privacy Protection

Act (COPPA)

Requires Web sites protect personal information

of children under 13 years old.

1997 No Electronic Theft (NET) Act Closes a narrow loophole in the law that allowed

people to give away copyrighted material such

as software on the Internet without legal

permission.

1996 Health Insurance Portability and

Accountability Act (HIPAA)

Protects individuals against the wrongful

disclosure of their health information.

Page 17: Computer security privacy and ethics

PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS

CONCERNING PRIVACY)

DATE LAW PURPOSE

1996 National Information Infrastructure

Protection Act

Penalizes theft of information across state lines,

threats against networks and computer system

trespassing.

1994 Computer Abuse Amendments Act Amends 1984 act of outlaw transmission of

harmful computer code such as viruses.

1992 Cable Act Extends the privacy of the Cable

Communications Policy Act of 1984 to include

cellular and other wireless devices.

1991 Telephone Consumer Protection Act Restricts activities of telemarkets.

1988 Computer Matching and Privacy Act Regulates the use of government data to

determine the eligibility of individuals for federal

benefits.

Page 18: Computer security privacy and ethics

PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS

CONCERNING PRIVACY)

DATE LAW PURPOSE

1988 Video Privacy Protection Act Forbids retailers from releasing or selling video-

rental records without customer consent or a

court order.

1986 Electronics Communications Privacy

Act (ECPA)

Provides the same right of privacy protection for

the postal delivery service and telephone

companies to the new forms of electronic

communications such as voice mail, e-mail and

cell phone.

1984 Cable Communications Policy Act Regulates disclosure of cable television

subscriber records.

1984 Computer Fraud and Abuse Act Outlaws unauthorized access of federal

government computers.

Page 19: Computer security privacy and ethics

PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS

CONCERNING PRIVACY)

DATE LAW PURPOSE

1978 Right to Financial Privacy Act Strictly outlines the procedures federal agencies

must follow when looking a customer records in

banks.

1974 Privacy Act Forbids federal agencies from allowing

information to be used for a reason other than

that for which it was collected.

1974 Family Educational Rights and Privacy

Act

Gives students and parents access to school

records and limits disclosure of unauthorized

parties.

1970 Fair Credit Reporting Act Prohibits credit reporting agencies from

releasing credit information to unauthorized

people and allows consumers to review their

own credit records.

Page 20: Computer security privacy and ethics

PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS

CONCERNING PRIVACY)

• Common points of the laws listed include the following:

• Information collected and stored about individuals should be

limited what is necessary to carry out the function of the

business or government agency collecting the data.

• Once collected, provisions should be made to restrict access

o the data to those employees within the organization who

need access to it to perform their job duties.

Page 21: Computer security privacy and ethics

PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS

CONCERNING PRIVACY)

• Personal information should be released outside the

organization collecting the data only when the person has

agreed to its disclosure.

• When the information is collected about individual, the

individual should know that the data is being collected and

have the opportunity to determine the accuracy of the data.

Page 22: Computer security privacy and ethics

EMPLOYEE MONITORING

• Employee monitoring involves the use of computers to

observe, record and review an employee’s use of a computer,

including communications such as e-mails, keyboard activity

(used to measure productivity) and Web site visited.

• Some employers use programs that easily allow them to

observe their employees. Further, it is legal for the employers to

use these programs.

Page 23: Computer security privacy and ethics

CONTENT FILTERING

• Content Filtering is the process of restricting access to certain

material on the Web.

• This is due to the issues all around in Internet concerning

objectionable materials such as racist literature, violence

and obscene pictures that some believed that these have to

be banned and some believed that these material should be

filtered, that is, restricted.

• Content filtering opponents argue that banning nay materials

violates constitutional guarantees of free speech and

personal rights.

Page 24: Computer security privacy and ethics

CONTENT FILTERING

• Web Filtering software is a program that restricts access to

specified Web sites.

• Some also filters sites that use specific words. Others allow

you to filter e-mail messages, chat rooms and programs.

• Many Internet security programs include a firewall, antivirus

program and filtering capabilities combined.

Page 25: Computer security privacy and ethics

COMPUTER USAGE @ WORK

• National and Local Security

• Since 2001, the federal and local governments, businesses

and individuals have been implementing aggressive new

security measures because of the increased terrorist activity.

As a result, computers now assist these sectors in

maintaining and monitoring security.

• Advanced computer visions enable computers to monitor

indoor and outdoor areas that might be high in criminal

activity. One good example of this is the installation of

cameras in the problematic areas.

Page 26: Computer security privacy and ethics

COMPUTER USAGE @ WORK

• Computers also use facial recognition to identify

individuals who do not belong in a particular area. For

example, one theme park in Florida, USA often takes a

pictures of individuals they escort out of and ban from the

park so that when the cameras installed in the most

strategic areas of the park found a match image of the

faces coming out of their cars and walks towards the

park from the banned people, the computer alerts an

officer and then investigates the situation.

• Computers also help the government in banning a person

who are not authorized to go out of the country by

restraining him/her from his/her flight.

Page 27: Computer security privacy and ethics

COMPANIES ON THE CUTTING EDGE

• MCAFEE Intrusion Prevention Products Developer

• Founded by John McAfee in Santa Clara, California on 1987.

• McAfee protects more than 60 million consumers and

more than 100 million mobile devices.

• The McAfee Initiative to Fight Cybercrime is a global

effort to thwart security threats and criminal activity.

• In 2009, McAfee launched a new online backup capacity

that allows consumers to back up and encrypt their

important files such as documents, photos, music and e-

mail messages.

Page 28: Computer security privacy and ethics

COMPANIES ON THE CUTTING EDGE

• SYMANTEC Computer Security Solutions Leader

• Was founded in 1982 and has offices in more than 40

countries. Its primary manufacturing facility is in Dublin,

Ireland.

• Created and developed a new security model that

created the latest versions of Norton AntiVirus and

Norton Internet Security.

• In 2009, Symantec released the latest version of it

Norton Internet Security Software. A rating service tested

level of protection provided by 10 different security

products ,and gave Norton Internet Security the only

perfect score.

Page 29: Computer security privacy and ethics

TECHNOLOGY TRAILBLAZERS

• RICHARD STALLMAN Software Freedom Advocate

• an advocate of free software and campaigned against

software patents and copyright laws.

• Developed the concept of Copyleft, which gives each

person who has purchased a software product the ability

to copy, adapt and distribute the program as long as the

new software has the same lack of restrictions.

• Began the GNU/Linux Project in 1983 as an effort to

develop and use the concept of copyleft.

Page 30: Computer security privacy and ethics

TECHNOLOGY TRAILBLAZERS

• RICHARD STALLMAN Software Freedom Advocate

• Also started the Free Software Foundation in 1985 to

promote free software for the GNU Project. The Free

Software Directory Catalogs more than 5,300 packages

that run on the Linux and GNU operating system.

Page 31: Computer security privacy and ethics

TECHNOLOGY TRAILBLAZERS

• GENE SPAFFORD Computer Security Expert

• Known as Spaf.

• Recognized as one of the foremost experts in the computer

security, intelligence, cybercrime and software engineering

fields.

• Deconstructed and analyzed the 1988 Morris Worm,

considered the first computer worm distributed on the

Internet. His work led to the conviction of the Cornell

University student Robert Morris, the developer of the

Morris Worm.

Page 32: Computer security privacy and ethics

TECHNOLOGY TRAILBLAZERS

• GENE SPAFFORD Computer Security Expert

• For 30 years, he has advised major corporations

including Microsoft, Intel and Unisys. The US Air

Force, the Federal Bureau of Investigation. And two

(2) US Presidents.

• Noted for several firsts in the computer security field

i.e., he defined the terms, software forensics and

firewall, wrote the first English-Language book on

the topics of viruses and malwares.

Page 33: Computer security privacy and ethics

TECHNOLOGY TRAILBLAZERS

• GENE SPAFFORD Computer Security Expert

• Founded the world’s first multidisciplinary academic

security awareness group: the Center for

Education and Research in Information

Assurance and Security (CERIAS).

Page 34: Computer security privacy and ethics

-END-

THANK YOU!

ERLY JOHN D. VALDEZ