26
PRIVACY , SECURITY AND ETHICS -prisecethics- Hamimah bte Mohd Jamil MUHAMMAD BIN MOHD SUKERI (A13CS0068) NURUL EMIRA BINTI ABDUL AZIZ (A13CS0128) WAN HAJARUL ASIKIN BINTI WAN ZUNAIDI (A13CS0168)

Privacy , Security and Ethics Presentation

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Privacy , Security and Ethics Presentation

PRIVACY , SECURITY AND ETHICS-prisecethics-

Hamimah bte Mohd Jamil

MUHAMMAD BIN MOHD SUKERI (A13CS0068) NURUL EMIRA BINTI ABDUL AZIZ

(A13CS0128) WAN HAJARUL ASIKIN BINTI WAN

ZUNAIDI (A13CS0168)

Page 2: Privacy , Security and Ethics Presentation

PRIVACY

Page 3: Privacy , Security and Ethics Presentation

PRIVACY

• Computing technology makes it possible to collect and use our data.

• The website we visit is one of the way the data collection.

• Would you matter if your personal information is been shared ?

PRIMARY PRIVACY ISSUES

ACCURACY :Relates to the responsibility of those who collect the data is correct

PROPERTY :who on data and right to the software

ACCESS :relates to the responsibility of those who have data to control who is able to use it

Page 4: Privacy , Security and Ethics Presentation

LARGE DATABASE

• Large organisation are constantly compiling information about us.

• There are about 2000 database• Example : Telephone companies-compile lists of

the call we make.• REVERSE DIRECTORY list telephone

number followed by subscriber names.• *insert picture• *change title

Page 5: Privacy , Security and Ethics Presentation

• Information reseller(information broker) : Collect and sell personal data. Electronic Profiles : are compiled from database to provide highly detailed and personalized descriptions of individual

• Our personal information has been a marketable commodity. This raises many issues including :

1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING INFORMATION.

2.SPREADING INFORMATION WITHOUT PERSONAL CONSENT.

3.SPREADING INACCURATE INFORMATION

Page 6: Privacy , Security and Ethics Presentation

IDENTITY THEFT :• Is the illegal assumption of someone’s

identity for the purpose of economic gain.

MISTAKEN IDENTITY :• Occurs when an electronic profile of one

person is switched with another.• INFORMATION OF INFORMATION ACT :

entitles individuals access to governmental records relating to them.

Page 7: Privacy , Security and Ethics Presentation

• PRIVATE NETWORKMany organization monitor employee e-mail and computer files using software called SNOOPWARE• THE INTERNET AND THE WEBMany people believe that, while using the web, little can be done to invade their privacy. This is called the illusion of anonymity• HISTORY FILERecord location of visited sites• COOKIESTwo basic type are TRADITIONAL COOKIES AND AD NETWORK COOKIES(ADWARE COOKIES).

Page 8: Privacy , Security and Ethics Presentation

• TRADITIONAL COOKIES-Provide information to a single sites,a cookies is deposited with the information that identifies specifically

• AD NETWORK(ADWARE COOKIES-Record your activities across different sites.

• PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)-eliminate history files and block cookies.

• SPYWARE-Secretly record and report internet activities.

• COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what you do.

• WEB BUGS-Provide information back to spammers about activity on e-mail account.

• ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and monitoring software.

Page 9: Privacy , Security and Ethics Presentation

MAJOR LAWS ON PRIVACY

• Protect personal financial information

GRAMM-LEACH-BLILEY ACT

• Protect medical records

HEALTH INSURANCE PROTABILITY AND ACCOUNTABILITY ACT(HIPAA)

• Restricts disclosure of educational records

FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT(FREPA)

Page 10: Privacy , Security and Ethics Presentation

SECURITY

Page 11: Privacy , Security and Ethics Presentation

COMPUTER CRIMAL :

• Computer criminal included employee , outside users , hacker and crackers ,carders , organized crime, and terrorist

• HACKER :Create or improve programs and shared those program with fellow hackers . Typically are not criminal.

• CRACKERS :Share programs designed to gain unauthorized access computer systems or disrupt networks.Typically are criminals.

• CARDERS :Specialize in stealing,trading and using stolen credit cards over the internet.

Page 12: Privacy , Security and Ethics Presentation

COMPUTER CRIME : Is an illegal action involving special knowledge of computer technology

• CYBER-BULLYING : intended to hurt or embarrass another person.

• ROGUE WI-FI HOTSPOT :Capture personal information

• SCAMS : designed to trick people into spending their time/money.

Page 13: Privacy , Security and Ethics Presentation

• DENIAL OF SERVICE ATTACK(DOS) : Is attempt to shut down or stop a computer system/network.it floods a computer or network with requests for information and data.

• Theft : Takes many forms including stealing hardware, software, data and computer time.

• Data manipulation : Involves changing data or leaving prank messages .The Computer Fraud and Abuse Act helps protect against data manipulation.

Page 14: Privacy , Security and Ethics Presentation

• MALICIOUS PROGRAMS (MALWARE) : Design to damage or disrupt computer system.3 most common types of malware are viruses, worms, and Trojan horses.

VIRUSES• Some of the viruses are harmless while some of it can damaging our system

component.

WORMS• It fill the computer a computer system with self replicating information,

clogging the system that is operation are slowed/stopped• Typically find their way into microcomputer through e-mail

attached/programs downloaded from internet

Trojan horses

• Disguised as something else• Not a viruses , but it carries viruses.

Zombies

• Remotely controlled infected computer for malicious purpose.• A collection of zombies computer is known as botnet or robot network

Page 15: Privacy , Security and Ethics Presentation

OTHER HARZARD :-

• Included fires,flod,wind,hurricans and tornado.Even computer users should store backup disk of programms and data in safe location.

NATURAL DISASTER:

• Wars,riot,and terrorist activities are real risks in all parts of the world.

CIVIL STRIFE AND TERRORISM:

• Microcomputer should use a surge protector,a divice that separate the computer from the power source of the wall outlet.This may protect the computer

TECHNOLOGICAL FAILURES:

• Human mistakes are inevitable.Data entry errors are probably the most commonplace could lead to mistaken identity.

• Occur when office workers save important documents under files names that are not descriptive and not recognizable by others

HUMAN ERRORS:

Page 16: Privacy , Security and Ethics Presentation

MEASURES TO PROTECT COMPUTER SECURITY

RESTRICTING ACCESS : Sometimes security matter of putting guards on company computer rooms and checking the identification of everyone admitted.Other times it use biometric scanning such as fingerprint and iris. Password are secret words or phrases that must be keyed into a

computer system to gain access.

Page 17: Privacy , Security and Ethics Presentation

ENCRYPTING DATA:- E-MAIL ENCRYPTING : Protect e-mails messages as the moves across the internet.FILE ENCRYPTING :Protects sensitive files by encrypting them before they stored on a hard drive.WEB SITES ENCRYPTING :Secures Web transaction,especially financial transactionVIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections between company networks and remote users such as workers connecting from homeWIRELESS NETWORK ENCRYPTING :Restricts access to authorized uses on wireless network.WEA(WIRED EQUIVALENT PRIVACY) is one of the best-known wireless encryption protocols.

Page 18: Privacy , Security and Ethics Presentation

Ethics

Page 19: Privacy , Security and Ethics Presentation

Ethics ? Standards of moral products.

-the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.

Page 20: Privacy , Security and Ethics Presentation

2 important issues in computer ethics.

1. Copyright and Digital Right Management

2. Plagiarism

Page 21: Privacy , Security and Ethics Presentation

Copyright

• Gives content creators the right to control the use and distribution of their work.Example of materials :• Paintings , books , music, films , video games.

Others : make unauthorized copies• Digital media. (violates copyright)

Page 22: Privacy , Security and Ethics Presentation

Software piracy• Is the unauthorized copying and distribution of software.Digital Millennium Copyright Act-established the right of the program owner to make a backup copy and disallow the creation of copies.-illegal to download copyright-protected music and videos from Internet.

Digital rights management (DRM)-collection of technologies designed to prevent copyright violations. -control the number of devices that can access given file.-limits the kinds of devices that can access a file.

Page 23: Privacy , Security and Ethics Presentation

Plagiarism• The illegal and unethical representation of

some other person’s work and ideas as your own without giving credit to the original source.

• Example : cutting & pasting Web content into a report or paper.

Page 24: Privacy , Security and Ethics Presentation

Carrier in ITCryptographers design encryption algorithms,

break codes, and provide support to nasional security efforts.

PhD in mathematics and broad experience in computer science are required.

Salary range is $60.000 to over $100,000.

Page 25: Privacy , Security and Ethics Presentation

The End . Thank you for your

attention

Page 26: Privacy , Security and Ethics Presentation