Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Information Technology INT1001
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9: Privacy, Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Discovering Computers 2010
Chapter Nine Maintaining a Computer Part III: Malware.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Viruses & Destructive Programs
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
 a crime committed on a computer network, esp. the Internet.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security Issues, Ethics, & Emerging Technologies in Education
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
 Introduction to Computing  Computer Programming  Terrorisom.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer crimes.
Privacy, Security and Ethics
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
DIGITAL CITIZENSHIP What You Should Know!.
IT Security  .
Protect Your Computer Against Harmful Attacks!
Privacy, Crime, and Security
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1

Privacy in Cyberspace Privacy is an individual’s ability to eliminate the collection, use, and sale of confidential personal information. Maintaining anonymity—the means to communicate without disclosing one’s identity—is more difficult with the use of computers and the Internet. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall2

Privacy in Cyberspace Protecting privacy online Use products such as Anonymous Surfing or IronKey Secure USB flash. Use free Web-based addresses in chat rooms and for mailing lists. Tell children not give out personal information. Complete forms only if you see a privacy statement. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall3

Privacy in Cyberspace Create logins and passwords for each person using the computer. Do not save account numbers or passwords. Close a secured account site when you are not at a computer. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 4 Protecting privacy at home

Computer Crime & Cybercrime Computer-based activities that violate the law are known as computer crimes. Cybercrimes are crimes perpetrated through the Internet. Cyberlaw is the area of law dedicated to computer crime. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall5

Computer Crime & Cybercrime Types of computer crime Identify theft is when a criminal gains access to personal information in order to impersonate someone. Criminals sometime use phishing attacks— legitimate-looking s or Web sites created in an attempt to obtain confidential data about a person. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall6

Computer Crime & Cybercrime Types of computer crime Malware (short for malicious software) refers to programs that intentionally harm a computer system or allow individuals to gain access to it without the owner’s permission. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall7

Computer Crime & Cybercrime Types of computer crime Spyware is software that gathers private information and tracks Web use and then provides that information to third parties. Adware is a form of spyware that generates annoying pop-up and banner ads Keyloggers record keystrokes to provide cybercriminals with confidential data Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall8

Computer Crime & Cybercrime Types of computer crime A computer virus is code concealed inside a program that can harm or destroy files. Many are spread through attachments. File infectors attach themselves to files. Boot sector viruses execute each time you start the computer. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall9

10 Computer Crime & Cybercrime

More rogue programs A time bomb is a virus program that remains dormant on a computer system until it is activated by a specific event. A worm is similar to a virus but does not need the action of a user to execute the code and cause damage. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall11 Computer Crime & Cybercrime

More rogue programs A Trojan horse is a normal-looking program that includes concealed instructions created to cause harm. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall12 Computer Crime & Cybercrime

Hackers Cyberstalkers Cyberbullies Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall13 Types of computer criminals

Computer Crime & Cybercrime Cyberstalkers Use the Internet, social networking sites, and e- mail to harass or threaten an individual. Most perpetrators are men. Cyberbullies Send threatening messages via or text message. Usually involves minors. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall14

Security Computer security risk Any intentional or unintentional action that results in damaging a computer system or its data Increased by wireless LANs because transmissions occur over shared airwaves instead of dedicated lines Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall15

Security Protecting your computer system Use biometric authentication—the use of voice recognition, retinal scans, and fingerprint scans for authentication purposes. Incorporate firewalls, which can be hardware or software, to prevent unauthorized access. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16

Protecting yourself Do business with reputable companies. Don’t give out personal information. Be cynical of chat room information. Read documents carefully. Remain cautious when using the Internet. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall17 Security