Chapter 10.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 9: Privacy, Crime, and Security
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
Chapter 10 Privacy and Security McGraw-Hill
Slides created by Bob Koziel Hagerstown Community College.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Security Issues and Ethics in Education
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 11 Security and Privacy: Computers and the Internet.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Computer Ethics for Computer Users
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Security Issues, Ethics, & Emerging Technologies in Education
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
BUSINESS DRIVEN TECHNOLOGY
Safeguarding Computer Systems
Add video notes to lecture
IT Security  .
Cyber Crimes Chunlian QU 9/18/2018.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Chapter 10: Privacy, Security, and Ethics
Network and Internet Security and Privacy
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Programming I
Faculty of Science IT Department By Raz Dara MA.
Computer Security.
Computer Security By: Muhammed Anwar.
Privacy, Security, and Ethics
Presentation transcript:

Chapter 10

Module 10A Ethics Module 10B Security Module 10C Current Issues & Controversies Module 10D Emerging Technologies Chapter 10

Ethics Avoiding Computer-Related Legal Problems Introducing Ethics Computer Ethics for Computer Users Computer Ethics for Computer Professionals Module A

Avoiding Computer-Related Legal Problems Ethics Avoiding Computer-Related Legal Problems Plagiarism copyright infringement Software Piracy public domain software General Public License (GPL) shareware software license archival backups site license Module A

Avoiding Computer-Related Legal Problems Ethics Avoiding Computer-Related Legal Problems Module A At some colleges, plagiarism can get you thrown out of school on the first offense Several sites make hundreds of thousands of public domain and shareware programs available for downloading via the Internet, including shareware.com and Filez.

Avoiding Computer-Related Legal Problems Ethics Avoiding Computer-Related Legal Problems The following actions are illegal incorporating all or part of a GPL-licensed program in a program that you sell violating the terms of a software license making copies of site-licensed programs for your personal use at home giving or selling copies of commercial programs to others Module A

Avoiding Computer-Related Legal Problems Ethics Avoiding Computer-Related Legal Problems Module A Email use Your email is not private! Many people have lost their jobs after making fun of their boss in what they thought was a private email message

Avoiding Computer-Related Legal Problems Ethics Avoiding Computer-Related Legal Problems Module Adult sites & erotica newsgroups hostile environment Obscenity Unauthorized computer access hacker A

Ethics Introducing Ethics Module A Ethics is the branch of philosophy that’s concerned with determining what’s right and wrong, especially in the context of moral dilemmas

Introducing Ethics Moral dilemmas arise in two situations when it’s not clear which, if any, moral rule applies when 2 or more rules apply, and they conflict An act is ethical if . . . were everyone to act the same way, society as a whole would benefit it treats people as an end in themselves, rather than as a means to an end impartial observers would judge that it is fair to all parties concerned Module A

Thinking Through Moral Dilemmas Ethics Thinking Through Moral Dilemmas A practical guide: You’d be proud to tell your mom or dad If you were in the other person’s shoes, you’d admit that your action was fair If you did it at work, your company’s customers would agree that you did the right thing . . . You wouldn’t mind reading about your action on the front page of your newspaper Module A

Ethics for Computer Users Computer ethics for computer users respecting yourself respecting others respecting academic integrity Module A

Ethics for Computer Professionals Excerpt from the Code of Ethics of the Institute for Certification of Computing Professionals Module Essential elements relating to conduct that identify a professional activity: high standard of skill & knowledge confidential relationship with people served public reliance upon the standards of conduct in established practice observance of an ethical code A

Ethics for Computer Professionals Safety first Additional ethical responsibilities competence responsibility integrity Module A Dozens of professional associations govern computing professionals. For links to their codes of ethics, see the Illinois Institute of Technology’s Codes of Ethics Online: Computing & Information Systems page

Ethics for Computer Professionals Programmer liability Computer ethics in business Whistle-blowing Module A For more information on the controversies surrounding whistle-blowing, see the Whistle-blowing links page put together by students at North Carolina State University

Security Scope of the Problem Computer Intruders’ Tools and Techniques Meet the Attackers What’s at Stake? Safeguarding Computer Systems Module B

Security Security The scenario . . . Module B On Christmas Day, 1995, Tsutomu Shimomura, a computational physicist, was about to leave for a skiing trip. But he made a most unwelcome discovery. By means of the Internet, an intruder broke into the computers he keeps at his beach cottage near San Diego. Stolen were hundreds of pages of information concerning Shimomura’s research on cellular phone security . . .

Security Scope of the Problem Most unauthorized intrusions go undetected and the attackers are never caught Module B Kevin D. Mitnick was charged with violating several Federal laws including computer fraud and causing damage to computer systems

Computer Intruders’ Tools & Techniques Security Computer Intruders’ Tools & Techniques Tricks for obtaining passwords: password guessing shoulder surfing packet sniffers dumpster diving social engineering superuser status Module B

Computer Intruders’ Tools & Techniques Security Computer Intruders’ Tools & Techniques Salami shaving & data diddling Forgery Security loophole detection programs Computer viruses file infectors boot sector virus macro virus time bombs worm trojan horse Module B

Meet the Attackers Computer hobbyists Disgruntled employees Spies Security Meet the Attackers Computer hobbyists hackers crackers computer virus authors Disgruntled employees logic bomb Spies corporate espionage Module B

Meet the Attackers Enemies & terrorists information warfare Security Meet the Attackers Enemies & terrorists information warfare network warfare structural sabotage information terrorism Module B Find the latest news about virus hoaxes at Rob Rosenberger’s Computer Virus Myths Home Page For more information on information warfare, including news reports, links, and analysis, see infowar.com

What’s at Stake Consumption of staff time Downtime Fraud and theft B Security What’s at Stake Consumption of staff time Downtime Fraud and theft Module B For security measures, users should lock their doors and turn off their computers. In some cases, it may be wise to secure hardware to desks to prevent theft

What’s at Stake Adverse publicity Vandalism Character assassination Security What’s at Stake Adverse publicity Vandalism Character assassination Loss of privacy Risks to public safety Denial of service Module B

Safeguarding Computer Systems Security Safeguarding Computer Systems Protecting computers from power-relate problems power surges & power outages autosave uninterruptible power supply (UPS) Module B A UPS is battery powered device that provides power to your computer for a limited time in a power outage

Safeguarding Computer Systems Security Safeguarding Computer Systems Controlling access callback systems tokens digital certificates smartcards biometric authentication Module B Smartcards are credit-card-sized devices wit their own internal memories

Safeguarding Computer Systems Security Safeguarding Computer Systems Firewalls Encryption Antivirus programs or vaccines Data backups full backups incremental backups disaster recovery plan Module B

Current Issues and Controversies Module The Encryption Debate Obscenity and Indecency Privacy C

Current Issues & Controversies The scenario . . . Module C Identity theft is one of the fastest-growing crimes in the U.S. and Canada. Criminals obtain enough information about you to open a credit account in your name, and then max it out -- leaving you with the bill.

The Encryption Debate Encryption (coded message) basics Current issues & controversies The Encryption Debate Encryption (coded message) basics rot-13 Problem of key interception Public-key encryption public-key Module C For more information concerning public-key encryption, visit the RSA Laboratories’ Frequently-Asked Questions on Cryptography page

The Encryption Debate Security issues of strong encryption Current issues & controversies The Encryption Debate Security issues of strong encryption key escrow key recovery Export restrictions bit length Global dimension Module C To get the latest news and perspectives about cryptography issues, visit the Center for Democracy and Technology’s Crypto Debate page

Obscenity & Indecency Obscenity Indecency Current issues & controversies Obscenity & Indecency Obscenity Indecency Communications Decency ACT (CDA) Filtering software World Wide Web Consortium (W3C) Platform for Internet Content Selection (PICS) The Global Dimension Module C

Current issues & controversies Obscenity & Indecency Net Nanny is one example of filtering software that enables parents to screen out Web sites that contain indecent or obscene material Module C

Current issues & controversies Privacy Module C Defined by U.S. Supreme Court Justice Louis Brandeis in 1928 as “the right to be left alone,” privacy refers to an individual’s ability to keep their personal and family business away from prying eyes

Privacy Privacy rights in the U.S. Databases of personal information Current issues & controversies Privacy Privacy rights in the U.S. Databases of personal information How is information collected? Is self-regulation sufficient? Proposed solutions Platform for Privacy Preferences (P3) The Global Dimension Module C

Protecting Your Privacy Online Current issues & controversies Protecting Your Privacy Online To safeguard your privacy . . . Don’t use your employer’s computers for personal email Tell children not to divulge personal information to strangers online Don’t fill out site registration forms unless you see a privacy policy statement Module C Web sites can collect information without your knowledge and consent. To see an example, visit the Center for Democracy and Technology’s CDT Privacy Demonstration Page

Emerging Technologies Module Tomorrows Hardware: Faster, Cheaper, Connected Artificial Intelligence: Toward the Smart Machine? Social Impact of AI: Sharing the World with Machines Who Think D

Emerging Technologies The prediction . . . Module D What will computers be like in the future? It’s very easy to predict the future -- the hard part is getting it right, and that’s particularly true where technology is concerned. Past predictions don’t offer much comfort . . .

Tomorrow’s Hardware: Faster, Cheaper, Connected Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D Moore’s Law Metcalfe’s Law As computers become faster, cheaper, and more valuable, they’ll encourage the trend towards the digitization of all the world’s information and knowledge

The Short Term Typical personal computer: Today & 2005 D Emerging technologies The Short Term Typical personal computer: Today & 2005 Module D

Tomorrow’s Hardware: Faster, Cheaper, Connected Emerging technologies Tomorrow’s Hardware: Faster, Cheaper, Connected Module D The long term ubiquitous (everywhere) computing Limits of trend extrapolation

Artificial Intelligence: Toward the Smart Machine Emerging technologies Artificial Intelligence: Toward the Smart Machine Defining intelligence learn and retain the learned knowledge reason on the basis of the knowledge plan (develop strategies) communicate recognize patterns Module D For information on artificial intelligence, an excellent starting point is AI on the Web.

Artificial Intelligence: Toward the Smart Machine Emerging technologies Artificial Intelligence: Toward the Smart Machine AI is the field that attempts to endow computers with intelligence. Although scientists know little about the human brain, it's clear that the brain is far more complex than any computer Module D

The Human Brain As a CPU Speculative estimates D Emerging technologies Module D

Emerging technologies The Turing Test British computer scientist Alan Turing. According to most psychologists, the Turing Test's type-and-response method is too simplistic. Module D

Artificial Intelligence Emerging technologies Artificial Intelligence Brute force AI achievements On May 11, 1997, Big Blue defeated Russian chess master Garry Kasparov Module D

Artificial Intelligence Emerging technologies Artificial Intelligence Module D Natural language speech recognition Major advances have been made in speech recognition, in which computers translate spoken speech into text

Artificial Intelligence Emerging technologies Artificial Intelligence Machine translation Expert systems knowledge representation knowledge base Intelligent agents Pattern recognition Fuzzy logic Module D Try machine translation yourself by visiting Babelfish, an online Web translator created by AltaVista

Robots Emerging technologies Increasingly, robots are performing tasks such as assembly, welding, material-handling, and material transport Module D Like to build your own robot? Visit Mondo-Tronics Robot Store where you’ll find nearly 300 robot kits and accessories

Artificial Intelligence Emerging technologies Artificial Intelligence Strong AI CYC Cog neural networks genetic algorithms Module D The brain contains billions neurons. In a neural net, thousands of computer processing units are connected in multiple ways, just as the neurons in the brain are connected

Social Impact of AI: Sharing the World with Machines Who Think Emerging technologies Social Impact of AI: Sharing the World with Machines Who Think Asimov’s Three Laws of Robotics First: A robot may not injure a human being . . . Second: A robot must obey the orders given it by human beings except where it may conflict with the First Law Third: A robot must protect its own existence as long as such protection does not conflict with the First or Second Law Module D