Computers: Tools for an Information Age

Slides:



Advertisements
Similar presentations
Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Advertisements

Primary Threats to Computer Security
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Chapter 11 Security and Privacy: Computers and the Internet.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Module 12 Ethics and Security in Computing Some social issues in computing –Division issues, workplace issues, legal issues –protecting children on the.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Module 13: Ethics and Security in computing Some social issues in computing Division issues, workplace issues, legal issues Division issues, workplace.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
First Look at Security and Privacy Jeremiah Burleson.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Safety and Security issues of using ICT Alys brooks.
CONTROLLING INFORMATION SYSTEMS
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Information Security and Privacy in HRIS
MIS105 Chapter 14 Security and Privacy. Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution Describe.
Technical Implementation: Security Risks
Chapter 6 Protecting Your Files
Securing Information Systems
Add video notes to lecture
Security Of Information Systems
AS ICT Module 2 Objectives: Security of Data
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Legislation in ICT.
Why Computer Security Need???
UNIT 19 Data Security 2.
Fundamentals of Information Systems
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Ethics.
Chapter 10: Privacy, Security, and Ethics
Network and Internet Security and Privacy
Planning and Security Policies
Security of Data  
Legislation in ICT.
What is Information Security?
How it affects policies and procedures
G061 - Network Security.
Presentation transcript:

Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution Describe the aspects of securing corporate data, including software and data security, disaster recovery plans, and security legislation Describe in general terms how viruses work, the damage they can cause, and procedures used to prevent this damage Explain the threats to personal privacy posed by computers and the Internet. Describe actions you can take to maximize your privacy Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Security and Privacy Security – data stored on computer must be kept safe Privacy – private data must be kept from prying eyes Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Computer Crime Hacker – someone who attempts to gain access to computer systems illegally Originally referred to as someone with a high degree of computer expertise Social engineering – a tongue-in-cheek term for con artist actions Persuade people to give away password information Cracker – someone who uses the computer to engage in illegal activity Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Computer Crime Most commonly reported categories Credit card fraud Data communications fraud Unauthorized access to computer files Unlawful copying of copyrighted software Copyright © 2003 by Prentice Hall

Discovery and Prosecution Crimes are often undetected When they are detected, they are often not reported Prosecution is difficult Law enforcement agencies and prosecutors are ill-equipped to handle computer crime Judges and juries often don’t understand computer crime Congress passed the Computer Fraud and Abuse Act to increase awareness of computer crime Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Computer Forensics Uncovering computer-stored information suitable for use as evidence in courts of law Restores files and/or e-mail messages that someone has deleted Some experts are available for hire, but most are on the staffs of police departments and law firms Copyright © 2003 by Prentice Hall

Security: Playing It Safe Security – a system of safeguards Protects system and data from deliberate or accidental damage Protects system and data from unauthorized access Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Controlling Access Four means of controlling who has access to the computer What you have What you know What you do What you are Copyright © 2003 by Prentice Hall

A Disaster Recovery Plan A method of restoring computer processing operations and data files in the event of major destruction Several approaches Manual services Buying time at a service bureau Consortium Plan should include priorities for restoring programs, plans for notifying employees, and procedures for handling data in a different environment Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Backing Up Files Back up to tape drive, CD-RW, or DVD-RAM You can use software that automatically backs up at a certain type of day Disk mirroring Makes second copy of everything you put on disk to another hard disk Copyright © 2003 by Prentice Hall

Copyright © 2003 by Prentice Hall Computer Pests Worm Virus Copyright © 2003 by Prentice Hall