COSC-100 (Elements of Computer Science) Prof. Juola

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

4 Information Security.
SECURITY CHECK Protecting Your System and Yourself Source:
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
CYBER CRIME AND SECURITY TRENDS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Protecting People and Information: Threats and Safeguards
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
CHAPTER 4 Information Security. Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an.
Unit 19 INTERNET SECURITY
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
BUSINESS B1 Information Security.
Mrs. Jefferson Business Information Management I.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Digital Citizenship Project By Allen Naylor Ed 505.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Security Risks Todays Lesson Security Risks Security Precautions
Computer Safety and Ethics
Add video notes to lecture
Hotspot Shield Protect Your Online Identity
DIGITAL CITIZENSHIP What You Should Know!.
Online Safety! By: Michelle Deng.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
CHAPTER 4 Information Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Mohammad Alauthman Computer Security Mohammad Alauthman
Privacy, Security, and Ethics
Identity Theft Samuel H. Slater.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

COSC-100 (Elements of Computer Science) Prof. Juola Risks COSC-100 (Elements of Computer Science) Prof. Juola

Risks of Computing Basically, what can go wrong (involving computers)? Two basic problems Computers can fail to do what they are supposed to Computers can do what they are supposed to, but to public harm Problem of balancing obvious applications with negative side-effects.

Computer Crime Similar distinction : Using computers to commit crime Committing crime on computers Substantial problem : 70% of organizations surveyed had at least one “e-crime” in 2004 Impact measured in billions of dollars What’s really going on?

Examples Direct theft of information Misrepresentation and fraud Denial of service (DOS attacks) Extortion Software/media piracy Identity theft … and so forth

“Information” Is information property? Unlike a sandwich, someone cannot steal it from you BUT,… can be very expensive to make “Intellectual Property” (IP) legal term of art Patents Copyrights Trade Secrets

IP Problems Patents - used to protect physical inventions Time-limited monopoly for public disclosure Copyrights – used to protect works of art Covers only direct expression, not contents Trade secrets – used to protect “secrets” Must be handled through contracted agreement Which, if any, is appropriate for software?

Program problems Typical threat : “the wily hacker.” Plants “hostile code” on computer which does evil things to the recipient Viruses, worms, Trojan horses, the whole bestiary The real problem : software quality is low Anything a hacker can do deliberately, I can do by accident Software not adept at dealing with mistakes

Case in point : viruses Computer virus : attaches to existing pgm When program is executed, virus attaches to other accessible pgms and/or does something evil Why did you run the virus in the first place?

Mail viruses : next step Email contains executable program (along with note saying “run me!”) More subtle – email is executable program, and you have mail configured to automatically run programs. Again, why?

Reducing risks Secret is access control. Physical access important first step “Electronic” access second step Passwords Firewalls Encryption Appropriate network policies

Security vs. Privacy Sometimes cooperative – encryption keeps email secure and private Sometimes at odds – law enforcement wiretaps vs. expectations of phone privacy

Invading privacy Computers are good at mass data storage Sometimes mass data can be very personally identifiable. Business data – Giant Eagle cards – can constitute major threat to personal privacy. Cookies and browsing habits ditto Problem – the computer never forgets….

Safe surfing Don’t trust the label Set reasonable configuration options. Take security, esp. passwords, seriously If it’s sensitive, lock it up Prepare for the worst

Ethics Know the rules and the law … but don’t let them excuse you Think about worst-case scenarios Take the long view ACM provides good code of ethics (p. 465)