Ethics, Security, and Privacy What’s Right, What’s Wrong, and How Do I Protect Myself? Chapter 9.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
H-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Extended Learning Module.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Viruses & Destructive Programs
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Cyber Crimes.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
COMPUTER CRIME.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Ethics, Security, and Privacy What’s Right, What’s Wrong, and How Do I Protect Myself? Chapter 9

©2003 The McGraw-Hill Companies Student Learning Outcomes 1.Define ethics and describe what it means to use computers in an ethical fashion 2.Define copyright, Fair Use Doctrine, and pirated software 3.Identify and describe five types of threats in cyberspace

©2003 The McGraw-Hill Companies Student Learning Outcomes 4.Describe the seven types of hackers and what motivates each group 5.Define privacy and identify ways in which it can be compromised 6.Describe what you can do to protect yourself in cyberspace

©2003 The McGraw-Hill Companies Introduction Today’s society has become increasingly dependent on computers to create, store, and manage critical information. As such, it is vital to ensure that both the computers and the information they contain are protected from loss, damage, and misuse.

©2003 The McGraw-Hill Companies 9.1 Ethics Ethics – actions that have serious consequences in the lives of others. Right or wrong actions Manners – our day to day behavior toward others in situations whose effects are not likely to be far-reaching. Polite or rude behavior Societal rules fall into one of two categories

©2003 The McGraw-Hill Companies Ethics in the Use of Computers Generally it is unethical to: –Use your computer to harm others –Use your computer to steal –Abuse your power –Use or access someone else's computer resources without permission –Copy copyrighted software for your own use or to give to others. This is also illegal

©2003 The McGraw-Hill Companies Ethics and Computers Copyright –Legal protection for the expression of an idea –It is illegal to copy a copyrighted video game or other software without permission Fair Use Doctrine –Defines situations in which copyrighted material may be used Pirated software –Copyrighted software that is copied and distributed without permission of the owner p Fig. 9.1

©2003 The McGraw-Hill Companies Software TypeYour Rights CopyrightBuy a license to use it SharewareTry before you buy FreewareUse, copy, share Public DomainUse, copy, share, sell p Fig. 9.2

©2003 The McGraw-Hill Companies 9.2 Threats in Cyberspace Computers used as Weapons to: Snoop into private files Spread rumors & harass people Steal credit card numbers Steal personal identities Steal money & customer lists

©2003 The McGraw-Hill Companies Hackers Computers as Targets of Crime Cyberterrorists Script Bunnies Hacktivists Crackers

©2003 The McGraw-Hill Companies Credit Card Fraud Skimmers – that scan the number off credit cards Magnetic strip readers – that read the name, number, expiration date, and a unique code off the card as well as the number Magnetic strip readers – that read the name, number, expiration date, and a unique code off the card as well as the number Break into databases of credit card bureaus, banks, or other institutions that keep credit card records Break into databases of credit card bureaus, banks, or other institutions that keep credit card records

©2003 The McGraw-Hill Companies Identity Theft Identity theft is the impersonation by a thief of someone with good credit The thief essentially uses the victim’s credit to steal products and services

©2003 The McGraw-Hill Companies Crime & Scams in Cyberspace Travel and vacation fraud Get-rich schemes Phone fraud Health care fraud

©2003 The McGraw-Hill Companies Two Most Notorious Types of Malware Viruses Denial-of- Service Attacks

©2003 The McGraw-Hill Companies Computers as Targets Computer virus Macro virus Worm Virus hoax Denial-of-Service (DoS) attack Combination Worm/DoS

©2003 The McGraw-Hill Companies Viruses: Common Types Virus Hoax distributed with the intention of frightening people about a nonexistent virus Worm Spreads itself from computer to computer via and other Internet traffic Macro Viruses spread by binding themselves to software such as Word or Excel.

©2003 The McGraw-Hill Companies The Love Bug Worm p Fig. 9.6

©2003 The McGraw-Hill Companies Computers as Targets - cont. Denial-of-service (DOS) attacks cause thousands of access attempts to a Web site over a very short period of time, overloading the target site and shutting it down – i.e., Ping of Death Denial-of-service (DOS) attacks cause thousands of access attempts to a Web site over a very short period of time, overloading the target site and shutting it down – i.e., Ping of Death Combined Worm/DoS is a form of malware that combines a worm’s ability to propagate and denial-of-service attack’s ability to bring down a Web site. i.e., Code Red Combined Worm/DoS is a form of malware that combines a worm’s ability to propagate and denial-of-service attack’s ability to bring down a Web site. i.e., Code Red

©2003 The McGraw-Hill Companies Denial-of-Service Attack p Fig. 9.7

©2003 The McGraw-Hill Companies The Perpetrators Thrill-seeker hackers Black-hat hackers Crackers Hactivists Cyberterrorists Script bunnies White-hat or ethical hackers

©2003 The McGraw-Hill Companies Perpetrators: Hacker Definitions Thrill-seeker hackers are hackers without evil intentions Black-hat hackers are hackers with malicious intent – they’re cyber vandals Crackers are hackers who hack for profit Hacktivists are hackers who use the Internet to send a political message of some kind

©2003 The McGraw-Hill Companies Perpetrators: Hacker Definitions Cyberterrorists are hackers who seek to cause harm to a lot of people or to destroy critical systems or information Script bunnies are people who would like to be hackers but don’t have much technical expertise White-hat or ethical hackers are hackers who legitimately, with the knowledge of the owners of the IT system, try to break in to find where the vulnerable areas are located and fix them

©2003 The McGraw-Hill Companies 9.3 Privacy Matters Privacy is the right … –To be left alone –To have control over your personal information –To not be observed without your consent Privacy is the right to be free of unwanted intrusion into your private life  SimNet Concepts Support CD: “Privacy Issues”

©2003 The McGraw-Hill Companies Snooping by Others Snoopers can install key logger or key trapper software to record: –Key strokes and mouse clicks – , instant messages, chat room exchanges –Web sites visited –Applications run –Passwords Screen capture programs can be used to periodically record what’s on the screen

©2003 The McGraw-Hill Companies is Not a Private Matter is completely insecure Sent is copied and stored, at least temporarily, on four or more different computers

©2003 The McGraw-Hill Companies is Stored on Many Computers p Fig. 9.8

©2003 The McGraw-Hill Companies Information On Your Buying Habits & Preferences Information volunteered for something you want Information collected by having direct contact with a company –Web sites collect information through cookies Information sold from one company to another

©2003 The McGraw-Hill Companies Accepting Cookies p Fig. 9.11

©2003 The McGraw-Hill Companies Companies Use Internet Tools Sniffers are software that sits on the Internet analyzing traffic to find out who you are Web tracking is used to track your Internet activity Spam is electronic junk mail, usually from businesses attempting to sell you products and services Spoofing is forging the return address on an e- mail so that the message appears to come from someone other than the sender

©2003 The McGraw-Hill Companies Government Records NCIC (National Crime Information Center) –Is a huge database with information on the criminal records of more than 20 million people IRS (Internal Revenue Service) –Has income information on all tax payers. –Has access to other databases The Census Bureau –Collects information every 10 years on all the U.S. inhabitants the agency can find

©2003 The McGraw-Hill Companies 9.4 How To Protect Yourself Security in cyberspace transactions –If you buy goods and services, use common sense –Be just as careful as you are in the brick-and- mortar world

©2003 The McGraw-Hill Companies Protect Your Computer and Files Three rules that should be remembered: –If it can be stolen, lock it up –If it can be damaged, back it up –If it can come in and do damage, block it

©2003 The McGraw-Hill Companies Snooping by Others You can get free programs to disable activity-monitoring programs like Spectro Pro –Privacy Companion –Who’s Watching Me

©2003 The McGraw-Hill Companies is Never Private can be encrypted using products such as: –ZixMail –CertifiedMail –PrivacyX –SafeMessage –Disappearing

©2003 The McGraw-Hill Companies Security in Cyberspace: Credit Card and Identity Theft Give information only to reputable companies that you trust Use only secure sites, i.e., Never give out your social security number unless the law demands it Use passwords of at least 10 characters and numbers Use different passwords for different systems/sites

©2003 The McGraw-Hill Companies Security in Cyberspace: Dot.Cons Be skeptical about extraordinary performance or earnings potential Always read the fine print Always look at the site’s privacy policy Be wary of a company that doesn’t clearly state its name, address, or phone number Immediately report any fraudulent, deceptive, or unfair practices to the Federal Trade Commission

©2003 The McGraw-Hill Companies Security in Cyberspace Protect personal information Use anti-tracking software Avoid spam Use a firewall

©2003 The McGraw-Hill Companies Protecting a Computer or Network from Intruders Firewalls check and examine each message and permits nothing to enter or leave that shouldn’t. –McAfee’s Personal Firewall –Zone Labs’ ZoneAlarm Home router such as Linksys can be set up to check all incoming traffic and deny access to any that looks suspicious  SimNet Concepts Support CD: “Security Issues”

©2003 The McGraw-Hill Companies

9.5 Key Terms Black-hat hacker Cookie Copyright Cracker Cyberterrorists Denial-of-service attack Ethics Fair Use Doctrine Firewall Hacker Hacktivist Identity theft Key logger (key trapper) software Macro virus Malware

©2003 The McGraw-Hill Companies 9.5 Key Terms Pirated software Privacy Script bunny (script kiddie) Sniffer Spam Spoofing Thrill-seeker hacker Virus hoax White-hat or ethical hacker Worm

©2003 The McGraw-Hill Companies Review of Concepts 1.Sensible Internet Use and Good Manners  Should you forward personal you receive? 2.Napster, Kazaa, and Other Music Sites  In 2002, Napster left the Web for good

©2003 The McGraw-Hill Companies Hands On Projects E-Commerce 1.Browsing the Web Anonymously  Can you hide your movements in cyberspace? 2.Renting a Hotel Room 3.Making Airline Reservations

©2003 The McGraw-Hill Companies Hands On Projects Ethics, Security & Privacy 1.Expedia.com Helps to Find the Killer  Doesn’t it only help find flights, hotel rooms, rental cars, and the like?

©2003 The McGraw-Hill Companies Hands On Projects on the Web 1.Want to Know Your IP Address? 2.Codes of Ethics  See what the professionals have to say 3.Parental Control Software Packages 4.What Polymorphic Viruses Are Floating around Cyberspace?  Viruses that change form to evade detection?

©2003 The McGraw-Hill Companies Hands On Projects Group Activities 1.How Does HIPAA Protect Your Personal Health Information 2.Helping a Friend 3.Providing Personal Information 4.Ethics and Laws 5.Debating Privacy 6.Digital Signatures and Certificates