COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Let’s Talk About Cyber Security
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses & Destructive Programs
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Protecting ICT Systems
Chapter 11 Security and Privacy: Computers and the Internet.
Possible WebQuest type links  
Viruses.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computer Ethics for Computer Users
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
 a crime committed on a computer network, esp. the Internet.
COMPUTER ETHICS Do you know the difference between right and wrong?
Unethical use of Computers and Networks
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Digital Citizenship Project By Allen Naylor Ed 505.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Skills and Applications Computer Security.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Computer Ethics IT Fundamentals Battlefield High School.
Computer Basics Technology’s Impact.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
BCT 2.00 Analyze Technology Issues
Presentation transcript:

COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001 and IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.

Safeguarding Hardware & Data Computers are vulnerable to: –Power surges –Spikes in electric current –Power failures/outages A power spike can corrupt computer hardware, rendering it inoperable and making stored information inaccessible. A power outage can wipe out any data that has not been properly saved. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.

Safeguarding Hardware & Data Safeguarding computer systems from power outages would include: –Securing electric cords so that they cannot be accidentally disconnected –Installing an uninterruptible power source (UPS) –Using surge protectors –Saving active files frequently –Backing up important files regularly (even saved data can be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities) Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.

Types of Computer Crimes Unauthorized use of a computer Infection of a computer by a malicious program (a virus) Harassment and stalking on the computer Theft of computer equipment Copyright violations of software Copyright violations of information found on the Internet Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Computer Fraud Computer Fraud is the conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Examples might include stealing money from bank accounts and stealing information from other people’s computers for gain. Managers/supervisors should be aware of signs that may be indicators of computer fraud: –Low staff morale: Unhappy staff members may decide the company “owes” them. –Unusual work patterns. –Staff members who appear to be living beyond their income. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.

Computer Hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invading someone else’s computer. Hackers are usually computer experts who enjoy having the power to invade someone else’s privacy. They can steal money or change or damage data stored on a computer. Hacking causes millions of dollars of damage each year. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Computer Viruses Source: Computer Concepts – Basics (South-Western) A virus is a program that has been written, usually by a hacker, to cause corruption of data on a computer. The virus is attached to an executable file (like a program file) and spreads from one file to another once the program is executed. A virus can cause major damage to a computer’s data or it can do something as minor as display messages on your screen. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Types of Computer Viruses A worm makes many copies of itself resulting in the consumption of system resources that slows down or actually halts tasks. Worms don’t have to attach themselves to other files. A time bomb is a virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. A logic bomb is a virus triggered by the appearance or disappearance of specified data. A trojan horse is a virus that does something different from what it is expected to do. It may look like it is doing one thing while in actuality it is doing something quite opposite (usually something disastrous). Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Types of Computer Viruses A password sniffer is a file that seeks out passwords on your computer, then sends them to a hacker. A blended threat is a program that combines characteristics of viruses, worms and Trojan horses.

Computer Virus Example CODE RED WORM CODE RED WORM – July, 2001 Infected hundreds of thousands of machines running Microsoft Internet Information Services. This virus would lie dormant for 20 days while the bug spread across the Web without doing harm. On the last day of its sleep cycle, the worm launched attacks on the White House and other government sites. The worm then mutated in an attempt to avoid detection and attacked again after the 20-day cycle. Source:

Protection Against Virus Damage Use antivirus software. The software should always run on your computer and should be updated regularly. Be careful in opening attachments. It is a good idea to save them to disk before reading them so you can scan them. Don’t access files copied from floppy disks or downloaded from the Internet without scanning them first. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Computer Security The use of passwords to restrict access to data The use of firewalls, which consist of special hardware and software The use of antivirus software to protect data on your computer The use of a very selective hiring process and careful screening of potential employees to prevent internal theft or sabotage Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Privacy Issues Anytime you submit information on the Internet, it is possible for it to be gathered by many individuals and used for various situations. Information can also be gathered from online data regarding: -School -Banking -Hospitals -Insurance -Credit History, etc. If a company provides you with , the information you send is available to the company. The company can also monitor Internet logs to determine web sites that have been visited. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.

Protection for Technology Injuries The Copyright Act of 1976: Protects the developers of software. Software Piracy and Counterfeiting Amending of Electronic Fraud and Abuse Act, 1986: Prohibits individuals without authorization from knowingly accessing a company computer to obtain records from financial communications. Computer Matching & Privacy Protection Act, 1988: Regulates how federal data can be used to determine whether an individual is entitled to federal benefits. Digital Millennium copyright Act of 1998: Prohibits people from defeating software encryption programs and other safeguards; makes the distribution of security-cracking illegal and imposes damages ranging from $200 to $2,500. Repeat offenders face criminal penalties of up to $1 million in fines or 10 years in jail. Many states have individual laws governing computer crimes in their states. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Did You Know? The first computer crime, electronic embezzlement, was committed in The penalty for copying software can be up to $250,000, five years in prison, or both. A computer won a World Chess Championship game against a human. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.

Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer ware. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8.Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt use a computer in ways that demonstrate consideration and respect.