9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc. 2002 Privacy How secure is data –On system –On Internet Private network.

Slides:



Advertisements
Similar presentations
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1Balaji.S. 2 COMPUTER NETWORK AND SECURITY 3Balaji.S.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Ethics, Privacy, Security, and Social Questions Chapter 14 Computing for Right Living © The McGraw-Hill Companies, Inc., 2000.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Working with Financial Statements Chapter Three.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
© 2003 The McGraw-Hill Companies, Inc. All rights reserved. Return, Risk, and the Security Market Line Chapter Thirteen.
Air Traffic Control. 1.1 Reliability It is extremely important that the air traffic control systems are reliable and do not end up crashing. If the air.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Protecting ICT Systems
Chapter 11 Security and Privacy: Computers and the Internet.
Pre-Computer Skills Internet 1. General Concepts Internet A system of connected computers that allows your computer to exchange data, messages and files.
Defining Security Issues
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
in Information Systems and the Internet
Computer Security, Ethics and Privacy Chapter 11.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Chapter 3 OSI Model The model Functions of the layers WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
Introducing the networks and the Internet By Cody Gibbs.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Introduction to Student Name Student Class.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Anti-virus software is a necessity with computing to not only protect your work or pc but the data on the network / internet.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Cyber Safety Jamie Salazar.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
© The McGraw-Hill Companies, Inc., 1999 NickelsMcHughMcHugh.
Fundamentals of Information Systems
What is Information Security?
Presentation transcript:

9 99 CHAPTER Privacy and Security - FAQ’s

9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network privacy Laws to protect people

9 © The McGraw-Hill Companies, Inc Protect Servers and Data Keep hackers and crackers out Protect data from virus

9 © The McGraw-Hill Companies, Inc Virus Attack? HD infected? FD infected? Avoid future problems?

9 © The McGraw-Hill Companies, Inc Virus Protection Antivirus program Check disks and downloads Use virus program Update frequently Templates to read-only

9 © The McGraw-Hill Companies, Inc Security Concerns Protect system from infection? Protect company from theft –Employees –Former employees?

9 © The McGraw-Hill Companies, Inc Disaster? What to do in –Emergency –Power failure –Network crash

9 © The McGraw-Hill Companies, Inc Ergonomics What is it? Apply it?

9 © The McGraw-Hill Companies, Inc Environment What does environment have to do with computers?

9 © The McGraw-Hill Companies, Inc. 2002