Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

How to protect yourself, your computer, and others on the internet
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Ethics, Security, and Privacy What’s Right, What’s Wrong, and How Do I Protect Myself? Chapter 9.
SECURITY CHECK Protecting Your System and Yourself Source:
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Internet Safety/Cyber Ethics
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Cyber Crimes.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project By Allen Naylor Ed 505.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Ethics. Ethics are the principles and standards we use to decide how to act.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Add video notes to lecture
IT Security  .
BCT 2.00 Analyze Technology Issues
Social Issues in Computing
Social Issues in Computing
Presentation transcript:

Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Objectives 1.Understand that ethics applies in the use and ownership of computers. 2.Realize that communications partners in cyberspace are people too. 3.Define the types of threats and crimes that involve computers. 4.Identify the players and their motives in computer crime.

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Objectives cont. 5.Understand how personal information is gathered and used and think about the implications. 6.Realize that you can take steps to protect yourself and your property from computer crime.

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved A:// Ethics and Manners Ethics – actions that have serious consequences in the lives of others –Right or wrong actions Manners – our day to day behavior toward others in situations whose effects are not likely to be far-reaching –Polite or rude behavior

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Ethics in the Use of Computers Use your computer to harm others Use your computer to steal Abuse your power Use or access someone else's computer resources without permission Copy copyrighted software It is unethical to:

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Ethics and Computers Copyright –Legal protection –It is illegal to copy a copyrighted video game or other software without permission Fair Use Doctrine –Defines the situation in which copyrighted material may be used Pirated software

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Software TypeYour Rights CopyrightBuy a license to use it SharewareTry before you buy FreewareUse, copy, share Public DomainUse, copy, share, sell

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Cyber-Manners Netiquette – good manners or courtesy in cyberspace –Consideration –Respect Netiquette in the click world mirrors etiquette in the brick world Give examples of courtesy when using .

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved ISeries Insights Ethics, Security & Privacy Remember that is not private Employer has right to monitor your “If in doubt, leave it out”

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Making the Grade Section A: // 1. The set of principles and standards we use in determining what to do in situations that affect other people is called ______. 2. The _____ says that copyrighted material may be used in certain situations. 3. When you buy copyrighted software, you’re buying only the _____ to use it. 4. ______ is copyrighted software that is copied and distributed without the permission of the owner.

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved B:// Threats in Cyberspace Computers used as weapons –To steal money, customer lists, personal identities, credit card numbers, etc. Computers are targets of computer crime –Hackers invade or damage other people’s computers

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Computers as Weapons Credit card theft Identity theft - financial identity Dot-cons – scams on the Internet

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Sites that Encrypt Information

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Computers as Targets Computer viruses Macro viruses Worm Virus hoax Denial-of-Service (DoS) Combination Worm/DoS

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved The Love Bug Worm

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Denial-of-Service Attach

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved The Perpetrators White-Hat hackers Black-Hat hackers Crackers Hactivists Script bunnies Ethical hackers

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Making the Grade Section B: // 1. _____ theft is the impersonation by a thief of someone with good credit. 2. A _____ is a very knowledgeable computer user who uses his or her knowledge to invade other people’s computers. 3. A computer _______ is software designed intentionally to cause annoyance or damage. 4. When thousands of computers overload a target site by trying to access it at the same time, the target site may be a victim of a(n) ___________ attack.

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved C:// Privacy Matters Privacy is the right … –To be left alone –To have control over your personal information –To not be observed without your consent Privacy is the right to be free of unwanted intrusion into your private life

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Information On Your Buying Habits & Preferences Information you volunteer Information collected by contact –Web sites collect information through cookies Information sold from one company to another –Sniffer software and Web tracking –Spam

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Accepting Cookies

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Government Records NCIC (National Crime Information Center) IRS (Internal Revenue Service) The Census Bureau

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved IBuy Get Yourself Virus Protection More than 50,000 viruses in circulation Many ISPs have anti-virus software Set up an anti- virus protection on your computer

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Making the Grade Section C: // 1. _________ is the right to be left alone when you want to be. 2. A _______ is software that analyzes Web traffic. 3. _________ is electronic junk mail. 4. _________ is forging the return address on .

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved D:// How To Protect Yourself Security before you enter cyberspace –If it can be stolen, lock it up –If it can be damaged, back it up Security in cyberspace transactions –If you buy goods and services, use common sense –Be just as careful as you are in the brick- and-mortar world

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved How Do I Protect Myself in Cyberspace? Credit card & identity theft –Give information only to reputable companies –Use only secure sites, i.e., –Use different passwords for different sites Dot-Cons –Be skeptical about extraordinary offers –Always read the fine print –Report fraud to the Federal Trade Commission

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Government Protection Federal Trade Commission

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved How Do I Protect Myself in Cyberspace? Protect personal information Use anti-tracking software Avoid spam Use a firewall –Protects a computer or network from intruders –Checks and examines messages

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Firewall

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Making the Grade Section D: // 1. A _______ is hardware and/or software that protects computers from intruders. 2. ________ software prevents your being tracked while you’re surfing. 3. The _______ tracks consumer fraud of all kinds. 4. Your ______ is the key to most information about you.

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved E:// “Key” Key Terms computer virus (p. 7.11) cookie (p. 7.17) copyright (p. 7.3) cracker (p. 7.14) denial-of-service (DoS) attack (p. 7.13) ethics (p. 7.3) Fair Use Doctrine (p. 7.3) firewall (p. 7.23) hacker (p. 7.14) netiquette (p. 7.6) sniffer (p. 7.18) spam (p. 7.19) worm (p. 7.11)

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Frequently Asked Questions My friend just bought a copy of a new software program. Why can’t she make a copy for me? What’s the difference between shareware and freeware? I got an and it was typed in all capital letters. Should I tell the sender that he is being rude?

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved FAQs cont. I want to buy some items using the Internet. How can I tell if the site is secure? What is malware? Help! What is the difference between a worm and a virus? What is a hacker? I don’t want my computer to accept cookies. What will happen if I block them?

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Hands On Projects E-Commerce It is so easy and convenient to make air travel arrangements over the Web. But is the Internet putting the traditional travel agent out of business? How can these brick-and-mortar businesses remain competitive and not lose customers?

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Hands On Projects On the Web Parental Control software packages are available for parents to monitor the sites visited by their children. What do you think about software that not only monitors the Web activities of employees during working hours but also prevents access to objectionable Web sites? Is this an invasion of privacy? Discuss.

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Hands On Projects Ethics, Security, & Privacy You want to create an e-commerce music business. You don't want to run into the same legal problems as Napster. Discuss ways you can offer some free downloads, but also charge for others. You don't want recording companies to sue you, so how can stay within the legal realm of the law and still be profitable?

McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved Hands On Projects Group Activities Many states have a database of unclaimed property that can include sums of money – large and small. Visit the site for your state and see if anything is waiting for you to claim. Genealogical research is really popular on the Internet. Find some Web sites and see what is needed to conduct a search.