McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Advertisements

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Privacy, Security and Ethics
Privacy, Security and Ethics
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Network and Internet Security and Privacy
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Security, Privacy, Ethics And Ergonomic
Presentation transcript:

McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security

10-2 Competencies (Page 1 of 2) Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe and control cookies, web bugs, and spyware Describe the security threats posed by computer criminals, computer crime, and other hazards Page 282

10-3 Competencies (Page 2 of 2) Discuss ways that individuals and organizations protect their security Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks Discuss what the computer industry is doing, and what you can do, to protect the environment Page 282

10-4 Introduction The ubiquitous use of computers and technology prompts some very important questions about use of personal data and privacy. This chapter will cover issues related to the impact of technology on people and how to protect ourselves on the Web. Page 283

10-5 Information Systems Concerns for People Privacy – What are the threats to personal privacy and how can we protect our selves?Privacy Security – How can access to sensitive information be controlled and how can we secure hardware and software?Security Ergonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled?Ergonomics Environment – What can individuals and organizations do to minimize the impact of technology?Environment Page 283

10-6 Computer Ethics and Privacy Privacy relates to the collection and use of personal information; concerns include: Large databases –Private networksPrivate networks –Internet/WebInternet/Web Privacy laws exist, but privacy remains primarily an ethical issue Computer ethics provide guidelines for computer use Ethics issues include: –Privacy –Accuracy –Property –Access Page 284

10-7 Large Databases Data collected daily Data gatherers –Information resellers or information brokers –Electronic profiles are created Concerns –Spreading information without consent Identify theft –Spreading inaccurate information Mistaken identity –Freedom of Information Act Page 284 Return

10-8 Private Networks Employers monitor –Legally done –Snoopware Software Online services right to censor content –Screen and reject messages –Terminate user accounts Page 286 Return

10-9 The Internet and the Web Illusion of anonymity –Not concerned about privacy when surfing the Internet –Not concerned about privacy when sending e- mail History file Cookies – two basic types –Traditional –Ad network or adware cookies Cookie-cutter programs Spyware Spy removal programs Financial Modernization Act Page 286 Return

10-10 Viewing History Files Page 287

10-11 Viewing and Blocking Cookies Page 287

10-12 Spyware Removal Anti-Spyware is used for: –Finding and removing spyware –Automating spyware removal –Staying up to date Return Page 290

10-13 Major Laws on Privacy Federal laws governing privacy matters have been created To learn more about existing privacy laws visit and enter the keyword lawwww.computing2008.com Page 292

10-14 Security and Computer Criminals Threats to computer security are criminals, computer crime, and hazards Computer criminals are of five types: –Employees –Outside users –Hackers and crackers –Organized crime –Terrorists Page 292 Return

10-15 Computer Crime Computer Crimes have tripled in the past two years Malicious Programs –VirusesViruses –Worms –Trojan horse Denial of service (DoS) Internet Scams Theft –Hardware or software –Data –Computer time Data Manipulation –Computer Fraud and Abuse Act Page 293

10-16 Commonly Encountered Viruses Page293 Return

10-17 Common Internet Scams Return Page 294

10-18 Other Hazards Natural hazards –Fires & floods –Winds –Hurricanes –Tornadoes –Earthquakes Civil strife and terrorism –Wars, riots and terrorist acts Technological failures –Voltage surge Use surge protector Hard disk crashes Human errors Page295

10-19 Measures to Protect Computer Security Encrypting messages Restricting access Anticipating disasters Backing up data Page 296

10-20 Restricting Access Biometric scanning –Fingerprint scanners –Iris (eye) scanners Assigning passwords Firewalls –Special hardware and software –Controls access to internal networks Page 297 Return

10-21 Ergonomics (Page 1 of 3) Study of human factors related to things people use Page 299

10-22 Ergonomics (Page 2 of 3) Physical Health –Eyestrain and headache –Back and neck pain –Repetitive strain injury (RSI) Page 299

10-23 Ergonomics (Page 3 of 3) Computer technology offers ways of improving productivity but can create irritants other than physical –Noise –Electronic monitoring Technostress –Stress associated with computer use Page 301 Return

10-24 Environmental Protection Page 302 The Green PC

10-25 Personal Responsibility to Help Protect the Environment What can computer users do? Conserve Recycle Educate Page 303

10-26 Careers in IT Cryptography is the science of disguising and revealing encrypted information Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to $101,000/year Page 304

10-27 A Look to the Future Presence Technology Presence technology alerts you that someone is trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances Page 305

10-28 Discussion Questions (Page 1 of 2) Discuss the impact of large databases, private networks, the Internet, and the web on privacy. Discuss the various kinds of computer criminals. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals? Page 312

10-29 Discussion Questions (page 2 of 2) What is ergonomics? How does computer use impact mental health? Physical health? Describe the basic elements of the Green PC and what you can do to protect the environment. Page 312