1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-2 Competencies Describe concerns associated with computer.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Presented by Student Name Workplace Issues – Lecture 4.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Security Issues and Ethics in Education
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Security and Ethics Privacy Employment Health Crime Working
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Privacy, Security and Ethics
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Presentation transcript:

1010 CHAPTER PRIVACY AND SECURITY

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer technology Discuss computer ethics Discuss privacy issues Describe the security threat posed by computer criminals, computer crime, and other hazards

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies cont. Discuss ways to protect security Describe common types of risks associated with computers Discuss what the computer industry is doing, and what you can do to protect the environment

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Information System Concerns Privacy Security Ergonomics Environment

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Privacy Computer ethics provide guidelines for computer use Ethics issues Privacy Accuracy Property Access

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Large Databases Data collected daily Data gatherers Information resellers or information brokers Information profiles are created Concerns Identify theft Mistaken identity

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Private Networks Employers monitor Legally done Snoopware Software Online services right to censor content Screen and reject messages Terminate user accounts

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Internet and Web Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending History file Cookies Traditional Ad network or adware cookies

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Code of Fair Information Practice PrincipleDescription No secret databasesNo personal data that is secret Right of individual access Individuals have a right to see information about them Right of consentInformation for one purpose cannot be used again Right to correctAbility to correct errors Assurance of reliabilityData must not be misused

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Computer Criminals Employees Outside users Hackers and crackers Organized crime Terrorists

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Computer Crime Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act of 1986

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Other Hazards Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes Technological failures Voltage surge Surge protector Human errors Civil strife and terrorism Wars Riots Terrorist acts

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Measures to Protect Computer Security Encrypting messages Restricting access Anticipating disasters Backing up data Encrypted

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Restricting Access Biometric scanning Fingerprint scanners Retinal (eye) scanners Assigning passwords Firewalls Special hardware and software Controls access to internal networks

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Ergonomics

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Ergonomics Study of human factors related to things people use Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved More on Ergonomics Mental Health Noise Electronic monitoring Technostress Stress associated with computer use Harmful to people

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved The Environment

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Personal Responsibility Conserve Recycle Educate

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved A Look to the Future Presence Technology Presence technology alerts you that someone is trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Key Terms access (269) accuracy (269) ad network cookie (272) adware cookie (272) biometric scanning (280) carpal tunnel syndrome (284) chlorofluorocarbons (CFCs) (286) Code of Fair Information Practice (273) cold site (281) Computer Abuse Amendments Act of 1994 (277) computer crime (276) computer ethics (269) Computer Fraud and Abuse Act of 1986 (279) cookie (272)

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Key Terms cookie-cutter program (272) Cracker (277) cumulative trauma disorder (283) data security (281) Denial of service attack (DoS) (278) disaster recovery plan (281) electronic monitoring (284) electronic profile (270) Encrypting (280) Energy Star (285) ergonomics (282) ethics (269) firewall (280) Freedom of Information Act (271)

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Key Terms Green PC (285) hacker (277) history file (272) hot site (281) identity theft (270) illusion of anonymity (272) information brokers (270) information resellers (270) Internet scam (278) mistaken identity (271) password (280) physical security (281) privacy (269) property (269) repetitive motion injury (283)

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Key Terms repetitive strain injury (RSI) (283) scam (278) security (289) snoopware (271) Software Copyright Act of 1980 (278) software piracy (278) spike (279) spyware (272) surge protector (279) technostress (284) traditional cookie (272) Trojan horse (278) virus (277) virus checker (278) voltage surge (279) worm (277)

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved FAQs What is identity theft? How does snoopware work? I keep getting a lot of ads on my computer. What is spyware? What is the difference between hackers and crackers? My back hurts every time I sit in front of my computer. What can I do?

© 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Discussion Questions Explain how access can be restricted to a computer. Discuss the various malicious programs that can attack a computer system. What can you do to protect your privacy while on the Web? Do you feel that the Code of Fair Information Practice should be made into an enforceable law? Discuss your views.