Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Advertisements

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Securing Information Systems
Protecting People and Information: Threats and Safeguards
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
C4- Social, Legal, and Ethical Issues in the Digital Firm
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Securing Information Systems
Privacy, Security and Ethics
Privacy, Security and Ethics
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
CHAPTER FOUR OVERVIEW SECTION ETHICS
IT Security  .
Chapter 10 Privacy and Security.
Securing Information Systems
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Chapter 10 Privacy and Security.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter # 3 COMPUTER AND INTERNET CRIME
10 PRIVACY AND SECURITY CHAPTER
Security, Privacy, Ethics And Ergonomic
Presentation transcript:

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-2 McGraw-Hill Competencies (Page 1 of 2) Identify the most significant concerns for effective implementation of computer technologyIdentify the most significant concerns for effective implementation of computer technology Discuss the primary privacy issues of accuracy, property, and accessDiscuss the primary privacy issues of accuracy, property, and access Describe the impact of large databases, private networks, the Internet, and the Web on privacyDescribe the impact of large databases, private networks, the Internet, and the Web on privacy Discuss online identity and major laws on privacyDiscuss online identity and major laws on privacy Describe the security threats posed by computer criminals including employees, hackers, crackers, organized crime, and terroristsDescribe the security threats posed by computer criminals including employees, hackers, crackers, organized crime, and terrorists

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-3 McGraw-Hill Competencies (Page 2 of 2) Discuss computer crimes including creation of viruses and worms and implementation of denial of service attacks and Internet scamsDiscuss computer crimes including creation of viruses and worms and implementation of denial of service attacks and Internet scams Detail ways to protect computer securityDetail ways to protect computer security Discuss computer ethics including copyright law and plagiarismDiscuss computer ethics including copyright law and plagiarism Describe ways to protect copyrights and to identify plagiarism, including digital rights management and TurnitinDescribe ways to protect copyrights and to identify plagiarism, including digital rights management and Turnitin

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-4 McGraw-Hill Introduction The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy.The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-5 McGraw-Hill People Privacy – What are the threats to personal privacy and how can we protect ourselves?Privacy – What are the threats to personal privacy and how can we protect ourselves? Security – How can access to sensitive information be controlled and how can we secure hardware and software?Security – How can access to sensitive information be controlled and how can we secure hardware and software? Ethics – How do the actions of individual users and companies affect society?Ethics – How do the actions of individual users and companies affect society?

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-6 McGraw-Hill Privacy Privacy – concerns the collection and use of data about individualsPrivacy – concerns the collection and use of data about individuals Three primary privacy issues:Three primary privacy issues: –Accuracy –Property –Access

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-7 McGraw-Hill Large Databases Federal government alone has over 2,000 databasesFederal government alone has over 2,000 databases Reverse directory compiles lists of the calls we makeReverse directory compiles lists of the calls we make Data gatherersData gatherers –Information resellers or information brokers –Electronic profiles are easily created

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-8 McGraw-Hill Large Databases - Issues Your personal information is a marketable commodity, which raises many issues:Your personal information is a marketable commodity, which raises many issues: –Collecting public, but personally identifying information (e.g., Google’s Street View) –Spreading information without personal consent, leading to identity theft –Spreading inaccurate information Mistaken identityMistaken identity Freedom of Information ActFreedom of Information Act

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-9 McGraw-Hill Private Networks Employers can monitor legallyEmployers can monitor legally –75 percent of all businesses search employees’ electronic mail and computer files using snoopware –A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill The Internet and the Web Illusion of anonymityIllusion of anonymity –People are not concerned about privacy when surfing the Internet or when sending History file (right) in Web browsersHistory file (right) in Web browsers Traditional cookies from Web surfingTraditional cookies from Web surfing SpywareSpyware –Ad network or adware cookies –Web bugs –Computer monitoring software, such as keystroke loggers

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Viewing and Blocking Cookies

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Spyware Removal Anti-Spyware programsAnti-Spyware programs –Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Major Laws on Privacy Federal laws governing privacy matters have been createdFederal laws governing privacy matters have been created –Gramm-Leach-Bliley Act – protects personal financial information –Health Insurance Portability and Accountability Act (HIPAA) – protects medical records –Family Educational Rights and Privacy Act (FERPA) – restricts disclosure of educational results and records

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Security Threats to computer security include criminals, computer crimes, and other hazardsThreats to computer security include criminals, computer crimes, and other hazards Computer criminals:Computer criminals: –Employees –Outside users –Hackers and crackers –Organized crime –Terrorists

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Computer Crime Malicious ProgramsMalicious Programs –Viruses –Worms –Trojan horse –Zombies Denial of service (DoS) attacksDenial of service (DoS) attacks Internet scams, such as phishingInternet scams, such as phishing Social networking risksSocial networking risks Rogue Wi-Fi hotspotsRogue Wi-Fi hotspots Theft of hardware, software, data, and computer timeTheft of hardware, software, data, and computer time Data manipulationData manipulation –Computer Fraud and Abuse Act Computer Crimes have tripled in the past two years!

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Common Internet Scams

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Other Hazards Natural hazardsNatural hazards –Natural forces such as fires, floods, and tornadoes Civil strife and terrorismCivil strife and terrorism –Wars, riots, and terrorist activites Technological failuresTechnological failures –Voltage surge or spike –Use a surge protector Human errorsHuman errors –Data entry errors –Programmer error

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Measures to Protect Computer Security Restricting accessRestricting accessRestricting accessRestricting access Encrypting dataEncrypting dataEncrypting dataEncrypting data Anticipating disastersAnticipating disasters Preventing data lossPreventing data loss

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Restricting Access Biometric scanningBiometric scanning –Fingerprint scanners –Iris (eye) scanners PasswordsPasswords FirewallsFirewalls Return

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Encrypting Data Encryption is the process of coding information to make it unreadable, except to those who have the keyEncryption is the process of coding information to make it unreadable, except to those who have the key – encryption –File encryption –Web site encryption –Virtual private networks (VPNs) –Wireless network encryption WEP, WPA, and WPA2WEP, WPA, and WPA2 Return

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Ethics CopyrightCopyright –Gives content creators the right to control the use and distribution of their work Software piracySoftware piracy –Unauthorized copying and distribution –Digital Millenium Copyright Act –Digital rights management (DRM) PlagiarismPlagiarism

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Careers in IT Cryptography is the science of disguising and revealing encrypted informationCryptography is the science of disguising and revealing encrypted information –Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codesCryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to over $100,000/yearAnnual salary is usually between $60,000 to over $100,000/year

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill A Look to the Future A Webcam on Every CornerA Webcam on Every Corner –Images of public places are more accessible than ever before (e.g., Google Street View) –“Virtual site-seeing tours” –Public webcams continue to grow in popularity

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Open-Ended Questions (Page 1 of 2) Discuss the impact of large databases, private networks, the Internet, and the Web on privacy.Discuss the impact of large databases, private networks, the Internet, and the Web on privacy. Discuss the various kinds of computer criminals.Discuss the various kinds of computer criminals. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You McGraw-Hill Open-Ended Questions (Page 2 of 2) What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management?What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management? What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.