Chapter 11 Security and Privacy: Computers and the Internet.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Module 12 Ethics and Security in Computing Some social issues in computing –Division issues, workplace issues, legal issues –protecting children on the.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Protecting People and Information: Threats and Safeguards
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Module 13: Ethics and Security in computing Some social issues in computing Division issues, workplace issues, legal issues Division issues, workplace.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computer Programming I
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
First Look at Security and Privacy Jeremiah Burleson.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
MIS105 Chapter 14 Security and Privacy. Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution Describe.
Network and Internet Security and Privacy
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Network and Internet Security and Privacy
Computer Programming I
Computers: Tools for an Information Age
Presentation transcript:

Chapter 11 Security and Privacy: Computers and the Internet

Why are security and privacy issues? n networking has made data and information easier to access n data and information must be protected from –destruction –accidental damage –theft –espionage –unauthorized access

Computer Crime n most frequently reported computer crimes –credit card fraud –data communications fraud –unauthorized access to computer files –unlawful copying of copyrighted software

People n hackers - people who attempt to gain access to computer systems illegally n electronic pickpockets - people who use computers to illegally transfer money, goods, or other valuables n white-hat hackers - professionals hired to try to break into a system before someone else does

“Bad Guy” Tricks n Some methods commonly used by computer criminals –bomb - program designed to trigger damage under certain conditions –data diddling - changing data before or after it is entered –denial of service attacks - bombarding a site with requests for service –piggybacking - accessing a system through someone else, may occur if the authorized user did not exit properly

More tricks –salami techniques - embezzlement technique that transfers small “slices” of money –scavenging - looking through garbage for useful information –trapdoor - an unauthorized means of entry into a legitimate program –Trojan horse - potentially harmful instructions hidden inside an otherwise useful program –zapping - software designed to bypass security systems

Discovery and Prosecution n discovery of computer crimes is often difficult n many businesses do not report crimes for fear of bad publicity n complexities of computer-related fraud often not fully understood by –law enforcement –prosecutors –judges –juries n Computer Fraud and Abuse Act (1986) –attempt to define computer crime at national level

Computer Forensics n computer forensics - uncovering computer-stored information to be used in court –used in both civil and criminal cases –relatively new field –each examination is unique

Security measures n authorized access - badges, passwords, biometrics n disaster recovery plan n software security - who do programs belong to? n data security - secure waste, internal controls, audit checks, passwords, etc. n personal computer security - surge protectors n backup files

Viruses n virus - program designed to “infect” a computer –damage may include changed or deleted files, bizarre screen effects, sabotage entire computer system n worm - program designed to transfer itself over a network n retrovirus - program designed to attack antivirus software n vaccine (antivirus) - program designed to detect and neutralize or remove viruses

Transmitting Viruses n programs downloaded from the Internet n diskettes n attachments to n program with the virus must be executed to activate the virus

Privacy n privacy - the right to control information about oneself n greatly compromised by giant databases and the sharing and sale of information

Privacy Legislation n Fair Credit Reporting Act of 1970 –can access and challenge credit records n Freedom of Information Act of 1970 –allows access to information gathered by federal agencies n Federal Privacy Act of 1974 –no secret personal files maintained by federal government agencies and contractors

Privacy Legislation n Video Privacy Protection Act of 1988 –prevents retailers from disclosing a person’s video rental records without a court order n Computer Matching and Privacy Protection Act of 1988 –prevents the government from comparing certain records to find a match –much of matching is still unregulated

Network Security and Privacy n firewall - software designed to protect a network from unauthorized access from the outside world n encryption - scrambling of messages to protect privacy, can be decrypted by receiver using a “key” –public key encryption allows individuals to provide a public key for encryption then use a private key to decrypt messages

Electronic Monitoring n many businesses monitor employee computer use –check current screen display –check –count keystrokes per minute n many Web sites collect information about about visitors –cookies - files that store information about you, sent to the Web server by browser when a site is visited (browser can be set to refuse them)

Junk n spamming - sending out mass messages for advertising purposes n flaming - responding in anger to n filter software - program that screens incoming

Who should access the Internet? n the Internet provides a wide variety of useful resources for adults and children n many sites are designed for an adult audience –blocking software attempts to stop users from accessing inappropriate sites –hard to keep list of sites to avoid up-to-date n Children’s Online Privacy Protection Act (2000) - requires Web sites that target children under the age of 13 to post their privacy policy and obtain parental consent