Computer Waste and Security Privacy Computer Health.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Security, Privacy, and Ethics Online Computer Crimes.
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Policies and procedures must be established to avoid computer waste and mistakes
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Digital Citizenship Project
1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Cyber crime & Security Prepared by : Rughani Zarana.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security, Privacy, and Ethics
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Types of Electronic Infection
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Fundamentals of Information Systems
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Policies and procedures must be established to avoid computer waste and mistakes
Presentation transcript:

Computer Waste and Security Privacy Computer Health

Policies and Procedures must be established to avoid computer waste and mistakes

Computer Waste Inappropriate use of computer technology and resources Premature retiring of computer systems Poor management of system causes failure Employees accessing Internet, sending unimportant , playing games

Computer-Related Mistakes Computers do not make mistakes Mistakes are created when: Programs contain errors Users do not know the proper steps necessary to accomplish a task Incorrect data is entered

Preventing Waste and Mistakes Establish Policies and Procedures Acquisition of computers Training Programs Manuals/Documentation System approval procedures Monitor/Review of Procedures

Computer crime is a serious and rapidly growing area of concern requiring management attention

Computer Crime Examples FBI est. computer related losses over $10 billion 1999 – Hacker stole 300,000 credit card numbers from CD Universe. Asked for $100,000 to keep #’s from being published Melissa Virus Disgruntled Employees (60 % of break-ins) 2002 – Hacker gets into US Govt. computer systems (Pentagon, Army, Navy, Air Force, NASA) Terrorists

Computer Crime Statistics

Computer Crime Social Engineering: the practice of talking an individual out of a critical computer password Dumpster Diving: searching through garbage to get information that.. Can help crack into an organizations computers Can be used to persuade someone at the company to provide access to a company's computers

Illegal Access and Use Hacker: a person who enjoys computer technology and spends time learning and using computer systems Criminal hacker (cracker): a computer- savvy person who attempts to gain unauthorized or illegal access to computer systems

Data Alteration and Destruction Data and Information are valuable corporate assets Virus: program that attaches itself to other programs Worm: an independent program that replicates its own program files until it interrupts the operations of networks and computer systems. Logic bomb: application or virus designed to “explode” or execute at a specific date/time Trojan horse: program that appears to be useful but is actually a destructive program

Information and Equipment Theft Information theft: Password sniffer: program hidden in a network that records identification numbers and passwords Computer equipment theft is second only to automobile theft

Software and Internet Piracy Copyright laws Software piracy: illegally duplicating software Internet piracy: illegally gaining access to and using the Internet

Computer Scams “Forward this to everyone you know and if it reaches 13,000 people, 1,300 of the people on the list will receive $5,000, and the rest will receive a free trip for two to Disney World for one week during the summer of 2003 at our expense. Enjoy.”

Preventing Computer-Related Crime State and Federal Agencies: 1986 – Computer Fraud and Abuse Act: punishment is based on victim’s $$ loss Dept. of Defenses Computer Emergency Response Team (CERT) States are passing new computer crime bills. View recent court cases at:

Gov. web site detailing computer crime cases

Preventing Computer-Related Crime Corporations: Biometrics: the measurement of a living trait, physical or behavioral. Add systems controls to ensure better security. Possible $$ loss must outweigh cost of creating controls Software Publishers Association (SPA): audits companies and checks for software licenses

Methods Companies can use to prevent crime

Antivirus Programs Programs that prevent viruses and recover from them if they infect a computer. Used by companies and individuals Norton Antivirus, Dr. Solomon’s Anti- Virus Toolkit, etc.

Privacy On-line Who owns data/information on you? What is public information and what is private information? Echelon (run by the National Security Agency) monitors every electronic communication in the world: cell phones, messages, etc. 70 laws are pending before Congress regarding privacy Online Privacy Alliance Privacy at work?

Online Privacy Alliance Web Site

Hardware/Software Privacy Intel Created chips with a unique serial number. Could track web related habits of people – announced it would stop stamping #’s on future chips, but not the Pentium III Microsoft – Windows 98 Word/Excel had hidden 32-digit #’s unique to the computer and associated with a person when they registered Win98. Can trace each and every document you create. After bad press, Microsoft created a patch to remove the #’s

What can you do to protect your privacy? Find out what is stored about you. Get credit report ($8) Be careful when you share information about yourself Don’t fill info. out on-line unless it is absolutely necessary Look for the sites privacy policy to educate yourself Ask doctor, bank not to share info. about you w/o consent Be proactive: Block caller id systems from reading your phone number, don’t fill out change of address forms Contact Direct Marketing Association to avoid junk mail and telemarketing

Jobs, equipment, and working conditions must be designed to avoid negative health effects.

Health Issues Cost to U.S Companies for health claims related to computer use: $27 billion/year Repetitive motion disorder/stress injury: injury caused by working with computer keyboards and other equipment Carpal tunnel syndrome: aggravation of pathway for nerves that travel through the wrist Ergonomics: study of designing and positioning computer equipment for employee health and safety