The Challenges of the Digital Age

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Discovering Computers Fundamentals, 2012 Edition
The Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Internet, Intranet and Extranets
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security and Privacy
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
9 Personal Technology 9.1 Truth Issues: Manipulating Digital Data
Chapter 11 Security and Privacy: Computers and the Internet.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
The Office Procedures and Technology
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
The Challenges of the Digital Age
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
GIT 335 Lecture 91 Arizona State University Department of Technology Management GIT 335 Computer Systems Technology Lecture 9 Challenges of the Digital.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Unethical use of Computers and Networks
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security and Ethics Privacy Employment Health Crime Working
Security, Social and Legal Issues Regarding Software and Internet.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Using Information Technology
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Cybercrime What is it, what does it cost, & how is it regulated?
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Challenges of the Digital Age Shanti Kusumawardhani, MBus.Sys.
Using Information Technology
Add video notes to lecture
THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 9 Chapter.
IT Security  .
9 Personal Technology 9.1 Truth Issues: Manipulating Digital Data
Topic 6: Issues Press F5 to view!
Securing Information Systems
Five Unethical Uses of Computers
INFORMATION SYSTEMS SECURITY and CONTROL
9 Chapter THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 9.1 Truth Issues: Manipulating Digital Data 9.2 Security Issues: Threats.
Presentation transcript:

The Challenges of the Digital Age Page 457

9.1 Truth Issues: Manipulating Digital Data Digital sound and images can be manipulated Pros: Creates new forms of art Digital technology allows musicians to sing every track of a song and accompany themselves Morphing software makes one image morph into another Movie special effects are made possible Adobe Photoshop allows changes, enhancements to photos Cons: Has made photographs and recordings untrustworthy “News” can be faked Pages 459-461 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.1 Truth Issues: Manipulating Digital Data Limitations of public databases: accuracy and completeness You can’t get the whole story Start with a public database, THEN do more research The data is not necessarily accurate Cross-check against multiple sources Each database service has boundaries Know what those boundaries are Different keywords bring different results History is limited Databases often begin with data from 1980 or later Page 462 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.2 Security Issues: Threats to Computers & Communications Systems Errors and Accidents Human errors Humans often are not good at assessing their own information Human emotions affect performance People get frustrated Human perceptions are slower than the equipment Information overload may also be a problem Page 463 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.2 Security Issues: Threats to Computers & Communications Systems Errors and Accidents (continued) Procedural errors When people fail to follow established procedures, errors can occur Software errors Software bug: an error in a program that causes it not to work properly “Dirty data” problems Incomplete, outdated, or otherwise inaccurate data Pages 463-464 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.2 Security Issues: Threats to Computers & Communications Systems Errors and Accidents (continued) Electromechanical problems Mechanical systems can wear out or become damaged They can also be badly designed or constructed Power failures and surges can damage equipment Natural hazards can lead to disasters Pages 464-465 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.2 Security Issues: Threats to Computers & Communications Systems Computer Crimes Two types of computer crime: Illegal act perpetrated against computers or telecommunications Use of computers or telecommunications to accomplish an illegal act Page 465 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.2 Security Issues: Threats to Computers & Communications Systems Computer Crimes (continued) Theft of hardware Theft of software Theft of online music and videos (piracy) Theft of time and services Theft of information: e.g., medical info, credit card info Internet-related fraud Taking over your PC: zombies, botnets, and blackmail Crimes of malice: crashing entire systems Attacks on power-control systems and attacks on the internet Pages 465-469 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.2 Security Issues: Threats to Computers & Communications Systems Computer criminals may include: Individuals or small groups who Use fraudulent email and websites Steal peoples’ identities for monetary gains Show off their power for bragging rights Employees who Have a grudge against their current or former employers Have a grudge against another employee Sell their company’s secrets for personal profit Outside partners and company suppliers Pages 469-470 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.2 Security Issues: Threats to Computers & Communications Systems Computer criminals (continued): Corporate spies Organized crime Cyberwar fighters Computer criminals do not include your employer, who is legally allowed to monitor the computers at work Check your company’s computer usage policy Make sure you follow the rules Know that any data you store in the computer at work – including emails – is company property Pages 470-471 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.3 Security: Safeguarding Computers & Communications Security is a system of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss Computer security’s five components: Deterrence of computer crime Identification and access Encryption Protection of software and data Disaster recovery plans Page 472 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.3 Security: Safeguarding Computers & Communications Deterrents to computer crime Enforcing laws CERT: The Computer Emergency Response Team Provides round-the-clock information on international computer security threats Tools to fight fraudulent and unauthorized online uses Rule-based detection software Predictive-statistical-model software Employee internet management software Internet filtering software Electronic surveillance Pages 472-473 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.3 Security: Safeguarding Computers & Communications Deterrents to computer crimes (continued) Identification and access Verify legitimate right of access by what you have, what you know, and who you are What you have: cards, keys, signatures, badges What you know: PINs and passwords; callback provision Who you are: biometrics Pages 473-474 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.3 Security: Safeguarding Computers & Communications Deterrents to computer crimes (continued) Encryption The process of altering readable data into unreadable form to prevent unauthorized access Advantage: encrypting data that is available over the internet keeps thieves and crackers from reading it Disadvantage: encrypting data may prevent law-enforcement officials from reading the data criminals are sending to one another Pages 474-475 Discussion Questions: Does information privacy outweigh law enforcement’s needs to track down and prosecute criminals? Should we all encrypt our information to prevent crackers and criminals from stealing it? © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.3 Security: Safeguarding Computers & Communications Deterrents to computer crimes (continued) Protection of software and data Restrict access to online files; use transaction logs Use audit controls to track who used what programs and servers, which files were opened, and so on Use people controls--screen applicants; do background checks; monitor internet, email, and computer usage; use shredders for discarded documents and materials Page 475 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.3 Security: Safeguarding Computers & Communications Deterrents to computer crimes (continued) Disaster-recovery plans Method of restoring information-processing operations that have been halted by destruction or accident Back up everything; put mainframes in different locations Plans range in price and complexity Automatically store data redundantly in two or more places Have an off-site computer-based data storage center with independent power supply Pages 475-476 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.4 Quality-of-Life Issues Environmental Problems Manufacturing computers and circuits can cause pollution Hazardous toxins are involved in computer manufacture Wireless devices can interfere in hospital activities and with medical devices Used computers/monitors contain chromium, cadmium, lead, mercury, PVC, and brominated flame retardants – all toxic substances that must be disposed of properly Visual pollution is created by the forest of wireless towers, roof antennas, satellite dishes, etc.; birds and bats, other wildlife, and vegetation are affected Nanotechnology carries possible risks on the molecular level Pages 476-477 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.4 Quality-of-Life Issues Mental-Health Problems Isolation: computer gamers may substitute online games for interpersonal interaction; videogame and internet addiction Online gambling is too easy Many users find computers stressful and anger-inducing Pages 478-479 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.4 Quality-of-Life Issues Protecting Children Pornography The internet has allowed the widespread distribution of sexually explicit material Online pornographers use pop-up ads, internet search engines to troll for new customers This means that children may be exposed to porn when involved in innocent online searches Parents may use online blocking software such as Cybersitter, Cyber Patrol, or Net Nanny to prevent this Pages 479-480 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.4 Quality-of-Life Issues Protecting Children (continued) They can also use DVD filters Videogame rating systems The V-chip “xxx” web addresses Pages 480-481 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.4 Quality-of-Life Issues Online Sexual Predators Prevention Strategies Monitor children’s internet use Be candid to children about the threats Caution children about revealing too much information Tell them not to engage in sexting (online information and images NEVER go away; they are there forever) Page 481 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.4 Quality-of-Life Issues Cyberbullies Another example of how information technology can negatively affect children When it happens: Save the evidence Block messages Contact an attorney or the police Cyberbullying can also occur in the workplace © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.4 Quality-of-Life Issues Workplace Problems Misuse of technology Playing online games, shopping, writing personal emails, etc. interfere with workers’ productivity and can get them fired Fussing with computers Dealing with hardware, software, and network connections can waste a lot of time, as can dealing with spam and the like Information overload With so much available technology, people tend to work more hours and get swamped by too much information © 2011 The McGraw-Hill Companies, Inc. All rights reserved.

9.5 Economic & Political Issues Technology may affect the gap between the rich and the poor (“digital divide”) Most jobs require employees who are tech-savvy People who are not tech-savvy won’t qualify for those jobs Technology is being used to replace employees in traditional jobs, traditionally filled by untrained workers Not everyone can afford computers and internet connectivity Many governments censor internet content available in their countries but they can’t control all internet political activism Internet is only loosely policed, so criminals take advantage Pages 484-486 © 2011 The McGraw-Hill Companies, Inc. All rights reserved.