IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics
Computer Security Risks A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer Security Risks Cybercrime Online or internet based illegal acts An FBI top 10 priority
Viruses, Worms, Trojan Horses Virus A potentially damaging computer program
Viruses, Worms, Trojan Horses Worm A program that copies itself to create some type of problem for the infected computer or network
Viruses, Worms, Trojan Horses Trojan Horse A program that hides within a legitimate program. Activates on some trigger.
Viruses, Worms, Trojan Horses Virus Symptoms: Unusual Screen Messages Music or Sounds play randomly Memory is reduced Programs disappear Files are corrupted Programs do not work correctly Unknown programs appear System properties change
Viruses, Worms, Trojan Horses How do we get these? Opening an infected file Running an infected program Booting an infected computer with a disk that is infected Opening infected messages
Viruses, Worms, Trojan Horses There are over 90,000 known viruses, etc new viruses, etc are discovered each day
Viruses, Worms, Trojan Horses Getting rid of viruses, etc. Avast! Anti-Virus
Viruses, Worms, Trojan Horses Preventing Viruses, etc: Page 562
Unauthorized Access Using a computer or network without permission Cracker = illegally accesses a computer network Hacker = Same as cracker, but more elite status
Unauthorized Access Firewall One way to prevent hacking or cracking. It is a combination of hardware and software that blocks unwanted attacks from your computer or network
Unauthorized Access
Usernames and Passwords Username = UserID or identification Password = private combination of characters to allow access
Unauthorized Access Passwords
Biometric Devices Physical biometric systems measure a unique physical trait, such as the fingerprint or blood vessel pattern of the retina, whereas behavioral biometric systems measure a unique behavioral attribute, such as the way a person talks or signs his or her name.
Unauthorized Access Biometric Devices
Unauthorized Access Biometric Devices
Theft Prevent Hardware Theft Physical location Physical security Regular visual inspection
Theft Prevent Software Theft License Agreements Activation Schemes Regular System Scans
Theft Prevent Information Theft Encryption & Decryption
Theft
Theft Two Types of Encryption: In private-key encryption, the sender and receiver of information share a secret--a key that is used for both encryption and decryption. In public-key encryption, two different mathematically related keys (a key pair) are used to encrypt and decrypt data. Information encrypted with one key may only be decrypted by using the other half of the key pair.
Theft PGP (Pretty Good Privacy) Encryption Software
System Failure Noise = any unwanted signal mixed with normal voltage input to the computer Under voltage = electrical supply drops Over voltage = Power Surge
System Failure Safeguards Surge Protector (Minimum Protection) UPS – Uninterruptible Power Supply (Best Protection) APC 750VA UPS = $ 90.00
Backup The Ultimate Safeguard Making copies of your important files
Internet Security Risks Denial of Service Attacks (DoS Attack) An assault on computer networks to disrupt service
Internet Security Risks Internet Transactions Digital Certificates SSL (Secure Sockets Layer) SET (Secure Electronics Transactions) Digital Signatures
Ethics and Society Computer Ethics Page 578
Ethics and Society Information Accuracy Everything you see on the internet may not be accurate. You have to learn to judge or discern what is correct and what is not Remember what your parents used to say: “Just because it is on TV or radio or in a newspaper doesn’t mean it is true!” Also “Would you jump off a bridge if your friends did?”
Ethics and Society Intellectual Property Rights Rights of the creator to their own work(s) Copyright – Automatically given when you create something, doesn’t have to be registered to be upheld in court
Ethics and Society IT Code of Conduct Page 580
Ethics and Society Information Privacy Your right to deny or restrict the use of your personal information Page 581
Ethics and Society Cookies A small text file that a web server stores on your computer
Ethics and Society Spyware A program placed on your computer without your knowledge that secretly collects information about you. Adaware SE Spybot
Ethics and Society Spam Unsolicited 4 out of 5 messages are spam today
Ethics and Society Employee Monitoring Using a computer to observe, record and review an employee’s use of a computer.
Ethics and Society Content Filtering Restricting access to certain material on the web
Health Concerns RSI – Repetitive Strain Injury CTS – Carpal Tunnel Syndrome CVS – Computer Vision Syndrome Blindness recently reported as related to Short-Sightedness and long-term computer monitor use
Health Concerns Computer Addiction When computers consume someone’s entire social life
Health Concerns IAD – Internet Addiction Disorder When using the internet consumes someone’s entire social life but feels social to the addict as they interact with others via the internet
Health Concerns Symptoms of both disorders: Craves Computer Time Overjoyed when at computer Unable to stop computer activity Irritable when not at a computer Neglects family and friends Problems at work or school
Chapter 11 Questions?
Assignment 07 At Issue 11-2 on page 568 Answer the questions as presented and defend your opinion. Show references as well.