IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Slides:



Advertisements
Similar presentations
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Computer Security and Safety, Ethics and Privacy.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
Crime and Security in the Networked Economy Part 4.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Living in a Digital World Discovering Computers 2010.
Discovering Computers Fundamentals, 2012 Edition Living in a Digital World.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Living in a Digital World Discovering Computers 2011.
Security Issues and Ethics in Education
Discovering Computers 2010
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 11 Computer Security and Safety, Ethics, and Privacy.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Pertemuan 11 Understanding Computers Privacy & Health Concerns Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Security, Ethics and Privacy Chapter 11.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Chapter TIK XII Science. DATABASE MANAGEMENT.
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
Chapter 11 Objectives Describe the types of computer security risks
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Living in a Digital World Discovering Computers 2010.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education.
Living in a Digital World Discovering Computers 2011.
Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Your Interactive Guide to the Digital World Discovering Computers Manage Computing Securely, Safely, and Ethically Chapter Eleven.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Security Issues & Ethics in Education By Maud Mushayamunda.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Chapter Nine (Part 1).
Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Computer Security, Ethics and Privacy
Chapter 11 Computer Security, Ethics and Privacy
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Computer Security, Ethics and Privacy
Presentation transcript:

IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics

Computer Security Risks A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Computer Security Risks Cybercrime Online or internet based illegal acts An FBI top 10 priority

Viruses, Worms, Trojan Horses Virus A potentially damaging computer program

Viruses, Worms, Trojan Horses Worm A program that copies itself to create some type of problem for the infected computer or network

Viruses, Worms, Trojan Horses Trojan Horse A program that hides within a legitimate program. Activates on some trigger.

Viruses, Worms, Trojan Horses Virus Symptoms: Unusual Screen Messages Music or Sounds play randomly Memory is reduced Programs disappear Files are corrupted Programs do not work correctly Unknown programs appear System properties change

Viruses, Worms, Trojan Horses How do we get these? Opening an infected file Running an infected program Booting an infected computer with a disk that is infected Opening infected messages

Viruses, Worms, Trojan Horses There are over 90,000 known viruses, etc new viruses, etc are discovered each day

Viruses, Worms, Trojan Horses Getting rid of viruses, etc. Avast! Anti-Virus

Viruses, Worms, Trojan Horses Preventing Viruses, etc: Page 562

Unauthorized Access Using a computer or network without permission Cracker = illegally accesses a computer network Hacker = Same as cracker, but more elite status

Unauthorized Access Firewall One way to prevent hacking or cracking. It is a combination of hardware and software that blocks unwanted attacks from your computer or network

Unauthorized Access

Usernames and Passwords Username = UserID or identification Password = private combination of characters to allow access

Unauthorized Access Passwords

Biometric Devices Physical biometric systems measure a unique physical trait, such as the fingerprint or blood vessel pattern of the retina, whereas behavioral biometric systems measure a unique behavioral attribute, such as the way a person talks or signs his or her name.

Unauthorized Access Biometric Devices

Unauthorized Access Biometric Devices

Theft Prevent Hardware Theft Physical location Physical security Regular visual inspection

Theft Prevent Software Theft License Agreements Activation Schemes Regular System Scans

Theft Prevent Information Theft Encryption & Decryption

Theft

Theft Two Types of Encryption: In private-key encryption, the sender and receiver of information share a secret--a key that is used for both encryption and decryption. In public-key encryption, two different mathematically related keys (a key pair) are used to encrypt and decrypt data. Information encrypted with one key may only be decrypted by using the other half of the key pair.

Theft PGP (Pretty Good Privacy) Encryption Software

System Failure Noise = any unwanted signal mixed with normal voltage input to the computer Under voltage = electrical supply drops Over voltage = Power Surge

System Failure Safeguards Surge Protector (Minimum Protection) UPS – Uninterruptible Power Supply (Best Protection) APC 750VA UPS = $ 90.00

Backup The Ultimate Safeguard Making copies of your important files

Internet Security Risks Denial of Service Attacks (DoS Attack) An assault on computer networks to disrupt service

Internet Security Risks Internet Transactions Digital Certificates SSL (Secure Sockets Layer) SET (Secure Electronics Transactions) Digital Signatures

Ethics and Society Computer Ethics Page 578

Ethics and Society Information Accuracy Everything you see on the internet may not be accurate. You have to learn to judge or discern what is correct and what is not Remember what your parents used to say: “Just because it is on TV or radio or in a newspaper doesn’t mean it is true!” Also “Would you jump off a bridge if your friends did?”

Ethics and Society Intellectual Property Rights Rights of the creator to their own work(s) Copyright – Automatically given when you create something, doesn’t have to be registered to be upheld in court

Ethics and Society IT Code of Conduct Page 580

Ethics and Society Information Privacy Your right to deny or restrict the use of your personal information Page 581

Ethics and Society Cookies A small text file that a web server stores on your computer

Ethics and Society Spyware A program placed on your computer without your knowledge that secretly collects information about you. Adaware SE Spybot

Ethics and Society Spam Unsolicited 4 out of 5 messages are spam today

Ethics and Society Employee Monitoring Using a computer to observe, record and review an employee’s use of a computer.

Ethics and Society Content Filtering Restricting access to certain material on the web

Health Concerns RSI – Repetitive Strain Injury CTS – Carpal Tunnel Syndrome CVS – Computer Vision Syndrome Blindness recently reported as related to Short-Sightedness and long-term computer monitor use

Health Concerns Computer Addiction When computers consume someone’s entire social life

Health Concerns IAD – Internet Addiction Disorder When using the internet consumes someone’s entire social life but feels social to the addict as they interact with others via the internet

Health Concerns Symptoms of both disorders: Craves Computer Time Overjoyed when at computer Unable to stop computer activity Irritable when not at a computer Neglects family and friends Problems at work or school

Chapter 11 Questions?

Assignment 07 At Issue 11-2 on page 568 Answer the questions as presented and defend your opinion. Show references as well.