Presentation is loading. Please wait.

Presentation is loading. Please wait.

Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.

Similar presentations


Presentation on theme: "Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9."— Presentation transcript:

1 Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9

2 Chapter9 2/22 Overview Identify Concerns About Technology Describe Privacy Issues Discuss Online Identity Discuss Major Laws On Privacy Discuss Cybercrimes Discuss Computer Security Discuss Computer Ethics

3 Chapter9 3/22 Privacy Collection and Use of People’s Data Primary Privacy Issues: Accuracy Ensure that Data is Correct Property Who Owns Data and Rights to Software Access Control Who is Able to Use that Data

4 Chapter9 4/22 Privacy Large Databases Telephone Companies Know What Calls We Make Reverse Directory Supermarkets What We Buy and When Search Engines Record Search Histories of Their Users

5 Chapter9 5/22 Privacy Large Databases Information Resellers or Brokers Collect and Sell Personal Data Create Electronic Profiles Public, Personally Identifying Information Google Street View Spreading Information Without Consent Identity Theft Spreading Inaccurate Information www.annualcreditreport.com

6 Chapter9 6/22 Privacy Private Networks Employers Can Legally Monitor E-mail Used by 75 % of All Businesses The Internet and the Web Illusion of Anonymity History Files Temporary Internet Files

7 Chapter9 7/22 Privacy The Internet and the Web Cookies First-party cookies Third-party cookies Privacy Mode Web Bugs Spyware Keystroke Loggers Spyware Removal

8 Chapter9 8/22 Online Identity Information People Post About Themselves Social Networking, Photo/Video Sharing Consequences Major Laws on Privacy Gramm-Leach-Bliley Act (Financial) HIPAA (Medical) FERPA (Educational) Privacy

9 Chapter9 9/22 Chip Implants (FDA Approved 2004) Size of a Grain of Rice ID Medical History (1000+ Mexican Patients) Secure Access (Mexico) Access to VIP Areas (Rotterdam Nightclub) “Mark of the Beast” (Virginia) Privacy

10 Chapter9 10/22 Security Protection from Unauthorized Use Information Hardware Software Preventing or Limiting Damage from Intrusions Sabotage Natural Disasters

11 Chapter9 11/22 Security Cybercrime Hackers Malware Crackers Virus Worm Trojan Horse

12 Chapter9 12/22 Security Zombies Rootkit Botnet Car Hacking Control Acceleration and Braking Key Fobs

13 Chapter9 13/22 Security DoS (Denial of Service) Phishing Cyberbullying Rogue Wi-Fi Hotspots Theft Data Manipulation Computer Fraud and Abuse Act

14 Chapter9 14/22 Information Theft Data Loss http://www.privacyrights.org/data-breach OrganizationEventWhat# Records Monster.comHackJob Seeker Data1,300,000 UCLAHackStudent/Faculty Data800,000 Digital RiverHackIndia, $500,000200,000 Boston GlobePrintouts as WrappingSubscriber Data240,000 Circuit CityLost Credit Card TapesCustomer Data2,100,000 Dept Veteran AffairsStolen from HomeVeterans Data26,500,000

15 Chapter9 15/22 Security Biggest Cybersecurity Threats Social Engineering APT (Advanced Persistent Threats) Internal Threats BYOD Cloud Security HTML5 Botnets Forbes 12/12

16 Chapter9 16/22 Security Measures to Protect Computer Security Antivirus Detects & Identifies Viruses Looks for Signature Specific Pattern of Virus Code Inoculates Existing Program Files Records File Size & Creation Date Removes or Quarantines Viruses Creates Rescue/Recovery Disk

17 Chapter9 17/22 Security Measures to Protect Computer Security Restricting Access Biometric Scanning Passwords Security Suites Firewalls

18 Chapter9 18/22 Security Measures to Protect Computer Security Encryption Emails Files Web Sites HTTPS Intrusion Detection Software Analyzes Network Traffic Assesses System Vulnerabilities Identifies Intrusions & Suspicious Behavior

19 Chapter9 19/22 Security Measures to Protect Computer Security Anticipating Disasters Physical Security Data Security Disaster Recovery Plan Preventing Data Loss Backup Stored Offsite

20 Chapter9 20/22 Security Measures to Protect Computer Security System Failure Aging Hardware Natural Disasters Electrical Power Problems Power Surge or Spike Surge Protector Protects Against Power Disturbances Uninterruptible Power Supply (UPS) Provides Short-term Power

21 Chapter9 21/22 Ethics Morally Acceptable Use of Computers Copyright Software Piracy Unauthorized Copying and Distribution Digital Rights Management (DRM) Control Number of Devices that Can Access a File Limit Kinds of Devices that Can Access a File Digital Millennium Copyright Act Plagiarism

22 Chapter9 22/22 Careers in IT IT Security Analyst Maintain Security of Network, Systems, and Data Data Confidentiality, Integrity, and Availability Bachelor's Degree in Computer Science Good Communication Skills Handle High-stress Situations Annual Salary of $62,000 - $101,000


Download ppt "Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9."

Similar presentations


Ads by Google