Download presentation
Presentation is loading. Please wait.
Published byAnthony Neal Modified over 9 years ago
1
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9
2
Chapter9 2/22 Overview Identify Concerns About Technology Describe Privacy Issues Discuss Online Identity Discuss Major Laws On Privacy Discuss Cybercrimes Discuss Computer Security Discuss Computer Ethics
3
Chapter9 3/22 Privacy Collection and Use of People’s Data Primary Privacy Issues: Accuracy Ensure that Data is Correct Property Who Owns Data and Rights to Software Access Control Who is Able to Use that Data
4
Chapter9 4/22 Privacy Large Databases Telephone Companies Know What Calls We Make Reverse Directory Supermarkets What We Buy and When Search Engines Record Search Histories of Their Users
5
Chapter9 5/22 Privacy Large Databases Information Resellers or Brokers Collect and Sell Personal Data Create Electronic Profiles Public, Personally Identifying Information Google Street View Spreading Information Without Consent Identity Theft Spreading Inaccurate Information www.annualcreditreport.com
6
Chapter9 6/22 Privacy Private Networks Employers Can Legally Monitor E-mail Used by 75 % of All Businesses The Internet and the Web Illusion of Anonymity History Files Temporary Internet Files
7
Chapter9 7/22 Privacy The Internet and the Web Cookies First-party cookies Third-party cookies Privacy Mode Web Bugs Spyware Keystroke Loggers Spyware Removal
8
Chapter9 8/22 Online Identity Information People Post About Themselves Social Networking, Photo/Video Sharing Consequences Major Laws on Privacy Gramm-Leach-Bliley Act (Financial) HIPAA (Medical) FERPA (Educational) Privacy
9
Chapter9 9/22 Chip Implants (FDA Approved 2004) Size of a Grain of Rice ID Medical History (1000+ Mexican Patients) Secure Access (Mexico) Access to VIP Areas (Rotterdam Nightclub) “Mark of the Beast” (Virginia) Privacy
10
Chapter9 10/22 Security Protection from Unauthorized Use Information Hardware Software Preventing or Limiting Damage from Intrusions Sabotage Natural Disasters
11
Chapter9 11/22 Security Cybercrime Hackers Malware Crackers Virus Worm Trojan Horse
12
Chapter9 12/22 Security Zombies Rootkit Botnet Car Hacking Control Acceleration and Braking Key Fobs
13
Chapter9 13/22 Security DoS (Denial of Service) Phishing Cyberbullying Rogue Wi-Fi Hotspots Theft Data Manipulation Computer Fraud and Abuse Act
14
Chapter9 14/22 Information Theft Data Loss http://www.privacyrights.org/data-breach OrganizationEventWhat# Records Monster.comHackJob Seeker Data1,300,000 UCLAHackStudent/Faculty Data800,000 Digital RiverHackIndia, $500,000200,000 Boston GlobePrintouts as WrappingSubscriber Data240,000 Circuit CityLost Credit Card TapesCustomer Data2,100,000 Dept Veteran AffairsStolen from HomeVeterans Data26,500,000
15
Chapter9 15/22 Security Biggest Cybersecurity Threats Social Engineering APT (Advanced Persistent Threats) Internal Threats BYOD Cloud Security HTML5 Botnets Forbes 12/12
16
Chapter9 16/22 Security Measures to Protect Computer Security Antivirus Detects & Identifies Viruses Looks for Signature Specific Pattern of Virus Code Inoculates Existing Program Files Records File Size & Creation Date Removes or Quarantines Viruses Creates Rescue/Recovery Disk
17
Chapter9 17/22 Security Measures to Protect Computer Security Restricting Access Biometric Scanning Passwords Security Suites Firewalls
18
Chapter9 18/22 Security Measures to Protect Computer Security Encryption Emails Files Web Sites HTTPS Intrusion Detection Software Analyzes Network Traffic Assesses System Vulnerabilities Identifies Intrusions & Suspicious Behavior
19
Chapter9 19/22 Security Measures to Protect Computer Security Anticipating Disasters Physical Security Data Security Disaster Recovery Plan Preventing Data Loss Backup Stored Offsite
20
Chapter9 20/22 Security Measures to Protect Computer Security System Failure Aging Hardware Natural Disasters Electrical Power Problems Power Surge or Spike Surge Protector Protects Against Power Disturbances Uninterruptible Power Supply (UPS) Provides Short-term Power
21
Chapter9 21/22 Ethics Morally Acceptable Use of Computers Copyright Software Piracy Unauthorized Copying and Distribution Digital Rights Management (DRM) Control Number of Devices that Can Access a File Limit Kinds of Devices that Can Access a File Digital Millennium Copyright Act Plagiarism
22
Chapter9 22/22 Careers in IT IT Security Analyst Maintain Security of Network, Systems, and Data Data Confidentiality, Integrity, and Availability Bachelor's Degree in Computer Science Good Communication Skills Handle High-stress Situations Annual Salary of $62,000 - $101,000
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.