Download presentation
Presentation is loading. Please wait.
1
Privacy & Security By Martin Perez
2
Introduction Information system - People : meaning use, the people who use computers. - Procedures : Guidelines to operate your PC. - Software : Programs for the computers hardware. - Hardware : The computer itself. - Data : The info. You get out of the computer. - Connectivity : Internet.
3
PRIVACY Large database - The Federal Government - Information resellers or Information brokers ( collect & sells personal data). - Electronic Profiles ( Name, Address, SSN, etc.)
4
Continue Large Databases - Identity Theft : it’s when someone else takes your info. And uses if for economic gain. - Mistaken Identity : when a electronic profile is switched with someone else. - Freedom of Information Act : this act allows you to see any of you records held by government agencies or business.
5
Continue Private Networks - Snoop ware : this allows employers to search employees electronic mail and computer files ( employees are told this). Internet and the Web - Illusion of Anonymity : people that feel there privacy is not in danger. -Traditional cookies : monitor your activity at a single site you look at.
6
Continue Internet and the Web - Ad ware cookies : monitor your activities across all sites you look at. - Cookie-Cutter programs : these programs help control traditional cookies and Ad ware cookies. -
7
Continue Major law on privacy - Code of Fair Information Practice - No secret database - Right of individual access - Right of consent - Right to correct - Assurance of reliability and proper use.
8
Security Computer Criminals : Five types - Employees : Largest category - Outside users : Suppliers or clients - Hackers & Crackers : Hackers are the people who hack into computers for fun. Crackers are the same, but they steal technical Info.
9
Continue Computer Criminals - Organized Crime : people that use computer likes really business, but they use for illegal use. - Terrorists : these people crash satellites and disrupt communication systems.
10
Continue Computer crimes - Malicious Programs - Viruses - Worms - Trojan Horses Denial of Service - this attempts to slow or stop your computer system
11
Continue Internet Scams - these scams try to take your money and it wastes your time. Theft - Theft can be of hardware, software, or data of any kind. Data Manipulation - When some goes into your computer system and change the data on it. It is against the law to do this.
12
Continue Measures to protect computer security - Encrypting messages : when sending a message it had to possibility security risks. - Restricting Access - Biometric scanning - Passwords - Firewalls
13
Continue Anticipating Disasters - Physical security - Data security Backing up data : something you should always have.
14
THE END
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.