Download presentation
Presentation is loading. Please wait.
Published byMaximilian Parsons Modified over 9 years ago
1
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics
2
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-2 McGraw-Hill Competencies (Page 1 of 2) Identify the most significant concerns for effective implementation of computer technologyIdentify the most significant concerns for effective implementation of computer technology Discuss the primary privacy issues of accuracy, property, and accessDiscuss the primary privacy issues of accuracy, property, and access Describe the impact of large databases, private networks, the Internet, and the Web on privacyDescribe the impact of large databases, private networks, the Internet, and the Web on privacy Discuss online identity and major laws on privacyDiscuss online identity and major laws on privacy Describe the security threats posed by computer criminals including employees, hackers, crackers, organized crime, and terroristsDescribe the security threats posed by computer criminals including employees, hackers, crackers, organized crime, and terrorists
3
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-3 McGraw-Hill Competencies (Page 2 of 2) Discuss computer crimes including creation of viruses and worms and implementation of denial of service attacks and Internet scamsDiscuss computer crimes including creation of viruses and worms and implementation of denial of service attacks and Internet scams Detail ways to protect computer securityDetail ways to protect computer security Discuss computer ethics including copyright law and plagiarismDiscuss computer ethics including copyright law and plagiarism Describe ways to protect copyrights and to identify plagiarism, including digital rights management and TurnitinDescribe ways to protect copyrights and to identify plagiarism, including digital rights management and Turnitin
4
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-4 McGraw-Hill Introduction The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy.The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.
5
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-5 McGraw-Hill People Privacy – What are the threats to personal privacy and how can we protect ourselves?Privacy – What are the threats to personal privacy and how can we protect ourselves? Security – How can access to sensitive information be controlled and how can we secure hardware and software?Security – How can access to sensitive information be controlled and how can we secure hardware and software? Ethics – How do the actions of individual users and companies affect society?Ethics – How do the actions of individual users and companies affect society?
6
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-6 McGraw-Hill Privacy Privacy – concerns the collection and use of data about individualsPrivacy – concerns the collection and use of data about individuals Three primary privacy issues:Three primary privacy issues: –Accuracy –Property –Access
7
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-7 McGraw-Hill Large Databases Federal government alone has over 2,000 databasesFederal government alone has over 2,000 databases Reverse directory compiles lists of the calls we makeReverse directory compiles lists of the calls we make Data gatherersData gatherers –Information resellers or information brokers –Electronic profiles are easily created
8
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-8 McGraw-Hill Large Databases - Issues Your personal information is a marketable commodity, which raises many issues:Your personal information is a marketable commodity, which raises many issues: –Collecting public, but personally identifying information (e.g., Google’s Street View) –Spreading information without personal consent, leading to identity theft –Spreading inaccurate information Mistaken identityMistaken identity Freedom of Information ActFreedom of Information Act
9
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-9 McGraw-Hill Private Networks Employers can monitor e-mail legallyEmployers can monitor e-mail legally –75 percent of all businesses search employees’ electronic mail and computer files using snoopware –A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first
10
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-10 McGraw-Hill The Internet and the Web Illusion of anonymityIllusion of anonymity –People are not concerned about privacy when surfing the Internet or when sending e-mail History file (right) in Web browsersHistory file (right) in Web browsers Traditional cookies from Web surfingTraditional cookies from Web surfing SpywareSpyware –Ad network or adware cookies –Web bugs –Computer monitoring software, such as keystroke loggers
11
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-11 McGraw-Hill Viewing and Blocking Cookies
12
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-12 McGraw-Hill Spyware Removal Anti-Spyware programsAnti-Spyware programs –Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers
13
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-13 McGraw-Hill Major Laws on Privacy Federal laws governing privacy matters have been createdFederal laws governing privacy matters have been created –Gramm-Leach-Bliley Act – protects personal financial information –Health Insurance Portability and Accountability Act (HIPAA) – protects medical records –Family Educational Rights and Privacy Act (FERPA) – restricts disclosure of educational results and records
14
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-14 McGraw-Hill Security Threats to computer security include criminals, computer crimes, and other hazardsThreats to computer security include criminals, computer crimes, and other hazards Computer criminals:Computer criminals: –Employees –Outside users –Hackers and crackers –Organized crime –Terrorists
15
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-15 McGraw-Hill Computer Crime Malicious ProgramsMalicious Programs –Viruses –Worms –Trojan horse –Zombies Denial of service (DoS) attacksDenial of service (DoS) attacks Internet scams, such as phishingInternet scams, such as phishing Social networking risksSocial networking risks Rogue Wi-Fi hotspotsRogue Wi-Fi hotspots Theft of hardware, software, data, and computer timeTheft of hardware, software, data, and computer time Data manipulationData manipulation –Computer Fraud and Abuse Act Computer Crimes have tripled in the past two years!
16
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-16 McGraw-Hill Common Internet Scams
17
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-17 McGraw-Hill Other Hazards Natural hazardsNatural hazards –Natural forces such as fires, floods, and tornadoes Civil strife and terrorismCivil strife and terrorism –Wars, riots, and terrorist activites Technological failuresTechnological failures –Voltage surge or spike –Use a surge protector Human errorsHuman errors –Data entry errors –Programmer error
18
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-18 McGraw-Hill Measures to Protect Computer Security Restricting accessRestricting accessRestricting accessRestricting access Encrypting dataEncrypting dataEncrypting dataEncrypting data Anticipating disastersAnticipating disasters Preventing data lossPreventing data loss
19
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-19 McGraw-Hill Restricting Access Biometric scanningBiometric scanning –Fingerprint scanners –Iris (eye) scanners PasswordsPasswords FirewallsFirewalls Return
20
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-20 McGraw-Hill Encrypting Data Encryption is the process of coding information to make it unreadable, except to those who have the keyEncryption is the process of coding information to make it unreadable, except to those who have the key –E-mail encryption –File encryption –Web site encryption –Virtual private networks (VPNs) –Wireless network encryption WEP, WPA, and WPA2WEP, WPA, and WPA2 Return
21
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-21 McGraw-Hill Ethics CopyrightCopyright –Gives content creators the right to control the use and distribution of their work Software piracySoftware piracy –Unauthorized copying and distribution –Digital Millenium Copyright Act –Digital rights management (DRM) PlagiarismPlagiarism
22
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-22 McGraw-Hill Careers in IT Cryptography is the science of disguising and revealing encrypted informationCryptography is the science of disguising and revealing encrypted information –Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codesCryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to over $100,000/yearAnnual salary is usually between $60,000 to over $100,000/year
23
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-23 McGraw-Hill A Look to the Future A Webcam on Every CornerA Webcam on Every Corner –Images of public places are more accessible than ever before (e.g., Google Street View) –“Virtual site-seeing tours” –Public webcams continue to grow in popularity
24
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-24 McGraw-Hill Open-Ended Questions (Page 1 of 2) Discuss the impact of large databases, private networks, the Internet, and the Web on privacy.Discuss the impact of large databases, private networks, the Internet, and the Web on privacy. Discuss the various kinds of computer criminals.Discuss the various kinds of computer criminals. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?
25
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. Computing Essentials 2012: Making IT Work for You 10-25 McGraw-Hill Open-Ended Questions (Page 2 of 2) What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management?What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management? What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.