Download presentation
Presentation is loading. Please wait.
Published bySheena Greene Modified over 9 years ago
1
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1
2
Privacy in Cyberspace Privacy o Individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information Anonymity o Means to communicate without disclosing one’s identity o More difficult with the use of computers and the Internet Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2
3
The Problem: Collection of Information Without Consent Cookies o Small files written to your hard disk by Web sites visited o Examples include: Track your browsing habits Gather personal information without your consent o Can be disabled Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3
4
The Problem: Collection of Information Without Consent Radio frequency identification (RFID) Radio frequency identification (RFID) o Uses radio waves to track a chip or tag o Used for inventory control in stores o Recognizes microchips in pets Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4
5
The Problem: Collection of Information Without Consent United States o Federal and some State Laws: Fair Credit Reporting Act o Credit Reporting Agencies Experian, Equifax, TransUnion o No comprehensive federal law governing the overall privacy rights of U.S. citizens. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 5
6
The Problem: Collection of Information Without Consent SPAM o Unsolicited messages sent in bulk over electronic mailing systems o India has created the most spam Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 6
7
The Problem: Collection of Information Without Consent Protecting privacy online o Use free Web-based throwaway e-mail addresses. o Don’t give out personal information. o Complete forms only if you see a privacy statement. o Turn off cookies Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 7
8
The Problem: Collection of Information Without Consent Do not leave cell phones in public places. Turn off services not in use, especially Bluetooth. Don’t leave personal info unattended on monitors Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 8
9
The Problem: Collection of Information Without Consent Employee monitoring o Most U.S. employers observe employee phone calls, e-mails, Web browsing habits, and computer files Protecting privacy at work o Don’t make personal calls on a work phone o Avoid using company e-mail for personal purposes o Assume you are monitored o Be aware of shoulder surfing Stealing info and passwords Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9
10
Computer Crime and Cybercrime Types of computer crime o Identify theft—criminal access to personal information in order to impersonate someone o Dumpster diving—disgruntled employees or thieves go through a company’s trash to find information they can steal o Phishing attacks—legitimate-looking e-mails or Web sites created in an attempt to obtain confidential data about a person Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 10
11
Computer Crime and Cybercrime Types of computer crime (cont.) o Malware (short for malicious software)—programs that intentionally harm a computer system or allow individuals to gain access without permission Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 11
12
Computer Crime and Cybercrime Types of computer crime (con’t.) o Spyware—software that gathers private information and tracks Web use Adware—form of spyware that generates annoying pop-up and banner ads Keyloggers—record keystrokes to provide cybercriminals with confidential data Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 12
13
Computer Crime and Cybercrime Types of computer crime (con’t.) o Computer virus—code is attached to a program that can harm or destroy files Executable File Extensions o.bat.com.exe Many spread through e-mail attachments Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 13
14
Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 14
15
Rogue programs o Logic bomb—hidden computer code that sits dormant on a system until triggered o Time bomb—virus program that remains dormant on a computer system until activated o Trojan horse—normal-looking program that includes concealed instructions to cause harm Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 15
16
More rogue programs Denial of service (DoS) attack—assaults an Internet server with so many requests it can’t function o attack involves multiple computer systems Controlled computers are called zombies. Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 16
17
Computer Crime and Cybercrime Fraud, theft, and piracy o Memory shaving o Software piracy Cybergaming crime Salami shaving – stealing small amounts of money from multiple bank accounts Data diddling Forgery Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 17
18
Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 18 Attackers o Hackers — Look for computer steps not in manuals o Crackers—attempt to enter highly secure computer systems to destroy data or steal information o Swindlers perpetuate frauds: Bogus work-at-home opportunities Illegal pyramid schemes Bogus franchises Phony goods that won’t be delivered
19
Computer Crime and Cybercrime Cyberstalkers o Use the Internet, social networking sites, and e-mail to harass or threaten o Most perpetrators are men o Most victims are college-age women Cyberbullying o Sending threatening messages via e-mail or text message o Usually involves minors Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 19
20
Security Computer security risk o Vacation hacking—tricking travelers into using phony WiFi hot spots—evil twins o Company Insiders are a company’s highest risk o War Driving – driving around with a notebook to get access to wireless networks Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 20
21
Protecting your computer system o Uninterruptible power supply (UPS)—provides additional power during outages or electrical current fluctuations o Pop-up Blockers – prevents pop-ups o Create hard to guess passwordsSecurity Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 21
22
Security Protecting your computer system (con’t.) o Biometric authentication—use of voice recognition, retinal scans, and fingerprint scans for authentication o Firewalls, hardware or software, to prevent unauthorized access Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 22
23
Protect yourself—avoid scams o Do business with reputable companies. o Read documents carefully. o Do not post a user profile with personal info. o Be cautious if meeting someone you’ve contacted online. o If you become uncomfortable or afraid, contact the policeSecurity Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 23
24
The Encryption Debate Cryptography o Study of transforming information into a scrambled format Encryption o Scrambling process that creates a message unreadable by anyone other than the intended recipient Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 24
25
Prosecuting Violators Computer forensics o Legal evidence found in computers and digital storage media Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 25
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.