Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Similar presentations


Presentation on theme: "IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics."— Presentation transcript:

1 IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics

2 Computer Security Risks A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

3 Computer Security Risks Cybercrime Online or internet based illegal acts An FBI top 10 priority

4 Viruses, Worms, Trojan Horses Virus A potentially damaging computer program

5 Viruses, Worms, Trojan Horses Worm A program that copies itself to create some type of problem for the infected computer or network

6 Viruses, Worms, Trojan Horses Trojan Horse A program that hides within a legitimate program. Activates on some trigger.

7 Viruses, Worms, Trojan Horses Virus Symptoms: Unusual Screen Messages Music or Sounds play randomly Memory is reduced Programs disappear Files are corrupted Programs do not work correctly Unknown programs appear System properties change

8 Viruses, Worms, Trojan Horses How do we get these? Opening an infected file Running an infected program Booting an infected computer with a disk that is infected Opening infected E-mail messages

9 Viruses, Worms, Trojan Horses There are over 90,000 known viruses, etc. 6 - 10 new viruses, etc are discovered each day

10 Viruses, Worms, Trojan Horses Getting rid of viruses, etc. Avast! Anti-Virus http://www.avast.com

11 Viruses, Worms, Trojan Horses Preventing Viruses, etc: Page 562

12 Unauthorized Access Using a computer or network without permission Cracker = illegally accesses a computer network Hacker = Same as cracker, but more elite status

13 Unauthorized Access Firewall One way to prevent hacking or cracking. It is a combination of hardware and software that blocks unwanted attacks from your computer or network

14 Unauthorized Access

15 Usernames and Passwords Username = UserID or identification Password = private combination of characters to allow access

16 Unauthorized Access Passwords

17 Biometric Devices Physical biometric systems measure a unique physical trait, such as the fingerprint or blood vessel pattern of the retina, whereas behavioral biometric systems measure a unique behavioral attribute, such as the way a person talks or signs his or her name.

18 Unauthorized Access Biometric Devices

19 Unauthorized Access Biometric Devices

20 Theft Prevent Hardware Theft Physical location Physical security Regular visual inspection

21 Theft Prevent Software Theft License Agreements Activation Schemes Regular System Scans

22 Theft Prevent Information Theft Encryption & Decryption

23 Theft

24 Theft Two Types of Encryption: In private-key encryption, the sender and receiver of information share a secret--a key that is used for both encryption and decryption. In public-key encryption, two different mathematically related keys (a key pair) are used to encrypt and decrypt data. Information encrypted with one key may only be decrypted by using the other half of the key pair.

25 Theft PGP (Pretty Good Privacy) Encryption Software http://www.pgp.com

26 System Failure Noise = any unwanted signal mixed with normal voltage input to the computer Under voltage = electrical supply drops Over voltage = Power Surge

27 System Failure Safeguards Surge Protector (Minimum Protection) UPS – Uninterruptible Power Supply (Best Protection) APC 750VA UPS = $ 90.00

28 Backup The Ultimate Safeguard Making copies of your important files

29 Internet Security Risks Denial of Service Attacks (DoS Attack) An assault on computer networks to disrupt service

30 Internet Security Risks Internet Transactions Digital Certificates SSL (Secure Sockets Layer) SET (Secure Electronics Transactions) Digital Signatures

31 Ethics and Society Computer Ethics Page 578

32 Ethics and Society Information Accuracy Everything you see on the internet may not be accurate. You have to learn to judge or discern what is correct and what is not Remember what your parents used to say: “Just because it is on TV or radio or in a newspaper doesn’t mean it is true!” Also “Would you jump off a bridge if your friends did?”

33 Ethics and Society Intellectual Property Rights Rights of the creator to their own work(s) Copyright – Automatically given when you create something, doesn’t have to be registered to be upheld in court

34 Ethics and Society IT Code of Conduct Page 580

35 Ethics and Society Information Privacy Your right to deny or restrict the use of your personal information Page 581

36 Ethics and Society Cookies A small text file that a web server stores on your computer

37 Ethics and Society Spyware A program placed on your computer without your knowledge that secretly collects information about you. Adaware SE Spybot

38 Ethics and Society Spam Unsolicited E-mail 4 out of 5 messages are spam today

39 Ethics and Society Employee Monitoring Using a computer to observe, record and review an employee’s use of a computer.

40 Ethics and Society Content Filtering Restricting access to certain material on the web

41 Health Concerns RSI – Repetitive Strain Injury CTS – Carpal Tunnel Syndrome CVS – Computer Vision Syndrome Blindness recently reported as related to Short-Sightedness and long-term computer monitor use

42 Health Concerns Computer Addiction When computers consume someone’s entire social life

43 Health Concerns IAD – Internet Addiction Disorder When using the internet consumes someone’s entire social life but feels social to the addict as they interact with others via the internet

44 Health Concerns Symptoms of both disorders: Craves Computer Time Overjoyed when at computer Unable to stop computer activity Irritable when not at a computer Neglects family and friends Problems at work or school

45 Chapter 11 Questions?

46 Assignment 07 At Issue 11-2 on page 568 Answer the questions as presented and defend your opinion. Show references as well.


Download ppt "IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics."

Similar presentations


Ads by Google