Identify the most significant concerns for effective implementation of computer technology.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crimes.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Cyber crime & Security Prepared by : Rughani Zarana.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Topic 5: Basic Security.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
CONTROLLING INFORMATION SYSTEMS
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Privacy, Security and Ethics
Privacy, Security and Ethics
Digital Security Identity theft Copyright Laws Plagiarism, and More.
10 PRIVACY AND SECURITY CHAPTER
Network and Internet Security and Privacy
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
IT Security  .
COMPUTER CRIME.
10 PRIVACY AND SECURITY CHAPTER
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
BCT 2.00 Analyze Technology Issues
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Network and Internet Security and Privacy
Chapter9.
Internet Safety Vocabulary
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Chapter # 3 COMPUTER AND INTERNET CRIME
10 PRIVACY AND SECURITY CHAPTER
Privacy, Security, and Ethics
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Security, Privacy, Ethics And Ergonomic
Presentation transcript:

Identify the most significant concerns for effective implementation of computer technology. Discuss the primary privacy issues of accuracy, property, and access. Describe the impact of large databases, private networks, the Internet, and the Web on privacy. Discuss online identity and major laws on privacy.

Describe the security threats posed by computer criminals including employees, hackers, crackers, carders, organized crime, and terrorists. Discuss computer crimes including creation of malicious programs such as viruses, worms, Trojan horse, and zombies as well as denial of service attacks, Internet scams, social networking risks, cyber-bullying, rogue Wi-Fi hotspots, theft, data manipulation, and other hazards.

Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. Discuss computer ethics including copyright law, software piracy, and digital rights management as well as plagiarism and ways to identify plagiarism.

The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.

Privacy – What are the threats to personal privacy and how can we protect ourselves? Security – How can access to sensitive information be controlled and how can we secure hardware and software? Ethics – How do the actions of individual users and companies affect society?

Privacy – concerns the collection and use of data about individuals Three primary privacy issues: Accuracy Property Access Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws Accuracy – responsibility of those who collect data Secure Correct Property – who owns data and who has rights to software Access – responsibility of those who control data and use of data Technology moving faster than law can adapt

Large organizations compile information about us. Federal government has over 2,000 databases Telephone companies Reverse directory lists of calls we make Supermarkets What we buy and when Data collected and stored on citizens every day Collectors include Government agencies – Federal government has 2,000 databases; businesses Telephone companies – compile lists of the calls we make; reverse directory (key term) is a special telephone directory that lists telephone numbers sequentially and can be used to gather data about the persons we call Data has value – hence the rise of the information reseller: information resellers provide this gathered data to others for a fee

Information resellers or information brokers Collect and sell personal data Electronic profiles easily created Personal information is a marketable commodity, which raises many issues: Collecting public, but personally identifying information (e.g., Google’s Street View) Spreading information without personal consent, leading to identity theft Spreading inaccurate information Mistaken identity Freedom of Information Act Concerns include: Spreading information without consent – example: collecting your shopping habits and sharing; or medical records, or driver’s license number Last year over 10 million people were victimized by identity theft (key term) (illegal assumption of someone’s identity for economic gain) Spreading inaccurate information – Mistakes happen, but when those mistakes are recorded and your financial position is affected it becomes a problem Mistaken Identity – an electronic profile of one person is switched with another Under the Freedom of Information Act you are entitled to look at your records held by government agencies.

Employers can monitor e-mail legally 75 percent of all businesses search employees’ electronic mail and computer files using snoopware A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first Currently legal for employers to monitor electronic mail; survey reported 75% do so using snoopware Snoopware records virtually everything you do on your computer

History file in Web browsers Cookies Spyware Illusion of anonymity People are not concerned about privacy when surfing the Internet or when sending e-mail History file in Web browsers Cookies Spyware Illusion of anonymity -that if you are on the Internet and selective about disclosing names or other personal information that no one knows who you are or how to “find” you - false Recent cases of people tracing other people through Internet activity When you browse the Web your activity is monitored; when you visit a Web site your browser stores critical information onto your hard disk – usually without your permission or knowledge; a history file includes the locations of sites visited by your computer system

The information that people voluntarily post about themselves online Archiving and search features of the Web make it available indefinitely How would you feel if information you posted about yourself on the Web kept you from getting a job?

Federal laws governing privacy matters have been created Gramm-Leach-Bliley Act Protects personal financial information Health Insurance Portability and Accountability Act (HIPAA) Protects medical records Family Educational Rights and Privacy Act (FERPA) Restricts disclosure of educational results and records

If you have installed any free software from the Internet this seemingly harmless software might actually be spying on you, even sending personal information to advertisers

Threats to computer security include criminals, computer crimes, and other hazards Computer criminals: Employees Outside users Hackers and crackers Carders Organized crime Terrorists Computer crime – illegal action in which the perpetrator uses special knowledge of computer technology Computer criminals – those using computer technology to engage in illegal action, five types Employees – the largest category; may be trying to steal hardware, software, proprietary information and could be doing this out of resentment and trying to get back at the company Outside users – could include employees and clients or suppliers having access to a company’s computer system; could obtain confidential passwords (key term) “Hackers” and “crackers” – hackers gain unauthorized access to computer systems “for fun”, crackers on the other hand, create and share programs designed to gain unauthorized access to computer systems. Their motives are malicious and can be very destructive and costly. Carders – criminals who specialize in stealing, trading, and using stolen credit cards over the Internet Organized crime – tracking illegal enterprises, forgery, counterfeiting Terrorists – could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems Most people don’t realize that security involves theft by employees as well as deliberate thefts from viruses, electronic break-ins, etc. Re-emphasize ethics as an integral part of security – what belongs to the company, belongs to the company (computer time, software, floppies, getting into area in computer where you don’t need to be)

Malicious Programs - Malware Viruses Worms Trojan horse Zombies Denial of Service (DoS) attack Creation of malicious programs – called malware (key term)which is short for malicious software Viruses (key term)–migrate through networks and operating systems and most attach themselves to different programs and databases; can alter and/or delete files; can damage system components; Computer Fraud and Abuse Act (key term) makes spreading a virus a federal offense Worms (key term) – a special type of virus Doesn’t attach to a program Fills the computer with self-replicating information or can be a carrier of a more traditional virus Trojan horse – programs that are disguised as something else; like worms they are carriers of viruses; The most common type of Trojan horses appear as free computer games. Zombies – computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes A collection of Zombie computers is knows as a botnet, or robot network. Malicious activities include password cracking or sending junk email. Denial of service attacks – attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. The targets of these attacks are usually ISPs.

Internet scams Phishing Internet scams (key term) –a fraudulent or deceptive act or operation to trick someone into providing personal information or spending money for little or no return

Social networking risks Cyber-bullying Rogue Wi-Fi hotspots Theft Data manipulation Computer Fraud and Abuse Act Social networking risks Information posted can be used by others to steal personal identities and commit other types of crimes Cyber-bullying - the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person. sending repeated unwanted emails ganging up on victims in electronic forums posting false statements designed to injure the reputation of another maliciously disclosing personal data about a person that could lead to harm to that person sending any type of communication that is threatening or harassing Rogue Wi-Fi Hotspots – imitate free Wi-Fi networks and capture any and all information sent by the users to legitimate sites including usernames and passwords. Theft – hardware, software, data, computer time, confidential information Data manipulation – finding entry into someone’s computer network and leaving a prankster’s message Computer Fraud and Abuse Act – law states that it’s a crime for an unauthorized person to view, copy or damage data using any computer across state lines

Civil strife and terrorism Technological failures Human errors Natural hazards Civil strife and terrorism Technological failures Human errors Natural Hazards – fire, floods, hurricanes, tornadoes, earthquakes Civil strife and terrorism – wars, riots, terrorist activities Technological failures - voltage surge or spike, hard disk crash Human errors – data entry errors, programmer errors, filename errors

Anticipating disasters Restricting access Encrypting data Anticipating disasters Physical security Data security Disaster recovery plan Preventing data loss Security involves protecting information, hardware, and software from unauthorized use, damage from intrusions, sabotage, and natural disasters Encryption – coding messages to prevent people from reading your messages Anticipating disasters Physical security (key term)– protecting hardware Data security (key term)– protecting software and data from unauthorized tampering or damage Disaster recovery plan (key term)– describing ways to continue operating until normal computer operations can be restored; can create special emergency facilities called hot sites which are fully equipped backup computer centers or cold sites if hardware must be installed to be utilized Preventing data loss Use physical backups – off-site storage using tapes or disks in case of loss of equipment

Standards of moral conduct Copyright Gives content creators the right to control the use and distribution of their work Paintings, books, music, films, video games Software piracy Unauthorized copying and distribution Digital Millennium Copyright Act Digital rights management (DRM) Plagiarism Technology is moving so fast it is hard for our legal system to keep up. The essential element that controls how computers are used today is ethics. Computer ethics - guidelines for the morally acceptable use of computers Digital Millennium Copyright Act – the right of the owner to make a backup copy Digital rights management – prevents copyright violations Plagiarism – representing some other person’s work and ideas as your own without giving credit to the original person’s work and ideas as your own

Annual salary is usually from $60,000 to over $100,000/year Cryptography is the science of disguising and revealing encrypted information Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually from $60,000 to over $100,000/year

A Webcam on Every Corner Images of public places are more accessible than ever before (e.g., Google Street View) “Virtual site-seeing tours” Public webcams continue to grow in popularity

Define and discuss online identity and the major privacy laws. Define privacy and discuss the impact of large databases, private networks, the Internet, and the Web. Define and discuss online identity and the major privacy laws. Define security and discuss computer criminals including employees, hackers, crackers, carders, and organized crime. Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements.

Define computer crime and the impact of malicious programs, including viruses, worms, and Trojan horses, and zombies as well as cyber-bullying, denial of service, Internet scams, social networking risks, rogue Wi-Fi hotspots, theft, data manipulation, and other hazards. Discuss ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements.

Define ethics and describe copyright law and plagiarism. Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements.