Information Technology INT1001

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
With Microsoft Access 2010© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
With Microsoft Access 2010 © 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Microsoft Access 2010 Tutorial for the CS 101 Lab.
Information Technology INT1001
Computers Are Your Future Eleventh Edition Chapter 5: Application Software: Tools for Productivity Copyright © 2011 Pearson Education, Inc. Publishing.
Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright © 2011 Pearson Education, Inc. Publishing as.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
Security+ Guide to Network Security Fundamentals
Chapter 10 Privacy and Security McGraw-Hill
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 11 Security and Privacy: Computers and the Internet.
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computers Are Your Future
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Computer crimes.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Network and Internet Security and Privacy
IT Security  .
Computer Security, Ethics and Privacy
Privacy, Crime, and Security
Network and Internet Security and Privacy
Computer Security, Ethics and Privacy
Chapter 9 E-Commerce Security and Fraud Protection
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Computer Security.
Presentation transcript:

Information Technology INT1001 Lecture 12 Privacy, Crime & Security

Computers Are Your Future Tenth Edition Chapter 9: Privacy, Crime, & Security Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

Privacy, Crime, & Security * 07/16/96 Privacy, Crime, & Security Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

* 07/16/96 Privacy in Cyberspace Privacy is the ability of a person or entity to control and prevent others from collecting, using, and selling personal, confidential information. With the use of computers and the Internet, having anonymity, the means to communicate without disclosing your identity, has become more difficult to achieve. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

* 07/16/96 Privacy in Cyberspace Technologies that jeopardize online anonymity include: Cookies Global unique identifiers Ubiquitous computing Radio frequency identification This is Figure 9.4. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

* 07/16/96 Privacy in Cyberspace After a user visits a Web site, a small text file known as a cookie may be written to the user’s hard disk by the Web site. Although some cookies are used for justifiable reasons, this is not always the case. Some cookies are used to gather personal information without the user’s consent. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

* 07/16/96 Privacy in Cyberspace Anonymous use of the Internet is made more difficult through the use of global unique identifiers (GUIDs), an identification number produced by software or a piece of hardware. Companies that have GUIDs integrated into their products usually do not inform the public. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

* 07/16/96 Privacy in Cyberspace The tendency to interact with more than one computer at a time is called ubiquitous computing. Given that smaller devices such as smartphones can receive and transmit personal user information, if they are lost, the privacy of the user could be compromised. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

* 07/16/96 Privacy in Cyberspace Radio frequency identification (RFID) uses radio waves to track a chip or tag. Often used for inventory control in stores Example of a concern about RFID technology: It could compromise a person’s anonymity and privacy if information stored on RFID tags attached to U.S. passports is misused Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

* 07/16/96 Privacy in Cyberspace To protect society, governments should provide privacy rights including but not limited to: Informing users of the collection of information and its intended use. Allowing users to give or deny their consent to have their information collected. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Privacy in Cyberspace Privacy online: * 07/16/96 Privacy in Cyberspace Privacy online: Use protective software or devices such as Anonymous Surfing or IronKey Secure USB flash drives when using the Internet. Create e-mail addresses from free Web-based services whenever you use your e-mail address for such things as chat rooms and mailing lists. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Privacy in Cyberspace Privacy online (continued): * 07/16/96 Privacy in Cyberspace Privacy online (continued): Teach children the importance of getting permission prior to giving out personal information over the Internet. Before you fill out any online registration forms, make sure the privacy policy statement of a Web site states that the information provided will not be sold. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Privacy in Cyberspace Privacy at home: * 07/16/96 Privacy in Cyberspace Privacy at home: GPS capabilities are embedded in newer cell phones so they can be located. Services such as Wherify and uLocate can determine the precise location of a cell phone. Software is available to determine and provide notification when a cell phone leaves a specific geographic area. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Privacy in Cyberspace Privacy at work: * 07/16/96 Privacy in Cyberspace Privacy at work: Refrain from making personal calls on a work phone. Avoid using a company e-mail account for personal purposes. Assume that your actions at work are being monitored. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Privacy in Cyberspace This is Figure 9.11. * 07/16/96 Privacy in Cyberspace This is Figure 9.11. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Actions that violate the law are known as computer crimes. Crimes perpetrated through the use of the Internet are cybercrimes. The area of law dedicated to computer crime is called cyberlaw. Many Web sites educate users about cybercrime and cybercriminals. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime This is Figure 9.12. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of computer crime Identify theft: A criminal gains access to personal information in order to impersonate another Phishing: Legitimate-looking e-mails or Web sites are created in an attempt to obtain confidential data about a person for illegal purposes. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of computer crime (continued) Malware (short for malicious software): programs developed to intentionally harm or gain access to a computer system without permission. Includes spyware, viruses, worms, zombies, and Trojan horses Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of computer crime (continued) Spyware: software that gathers private information and tracks Web use, and provides that information to third parties Adware: a form of spyware that generates annoying pop-up and banner ads Keyloggers: keep track of keystrokes to provide cybercriminals with confidential data Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of computer crime (continued) Computer virus: code that is concealed inside a program and intended to harm or destroy files File infectors attach themselves to files. Boot sector viruses attach to the first tracks on a hard drive and execute each time you start the computer. Macro viruses attach to data files and take advantage of application macros. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime This is Figure 9.14. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Rogue forms of malware include: Time bomb: A virus program that remains dormant on a computer system until it is activated by a specific event Worm: Similar to a virus but does not need the action of a user to execute the code and cause damage Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Denial of service (DoS) attack Assaults an Internet server with so many requests that it cannot function Accomplished through zombies, individual computers in a botnet—a group of “hijacked” computers. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Trojan horse Normal-looking program that includes concealed instructions Created to cause harm Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime As the stealing of private and confidential information increases, the possibility of fraud also increases. The physical stealing of computer equipment is also growing, especially computer components such as microprocessors and chips. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of fraud and theft Memory shaving: only a portion of RAM is stolen to make the theft less evident Password stealing: unauthorized gathering of passwords Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Techniques to obtain passwords This is Figure 9.17. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of fraud and theft (continued) Salami shaving: an embezzlement tool in which a program takes a little money from numerous accounts Data diddling: individuals change data so that it is hard to determine that the resulting theft has occurred Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of fraud and theft (continued) Forgery: information is transmitted over the Internet as if from a user by an illegal source that appears to be legitimate. A high percentage of cybercrimes go unreported because of blackmail. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Types of computer criminals Crackers Cybergangs Virus authors Swindlers Shills Cyberstalkers Sexual predators Cyberbullies Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Examples of Internet Scams This is Figure 9.19. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime & Cybercrime * 07/16/96 Computer Crime & Cybercrime Cyberstalkers use the Internet, social networking sites, and e-mail to harass or threaten an individual. Most perpetrators are men. Most victims are college-age women. Cyberbullies send threatening messages via e-mail or text messages. Cyberbullying involves minors. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Security Computer security risk is: * 07/16/96 Security Computer security risk is: Any intentional or unintentional action that results in damaging a computer system and/or its data Increased by wireless LANs because transmissions occur over shared airwaves instead of dedicated lines. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Security Security options available for wireless networks include: * 07/16/96 Security Security options available for wireless networks include: WEP (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access) WPA2 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Security Threats to the security of computer systems include: * 07/16/96 Security Threats to the security of computer systems include: Corporate espionage Information warfare Security loophole detection programs Attacks on safety-critical systems Terrorism Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Security To reduce security risks: * 07/16/96 Security To reduce security risks: Use an uninterruptible power supply (UPS), which supplies additional power during power outages or electrical current fluctuations to prevent damage or loss to computer components and/or data. Control access to computer systems though appropriate password selection and know-and-have authentication. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Security To reduce security risks (continued): * 07/16/96 Security To reduce security risks (continued): Use biometric authentication—the use of voice recognition, retinal scans, and fingerprint scans for authentication purposes. Incorporate firewalls, which can be hardware or software, to prevent unauthorized access. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

Security Avoiding scams on the Internet and preventing cyberstalking * 07/16/96 Security Avoiding scams on the Internet and preventing cyberstalking Use common sense. Don’t give out personal information. Be cynical of information provided in chat rooms. Read documents carefully. Remain cautious when using the Internet. This is Figure 9.25. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall *

What You’ve Learned The lack of complete federal regulations to protect the right to privacy for individuals has resulted in numerous Web sites collecting and accumulating personal information. Computer crime and cybercrime are on the rise, including such crimes as identity theft, malware, fraud, and theft. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

What You’ve Learned Computer criminals, such as crackers, cybergang members, and virus authors, are often the cause of the increase in computer security risks. Security risks are events, actions, and situations that could lead to losses. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

What You’ve Learned Although no computer system can be totally safe, you can take simple steps to protect your computer and data. Encryption can be used to guard privacy online through public key encryption. The government must keep trying to find a balance between its need to know and the privacy rights of individuals. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall