CSEC INFORMATION TECHNOLOGY

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

PC Security 101 Keeping your data safe. Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue.
How to install “bubble” fonts These fonts are used to create the Formative Assessment sheets.
2 Language of Computer Crime Investigation
Ways in Which Information Can Be Misused. In this information age in which we live information is a precious and powerful commodity Unfortunately it can.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
MODUS OPERANDI OF CYBER CRIME
Security, Privacy, and Ethics Online Computer Crimes.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Working group discussion 1 Cyber Risk Security, Privacy ?
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
Computer Ethics in Information Technology
Issues Raised by ICT.
Computer and Society Introduction to: World Wide Web Wild Card
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Community Meeting August 1, 2010 Topic: CREDIT trap will destroy your EQUITY.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Essential Standard 2.00 Understand the nature of business. 1.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Mrs. Jefferson Business Information Management I.
Topics Communication Technology Internet Data Security Information Misuse Information Systems Technological Trends Impact of IT.
Tech Vocabulary A Guide to Computer Terms and Acronyms.
Unit 1 – Digital Literacy – Computer Terms Mr. M. Goldberg, Martingrove C.I., 2011 Digital Literacy Review By Mr. M. Goldberg – Martingrove C.I. October,
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Unethical use of Computers and Networks
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
Topic 1Topic 2Topic 3Topic 4Topic
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Green IT development achieves Low-carbon environment.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
By Austin Kellogg DeterDetectDefend 1.RealReal 2.VirtualVirtual 3.FTCFTC.
Click on your group to see your activity for today
Social Studies Station Instructions Use the the computer/internet, and books to find the answers to the questions. Open the PowerPoint template on your.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
CONTROLLING INFORMATION SYSTEMS
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
TYLER GROUP
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Computer Ethics IT Fundamentals Battlefield High School.
Electronic counter surveillance.
Lesson 10A: The Three D’s of Identify Theft
Identity Theft Chelsea Weser.
Attention Identity theft Definition
MODUS OPERANDI OF CYBER CRIME
Five Unethical Uses of Computers
The Internet An Overview.
الانترنت والبريد الإلكتروني
Pima Medical Institute Online Education
Ethical Use of Computers
What do all these things have in common?
Pima Medical Institute Online Education
Unit 1 Fundamentals of IT
PERSONAL FINANCE: December 13
Presentation transcript:

CSEC INFORMATION TECHNOLOGY MISUSE OF INFORMATION

This is a WEB QUEST On the MISUSE OF INFORMATION

SOME OF THE WAYS IN WHICH INFORMATION CAN BE MISUSED Violation of privacy Propaganda Software piracy Computer fraud Electronic eavesdropping Industrial espionage Surveillance Identity theft Credit card fraud

Working in pairs you are required to conduct in-depth research on each area and document your findings on the sheets provided. The following slide lists the questions you must answer. Please write them down

Questions : 1. What is…. 2. Is it illegal. 3 Questions : 1. What is…? 2. Is it illegal? 3. What are the negative effects? 4. What role does the computer play in …? 5. One example is … 6. How can one protect ones self from …?

The following slides contain resources on the www that will help you as your research these topics. Note that this list is not exhaustive and your are expected to locate others on your own in order to complete your assignment.

When you are through (at the end of the hour) you must email your file to sahsitdept@yahoo.com

VIOLATION OF PRIVACY http://www.gencourt.state.nh.us/RSA/html/LXII/644 /644-9.htm http://www.websters-online- dictionary.org/vi/violation+of+privacy.html http://www.ectaa.org/Home/Publications/PressRelea ses/ViolationofPrivacy/tabid/108/language/en- US/Default.aspx http://legal-dictionary.thefreedictionary.com/Privacy

PROPAGANDA http://dictionary.reference.com/brows e/propaganda http://www.yourdictionary.com/diction ary-articles/Definition-of- Propaganda.html http://www.answers.com/topic/propag anda

SOFTWARE PIRACY http://whatis.techtarget.com/definition/0,,sid9_gc i213592,00.html http://www.webopedia.com/TERM/S/software_pi racy.html http://www.yourdictionary.com/computer/softw are-piracy http://www.wisegeek.com/what-is-software- piracy.htm

COMPUTER FRAUD http://www.its.bldrdoc.gov/projects/devglossary/_compute r_fraud.html http://www.wisegeek.com/what-is-computer-fraud.htm http://www.encyclopedia.com/doc/1O11- computerfraud.html http://www.mariosalexandrou.com/definition/computer- crime.asp http://www.scit.wlv.ac.uk/~cm1988/CP3349%20SLAPA/co mputer_crime.htm

ELECTRONIC EAVESDROPPING http://www.britannica.com/EBchecked/t opic/183788/electronic-eavesdropping http://legal- dictionary.thefreedictionary.com/Electro nic+Surveillance http://www.rfidjournal.com/article/print/ 1401

INDUSTRIAL ESPIONAGE http://www.investorwords.com/2443/industrial _espionage.html http://www.bitpipe.com/tlist/Industrial- Espionage.html

SURVEILLANCE http://medical- dictionary.thefreedictionary.com/Electronic+Ea vesdropping http://www.thefreedictionary.com/surveillance http://encyclopedia2.thefreedictionary.com/Co mputer+surveillance http://www.knowledgerush.com/kr/encyclopedi a/Computer_surveillance/

IDENTITY THEFT http://searchsecurity.techtarget.com/sDefin ition/0,,sid14_gci801871,00.html http://www.thefreedictionary.com/identity +theft http://ezinearticles.com/?A-Definition-of- Identity-Theft&id=1016208 http://www.id-theft-info.com/

CREDIT CARD FRAUD http://ezinearticles.com/?Credit-Card- Fraud---Part-I&id=123783 http://www.yourdictionary.com/hacker/cre dit-card-fraud http://www.ehow.com/about_5085291_def inition-credit-card-fraud.html http://www.answers.com/topic/charge-card

~~~ THE END ~~~