Chapter 9: Privacy, Crime, and Security

Slides:



Advertisements
Similar presentations
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
Advertisements

Information Technology INT1001
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
Security+ Guide to Network Security Fundamentals
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Slides created by Bob Koziel Hagerstown Community College.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Discovering Computers 2010
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Protecting People and Information: Threats and Safeguards
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Unit 19 INTERNET SECURITY
Computers Are Your Future © 2006 Prentice-Hall, Inc.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computers Are Your Future
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computer Concepts – Illustrated 8th edition
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
Privacy, Security and Ethics
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Information Systems Design and Development Security Precautions Computing Science.
CSCI-235 Micro-Computer Applications Privacy & Security I.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Security Issues in Information Technology
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Privacy, Crime, and Security
Computer Security.
Computer Security.
Presentation transcript:

Chapter 9: Privacy, Crime, and Security

Privacy in Cyberspace Privacy: an individual’s ability to restrict or eliminate the collection, use and sale of confidential personal information The problem: collection of information without consent Anonymity: the ability to convey a message without disclosing your name or identity

Privacy in Cyberspace Cookies: small files that are written to your computer’s hard disk by many of the Web sites you visit Global Unique Identifier (GUID): an identification number that is generated by a hardware component or a program

Protecting Your Privacy Browse anonymously by surfing from www.anonymizer.com Disable cookies on your Web browser Use a free e-mail address to place on Web pages, mailing lists, chat rooms, or other public Internet spaces Do not fill out site registration forms unless you see a privacy statement indicating that the information gathered will not be sold to 3rd parties

Types of Computer Crime Identity Theft Computer Virus: a hidden code within a program that may damage or destroy infected files Time Bomb (Logic Bomb): a virus that sits harmlessly on a system until a certain event causes the program to become active Worm: a program that can spread from one computer to another and can propagate over a computer network Trojan Horse: a rogue program disguised as a useful program but contains hidden instructions to perform a malicious task instead

Types of Computer Crime Salami Shaving: a method that a programmer alters a program to subtract a very small amount of money from an account and divests the funds to the embezzler’s account Data Diddling: a method that insiders modify data by altering accounts or database records so that it is difficult to tell that they have stolen funds or equipments Forgery: a method that a user makes Internet data appear to come from one place when it is really coming from another Blackmail

Attackers Hackers, Crackers (Black hats), Cybergangs, Virus Authors, Ethical Hackers (White Hats) Swindlers Shills Cyberstalkers and Sexual Predators

Security Risks Wireless Network War Driving: an individual drives around with a wireless device to look for wireless networks Corporate Espionage: the unauthorized access of corporate information, usually to the benefit of a competitor Information Warfare: the use of information technologies to corrupt or destroy an enemy’s information and infrastructure Security Loophole Detection Program: a program that automatically search for unprotected or poorly protected computers

Protecting Computer Systems Power-Related Problems: by using Uninterruptible Power Supply (UPS) Controlling Access: by using password authentication, know-and-have authentication, or biometric authentication Firewall: a computer program or device that permits an organization’s internal computer users to access the external Internet but severely limits the ability of outsiders to access internal data Avoiding Scams Preventing Cyberstalking

Encryption Encryption: a coding or scrambling process that renders a message unreadable by anyone except the intended recipient Public Key Encryption Encryption Key (Public Key) Decryption Key (Private Key) Digital Signature: a technique that guarantees a message has not been tampered with Digital Certificate: a technique for validating one’s identity Public Key Infrastructure (PKI): a uniform set of encryption standards that specify how public key encryption, digital signatures, digital certificates should be implemented in computer systems and on the Internet