Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
1 Agendas Chapter 5 (Recap) Chapters 6 – Diverse IT Infrastructures Case – The iPremier Company: Denial of Service Attack.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
in Information Systems and the Internet
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
C8- Securing Information Systems
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Technical Implementation: Security Risks
Privacy, Security and Ethics
10 PRIVACY AND SECURITY CHAPTER
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
10 PRIVACY AND SECURITY CHAPTER
Presentation transcript:

Privacy & Security By Martin Perez

Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines to operate your PC. - Software : Programs for the computers hardware. - Hardware : The computer itself. - Data : The info. You get out of the computer. - Connectivity : Internet.

PRIVACY  Large database - The Federal Government - Information resellers or Information brokers ( collect & sells personal data). - Electronic Profiles ( Name, Address, SSN, etc.)

Continue  Large Databases - Identity Theft : it’s when someone else takes your info. And uses if for economic gain. - Mistaken Identity : when a electronic profile is switched with someone else. - Freedom of Information Act : this act allows you to see any of you records held by government agencies or business.

Continue  Private Networks - Snoop ware : this allows employers to search employees electronic mail and computer files ( employees are told this).  Internet and the Web - Illusion of Anonymity : people that feel there privacy is not in danger. -Traditional cookies : monitor your activity at a single site you look at.

Continue  Internet and the Web - Ad ware cookies : monitor your activities across all sites you look at. - Cookie-Cutter programs : these programs help control traditional cookies and Ad ware cookies. -

Continue  Major law on privacy - Code of Fair Information Practice - No secret database - Right of individual access - Right of consent - Right to correct - Assurance of reliability and proper use.

Security  Computer Criminals : Five types - Employees : Largest category - Outside users : Suppliers or clients - Hackers & Crackers : Hackers are the people who hack into computers for fun. Crackers are the same, but they steal technical Info.

Continue  Computer Criminals - Organized Crime : people that use computer likes really business, but they use for illegal use. - Terrorists : these people crash satellites and disrupt communication systems.

Continue  Computer crimes - Malicious Programs - Viruses - Worms - Trojan Horses  Denial of Service  - this attempts to slow or stop your computer system

Continue  Internet Scams - these scams try to take your money and it wastes your time.  Theft - Theft can be of hardware, software, or data of any kind.  Data Manipulation - When some goes into your computer system and change the data on it. It is against the law to do this.

Continue  Measures to protect computer security - Encrypting messages : when sending a message it had to possibility security risks. - Restricting Access - Biometric scanning - Passwords - Firewalls

Continue  Anticipating Disasters - Physical security - Data security  Backing up data : something you should always have.

THE END