Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.

Slides:



Advertisements
Similar presentations
Computers Are Your Future
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Information Technology INT1001
Confidentiality and Privacy Controls
Crime and Security in the Networked Economy Part 4.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Discovering Computers 2010
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 11 Security and Privacy: Computers and the Internet.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Defining Security Issues
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Computers Are Your Future
BUSINESS B1 Information Security.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Computers Are Your Future Twelfth Edition
IT Security  .
Year 10 ICT ECDL/ICDL IT Security.
Privacy, Crime, and Security
Network and Internet Security and Privacy
Computer Security.
Computer Security.
G061 - Network Security.
Presentation transcript:

Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2

Objectives Understand how technological developments are eroding privacy and anonymity. List the types of computer crime and cybercrime. List the types of computer criminals. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3

Objectives Understand computer system security risks. Describe how to protect your computer system and yourself. Define encryption and explain how it makes online information secure. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4

Objectives Describe the issues the government faces when balancing the need to access encrypted data and the public’s right to privacy. Distinguish between electronic discovery and computer forensics. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 5

Privacy in Cyberspace Privacy o Individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 6

The Problem: Collection of Information Without Consent Anonymity o Means to communicate without disclosing one’s identity o More difficult with the use of computers and the Internet Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 7

The Problem: Collection of Information Without Consent Technologies that jeopardize anonymity o Cookies o Global unique identifiers o Ubiquitous computing o Radio frequency identification Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 8

The Problem: Collection of Information Without Consent Cookies o Small files written to your hard disk by Web sites visited o Examples include: Track your browsing habits Gather personal information without your consent o Can be disabled o Banner ads—targeted display ads based on cookies Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9

The Problem: Collection of Information Without Consent Global unique identifer (GUID) o Identification number produced by software or a piece of hardware o Web servers read the GUID. o Users are not always aware of the GUID. o If used, companies typically allow users to opt out. o Civil liberties groups and public concern have decreased the use of GUIDs. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 10

The Problem: Collection of Information Without Consent Ubiquitous computing o Interacting with multiple networked devices Example: adjusting heat or light based on signals sent by monitors built into clothing o Active badge—transmits infrared signals to create an electronic trail o Current devices—hold private information that can be exploited if the device is lost or stolen Example: smartphones Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 11

The Problem: Collection of Information Without Consent Radio frequency identification (RFID) o Uses radio waves to track a chip or tag o Used for inventory control in stores o Recognizes microchips in pets o May compromise anonymity and privacy if information stored on RFID tags attached to U.S. passports Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 12

The Problem: Collection of Information Without Consent Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 13

The Problem: Collection of Information Without Consent European Union o Be informed when information about them is being collected and how it will be used. o Give or deny consent to have their information collected and choose how collected information will be used. o Request that information about themselves be removed from marketing and other databases. United States o Legislation currently in place includes: Fair Credit Reporting Act Health Insurance Portability and Privacy Act Family Education Rights and Privacy Act o No comprehensive federal law governing the overall privacy rights of U.S. citizens. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 14

The Problem: Collection of Information Without Consent SPAM o Unsolicited messages sent in bulk over electronic mailing systems o CAN-SPAM Act of 2003 U.S. law that provided tools to combat spammers. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 15

The Problem: Collection of Information Without Consent Protecting privacy online o Use products such as Anonymous Surfing or IronKey Secure USB flash. o Use free Web-based throwaway addresses in chat rooms and for mailing lists. o Tell children not give out personal information. o Complete forms only if you see a privacy statement. o Turn off cookies Prevent the activity of Web beacons o Transparent graphic images placed on a Web site or in an —used to monitor Web or behavior Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 16

The Problem: Collection of Information Without Consent Protecting privacy at home o Create logins and passwords for each person using the computer. o Do not save account numbers or passwords. o Close a secured account site when not using a computer. o Use strong passwords Do use: difficult to guess passwords; at least 14 characters or more long; uppercase letters, lowercase letters, numbers, and special characters Don’t use: a recognizable word or phrase; name of anything or anyone close to you, including names of family members or pets; recognizable strings of numbers, such as social security numbers or birth dates Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 17

The Problem: Collection of Information Without Consent Do not leave cell phones in public places. Turn off services not in use, especially Bluetooth. Verify that devices have secure configurations. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 18

The Problem: Collection of Information Without Consent Employee monitoring o Majority of large U.S. employers observe employee phone calls, s, Web browsing habits, and computer files Protecting privacy at work o Refrain from making personal calls on a work phone o Avoid using company for personal purposes o Assume you are monitored o Be aware of shoulder surfing o Do not allow others to tailgate Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 19

The Problem: Collection of Information Without Consent Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 20

Computer Crime and Cybercrime Computer crimes o Computer-based activities that violate the law Cybercrimes o Crimes perpetrated through the Internet o Many Web sites educate users about cybercrime and cybercriminals Cyberlaw o Area of law dedicated to computer crime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 21

Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 22

Rogue programs o Logic bomb—hidden computer code that sits dormant on a system until triggered o Time bomb—virus program that remains dormant on a computer system until activated o Worm—similar to a virus but does not need action of a user to execute Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 23

Computer Crime and Cybercrime Fraud, theft, and piracy o Memory shaving o Software piracy Cybergaming crime Tricks for obtaining passwords Salami shaving and data diddling Forgery Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 24

Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 25 The attackers o Hackers—computer hobbyists attempting unauthorized access, generally subscribing to an unwritten code of conduct—hacker ethic o Cybergangs—groups of hackers working together to coordinate attacks o IP spoofing—sends a message with an IP address disguised as a message from a trusted source o Honeypots—computers baited with fake data and purposely left vulnerable to study how intruders operate to prepare stronger defenses

Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 26 The Attackers (con’t.) o Crackers (also called black hats)—attempt to enter highly secure computer systems to destroy data or steal information o Ethical hackers (also called white hats) use expertise to shore up computer system defenses o Computer virus authors—create viruses and other types of malware to vandalize computer systems o Swindlers perpetuate frauds: Bogus work-at-home opportunities Illegal pyramid schemes Bogus franchises Phony goods that won’t be delivered Over-priced scholarship searches

Security Computer security risk o Any intentional or unintentional action resulting in damaging a computer system or its data o Increased by wireless LANs because transmissions occur over shared airwaves instead of dedicated lines Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 27

Security Computer security risk (con’t) o Wireless LAN security options include: WEP (Wired Equivalent Privacy) WPA (WiFi Protected Access) WPA2 o Vacation hacking—tricking travelers into using phony WiFi hot spots—evil twins Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 28

Security Computer system security threats o Corporate espionage—unauthorized access of corporate information, usually to the benefit of a competitor Pod slurping—using removable storage media to create unauthorized copies of confidential data Trap doors—security holes created by employees allowing entry to company systems after leaving the firm o Information warfare—use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure o Security loophole detection programs o Attacks on safety-critical systems o Terrorism Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 29

Protecting your computer system o Uninterruptible power supply (UPS)—provides additional power during outages or electrical current fluctuations o Control access to computer systems through appropriate password selection and know-and-have authentication, which requires using tokens to generate a login code.Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 30

Security Protecting your computer system (con’t.) o Biometric authentication—use of voice recognition, retinal scans, and fingerprint scans for authentication o Firewalls, hardware or software, to prevent unauthorized access Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 31

Protect yourself—avoid scams o Do business with reputable companies. o Read documents carefully. o Don’t give out personal information o Do not post a user profile. o Be skeptical of chat room information. o Be cautious if meeting someone you’ve contacted online. o If you become uncomfortable or afraid, contact the policeSecurity Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 32

The Encryption Debate Cryptography o Study of transforming information into an encoded or scrambled format Cryptographers o Individuals who practice cryptography Encryption o Coding or scrambling process that renders a message unreadable by anyone other than the intended recipient Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 33

The Encryption Debate Plaintext o Readable message that has not been encrypted Encryption key o Formula that makes a plaintext message unreadable Ciphertext o Coded message Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 34

The Encryption Debate Symmetric key encryption o Uses same key for both encryption and decryption Key interception o Occurs when a symmetric key encryption is stolen, allowing others to decrypt messages encrypted with that encryption key Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 35

Public key encryption o Also referred to as asymmetric key encryption o Uses two keys: Public key to encrypt Private key to decrypt o Essential for e-commerce o Used to implement: Digital signatures—guarantee messages are secure Digital certificates—validate identity Secure electronic transaction (SET) o Uses digital certificates o Enable parties engaged in Internet-mediated transactions to confirm each other’s identities The Encryption Debate Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 36

The Encryption Debate Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 37

Summary Understand how technological developments are eroding privacy and anonymity. List the types of computer crime and cybercrime. List the types of computer criminals. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 38

Summary Understand computer system security risks. Describe how to protect your computer system and yourself. Define encryption and explain how it makes online information secure. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 39

Summary Describe the issues the government faces when balancing the need to access encrypted data and the public’s right to privacy. Distinguish between electronic discovery and computer forensics. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 40

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2012 Pearson Education, Inc. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 41 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall