Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.

Slides:



Advertisements
Similar presentations
Computers Are Your Future
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Information Technology INT1001
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
Chapter 10 Privacy and Security McGraw-Hill
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Discovering Computers 2010
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Protecting People and Information: Threats and Safeguards
PART THREE E-commerce in Action Norton University E-commerce in Action.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
CYBER CRIME.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Skills and Applications Computer Security.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Computers Are Your Future Twelfth Edition
Network and Internet Security and Privacy
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Privacy, Crime, and Security
Network and Internet Security and Privacy
Computer Security.
Presentation transcript:

Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Privacy in Cyberspace Privacy o Individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information Anonymity o Means to communicate without disclosing one’s identity o More difficult with the use of computers and the Internet Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2

The Problem: Collection of Information Without Consent Cookies o Small files written to your hard disk by Web sites visited o Examples include: Track your browsing habits Gather personal information without your consent o Can be disabled Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3

The Problem: Collection of Information Without Consent Radio frequency identification (RFID) Radio frequency identification (RFID) o Uses radio waves to track a chip or tag o Used for inventory control in stores o Recognizes microchips in pets Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4

The Problem: Collection of Information Without Consent United States o Federal and some State Laws: Fair Credit Reporting Act o Credit Reporting Agencies Experian, Equifax, TransUnion o No comprehensive federal law governing the overall privacy rights of U.S. citizens. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 5

The Problem: Collection of Information Without Consent SPAM o Unsolicited messages sent in bulk over electronic mailing systems o India has created the most spam Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 6

The Problem: Collection of Information Without Consent Protecting privacy online o Use free Web-based throwaway addresses. o Don’t give out personal information. o Complete forms only if you see a privacy statement. o Turn off cookies Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 7

The Problem: Collection of Information Without Consent Do not leave cell phones in public places. Turn off services not in use, especially Bluetooth. Don’t leave personal info unattended on monitors Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 8

The Problem: Collection of Information Without Consent Employee monitoring o Most U.S. employers observe employee phone calls, s, Web browsing habits, and computer files Protecting privacy at work o Don’t make personal calls on a work phone o Avoid using company for personal purposes o Assume you are monitored o Be aware of shoulder surfing Stealing info and passwords Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9

Computer Crime and Cybercrime Types of computer crime o Identify theft—criminal access to personal information in order to impersonate someone o Dumpster diving—disgruntled employees or thieves go through a company’s trash to find information they can steal o Phishing attacks—legitimate-looking s or Web sites created in an attempt to obtain confidential data about a person Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 10

Computer Crime and Cybercrime Types of computer crime (cont.) o Malware (short for malicious software)—programs that intentionally harm a computer system or allow individuals to gain access without permission Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 11

Computer Crime and Cybercrime Types of computer crime (con’t.) o Spyware—software that gathers private information and tracks Web use Adware—form of spyware that generates annoying pop-up and banner ads Keyloggers—record keystrokes to provide cybercriminals with confidential data Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 12

Computer Crime and Cybercrime Types of computer crime (con’t.) o Computer virus—code is attached to a program that can harm or destroy files Executable File Extensions o.bat.com.exe Many spread through attachments Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 13

Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 14

Rogue programs o Logic bomb—hidden computer code that sits dormant on a system until triggered o Time bomb—virus program that remains dormant on a computer system until activated o Trojan horse—normal-looking program that includes concealed instructions to cause harm Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 15

More rogue programs Denial of service (DoS) attack—assaults an Internet server with so many requests it can’t function o attack involves multiple computer systems Controlled computers are called zombies. Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 16

Computer Crime and Cybercrime Fraud, theft, and piracy o Memory shaving o Software piracy Cybergaming crime Salami shaving – stealing small amounts of money from multiple bank accounts Data diddling Forgery Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 17

Computer Crime and Cybercrime Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 18 Attackers o Hackers — Look for computer steps not in manuals o Crackers—attempt to enter highly secure computer systems to destroy data or steal information o Swindlers perpetuate frauds: Bogus work-at-home opportunities Illegal pyramid schemes Bogus franchises Phony goods that won’t be delivered

Computer Crime and Cybercrime Cyberstalkers o Use the Internet, social networking sites, and to harass or threaten o Most perpetrators are men o Most victims are college-age women Cyberbullying o Sending threatening messages via or text message o Usually involves minors Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 19

Security Computer security risk o Vacation hacking—tricking travelers into using phony WiFi hot spots—evil twins o Company Insiders are a company’s highest risk o War Driving – driving around with a notebook to get access to wireless networks Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 20

Protecting your computer system o Uninterruptible power supply (UPS)—provides additional power during outages or electrical current fluctuations o Pop-up Blockers – prevents pop-ups o Create hard to guess passwordsSecurity Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 21

Security Protecting your computer system (con’t.) o Biometric authentication—use of voice recognition, retinal scans, and fingerprint scans for authentication o Firewalls, hardware or software, to prevent unauthorized access Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 22

Protect yourself—avoid scams o Do business with reputable companies. o Read documents carefully. o Do not post a user profile with personal info. o Be cautious if meeting someone you’ve contacted online. o If you become uncomfortable or afraid, contact the policeSecurity Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 23

The Encryption Debate Cryptography o Study of transforming information into a scrambled format Encryption o Scrambling process that creates a message unreadable by anyone other than the intended recipient Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 24

Prosecuting Violators Computer forensics o Legal evidence found in computers and digital storage media Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 25