Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.

Slides:



Advertisements
Similar presentations
Computer Security and Privacy
Advertisements

Computer Security and Privacy
Chapter 15: Security and Privacy. © 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content.
Chapter 15: Computer Security and Privacy. Learning Objectives 1.Explain why all computer users should be concerned about computer security. 2.List some.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Security and Privacy Chapter Overview  This chapter covers:  Hardware loss, hardware damage, and system failure, and the safeguards that.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Computer Security and Privacy
Computer Security and Privacy
Computer Security and Privacy
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senn’s Information Technology, 3 rd Edition Chapter 14 Issues in Information.
Computer Security and Privacy
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.
CYBER CRIME AND SECURITY TRENDS
Security Issues and Ethics in Education
New Data Regulation Law 201 CMR TJX Video.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Chapter 12 Computers and Society: Security and Privacy.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Chapter 8: Computer Security and Privacy. 2 Learning Objectives  Explain why all computer users should be concerned about computer security.  List some.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Security Issues, Ethics, & Emerging Technologies in Education
DIGITAL SECURITY Information Security and data protection Facilitator: Yvonne Oluoch.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
IT in Business Issues in Information Technology Lecture – 13.
Why is it important to back up your work/information? If you do not back up your work or information then your data might be lost when your computer clashes.
Chap1: Is there a Security Problem in Computing?.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Ron Enger Southern Oregon Educational Service District Medford, Oregon Cliff Ehlinger Grant Wood Area Education Agency Cedar Rapids, Iowa December, 2006.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
Why Be Concerned About Computer Security? Security concerns that users should be concerned about, including: – Having a computer or other device stolen.
James A. Senn’s Information Technology, 3rd Edition
Network and Internet Security and Privacy
CHAPTER FOUR OVERVIEW SECTION ETHICS
Network and Internet Security and Privacy
CHAPTER FOUR OVERVIEW SECTION ETHICS
Adult business digital marketing. What to Expect from adult digital marketing.
Presentation transcript:

Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer against theft. 3. A good disaster-recovery plan includes information about where backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e-mail addresses of people you write frequently.

Ch15QQ __ 6. Which of the following allows your computer to be used when the power goes out? a. UPS b. encryption c. cable lock d. surge protector e. computer tracking software __ 7. Having control over how information about you is collected and used is referred to as: a. presence technology b. employee monitoring c. opting out d. privacy policy e. information privacy

Ch15QQ a. privacy policy b. software piracy c. backup d. throw-away e-mail address e. digital counterfeiting __ 8. Used to prevent spam. __ 9. Used to restore data when the original data is lost or damaged. __ 10. The unauthorized copying of a computer program.