Chapter 12 Computers and Society: Security and Privacy.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer Security and Safety, Ethics and Privacy
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
Crime and Security in the Networked Economy Part 4.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9: Privacy, Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 12 Computers and Society: Security and Privacy.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Computers and Society Security and Privacy. 2 Identify the various types of security risks that can threaten computers Describe ways to safeguard a.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Chapter 12 Computers and Society: Security and Privacy
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computer Security, Ethics and Privacy
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 11 Objectives Describe the types of computer security risks
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
Security Issues & Ethics in Education By Maud Mushayamunda.
Information Systems Design and Development Security Precautions Computing Science.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security, Ethics and Privacy
Chapter 12 Computers and Society: Security and Privacy
Network and Internet Security and Privacy
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Computer Security, Ethics and Privacy
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Presentation transcript:

Chapter 12 Computers and Society: Security and Privacy

Cybercrime Online or Internet- based illegal acts Computer Security: Risks and Safeguards What is a computer security risk? p.12.2 Next Computer crime Any illegal act involving a computer Event or action that causes loss of or damage to a computer system

Computer Security: Risks and Safeguards What is a computer virus? v Potentially damaging program that affects computer negatively by altering way computer works v Segment of program code from some outside source that implants itself in computer p.12.2 Next Click to view video

Computer Security: Risks and Safeguards What are the ways viruses can be activated? v Opening infected file v Running infected program v Booting computer with infected floppy disk in disk drive p.12.2 Next Click to view Web Link then click Computer Viruses

Computer Security: Risks and Safeguards What is the source of a virus? v Written by programmer Some write viruses as challenge Others write viruses to cause destruction or to slow Internet p.12.2 Next

Computer Security: Risks and Safeguards What are signs of a virus infection? p.12.4 Fig Next

Boot sector virus Resides in boot sector of floppy disk or master boot record of hard disk Computer Security: Risks and Safeguards What are the three main types of virus? p.12.4 Next File virus Attaches itself to program files Macro virus When you open document that contains infected macro, virus loads into memory

Computer Security: Risks and Safeguards What does an antivirus program do? v Detects and identifies viruses v Inoculates existing program files v Removes or quarantines viruses v Creates rescue disk p.12.6 Next

Stealth virus Infects a program file, but still reports size and creation date of original, uninfected program Cannot be detected by inoculation file Computer Security: Risks and Safeguards p.12.6 Next Polymorphic virus Modifies its own code each time it attaches itself to another program or file Cannot be detected by its virus signature because code pattern in virus never looks the same What two types of virus are more difficult to detect?

Computer Security: Risks and Safeguards What does an antivirus program do once it detects a virus? p.12.6 Next v Removes virus if possible v Quarantines infected file in folder on hard disk

Computer Security: Risks and Safeguards What is a rescue disk? v Removable disk that contains uninfected copy of key operating system commands and startup information v Upon startup, rescue disk finds and removes boot sector virus p.12.6 Next

Computer Security: Risks and Safeguards What should you do if a virus infects your system? v Remove virus v If you share data with other users, then immediately inform them of virus infection p.12.6 Next

Computer Security: Risks and Safeguards How can you stay informed about viruses? v Several Web sites publish list of virus alerts and virus hoaxes p.12.7 Fig Next Virus hoax message that warns you of non-existent virus

Computer Security: Risks and Safeguards v Use of computer or network without permission p.12.7 Next Cracker Someone who tries to access a computer or network illegally Hacker Once used as a complimentary word for a computer enthusiast Now another word for cracker What is unauthorized access?

Computer Security: Risks and Safeguards How can you make your password more secure? v Longer passwords provide greater security p.12.9 Fig Next

Computer Security: Risks and Safeguards What is a biometric device? v Translates person’s characteristics into digital code that is compared to digital code stored in computer p Next Biometric identifier Fingerprints Hand geometry Facial features Voice Signatures Retinal (eye) patterns

Computer Security: Risks and Safeguards What is a fingerprint scanner? v Captures curves and indentations of a fingerprint p Fig Next

Computer Security: Risks and Safeguards What is a hand geometry system? v Measures shape and size of person’s hand v Typically used as time and attendance device by large companies p Fig Next

Computer Security: Risks and Safeguards What is a face recognition system? v Captures face image and compares it to stored image to see if person is legitimate user v Can recognize people with or without glasses, makeup, or jewelry, and with new hairstyles p Fig Next

Computer Security: Risks and Safeguards What is an iris verification system? v Reads patterns in tiny blood vessels in back of eye p Fig Next

Computer Security: Risks and Safeguards What is an audit trail? v Records in file both successful and unsuccessful access attempts p Next Companies should document and explain to employees policies regarding use of computers by employees for personal reasons

When you purchase software, you do not own the software; instead, you become a licensed user Computer Security: Risks and Safeguards What is software theft? v Can range from someone stealing media that contains software to intentional piracy of software v Software piracy is unauthorized and illegal duplication of copyrighted software p Next

Network Site License Allows network users to share single copy of software that resides on network server Computer Security: Risks and Safeguards Single-User License vs Site License p Next Single-User License Install software on one computer Sell software to someone, but only after removing software from computer first

Computer Security: Risks and Safeguards What is encryption? v Process of converting readable data into unreadable characters to prevent unauthorized access v Used to transmit files over Internet p Next Plaintext Unencrypted, readable data Ciphertext The encrypted (scrambled) data encryption software Plaintext Unencrypted, readable data encryption key

Computer Security: Risks and Safeguards v Prolonged malfunction of computer v Can cause loss of hardware, software, data, or information p Next aging hardware natural disasters such as fires, floods, or storms random events such as electrical power problems What is a system failure?

Computer Security: Risks and Safeguards What is a surge protector? v Smoothes out minor noise, provides stable current flow, and keeps overvoltage from reaching computer v Amount of protection proportional to its cost v Also called surge suppressor p Fig Next

Computer Security: Risks and Safeguards How do the types of backup compare? p Fig Next

Computer Security: Risks and Safeguards What are backup procedures? v Specify regular plan of copying and storing important data and program files p Fig Next

Child Most recent copy of file Computer Security: Risks and Safeguards What is a three-generation backup policy? p Next Parent Second oldest copy of file Grandparent Oldest copy of file

Computer Security: Risks and Safeguards What is a disaster recovery plan? v Written plan describing steps company would take to restore computer operations in event of a disaster v Contains four major components p Next Emergency planBackup planRecovery planTest plan

Internet and Network Security How do Web browsers provide secure data transmission? v Many Web browsers use encryption v Web site that uses encryption techniques to secure its data is known as secure site Use digital certificates with security protocol p Next Digital certificate Notice that guarantees user or Web site is legitimate Also called public- key certificate

Internet and Network Security What is Secure Sockets Layer (SSL)? v Provides private-key encryption of all data that passes between client and server p Fig Next https indicates secure connection

Internet and Network Security What is a digital signature? v Encrypted code that person, Web site, or company attaches to electronic message to verify identity of message sender Code usually consists of user's name and hash of all or part of message p Next Hash Mathematical formula that generates code from contents of message

Internet and Network Security What is a personal firewall? v Software program that detects and protects personal computer and its data from unauthorized intrusions v Constantly monitors all transmissions to and from computer v Informs you of any attempted intrusions p Fig Next

Online security service Web site that evaluates computer to check for Web and vulnerabilities Internet and Network Security What is another way to protect your personal computer? v Disable File and Print Sharing on Internet connection p Fig Next

Should employers monitor your computer usage and messages? Is data about an individual really private? ? Information Privacy What is information privacy? v Right of individuals and companies to deny or restrict collection and use of information about them v More difficult to maintain today because huge databases store this data in online databases p Next

Information Privacy What are ways to safeguard personal information? p Fig Next (continued)

Information Privacy What are ways to safeguard personal information (continued)? p Fig Next

Information Privacy What is an electronic profile? p Next Data collected every time you fill out form or click advertisement on Web Merchants sell the contents of their databases to national marketing firms and Internet advertising firms Data combined with information from public sources Merchants sell contents of their databases to national marketing firms and Internet advertising firms Marketing firms sell your electronic profile to any company that requests it

Track user preferences Information Privacy What is a cookie? v Small file that Web server stores on your computer v Typically contains data about you v Web site can read data only from its own cookie file v Some Web sites sell or trade information stored in your cookie to advertisers p Next Track how regularly you visit site and Web pages you visit when at site Target advertisements to your interests and browsing habits

Information Privacy How can cookies track user preferences? p Fig Next Personal information you enter in form is converted to codes, which are stored in cookie on your hard disk Cookie for MSNBC saved in Cookies folder on hard disk

Information Privacy How can you set your browser to control cookies? v Set browser to accept cookies automatically, or prompt you if you wish to accept cookie, or disable cookie use v Many Web sites do not allow you to access features if you disable cookie use p Fig Next slider sets cookie control

Information Privacy What is a cookie manager? v Software program that selectively blocks cookies p Fig Next

Information Privacy What is spyware? v Program placed on computer without user's knowledge v Secretly collects information about user v Can enter computer as virus or as a result of installing new program p Next Adware Spyware used by Internet advertising firms to collect information about user’s Web browsing habits

Anti-spam program Attempts to remove spam Sometimes removes valid messages Information Privacy p Next filtering Service that blocks messages from designated sources Collects spam in central location that you can view any time How can you control spam?

Computer Abuse Amendments Law Outlaws viruses Information Privacy What privacy laws have been enacted? v Many federal and state laws regarding storage and disclosure of personal data, such as: Next p Child Online Protection Law Penalizes those who distribute material deemed harmful to children

Information Privacy What is employee monitoring? v Using computers to observe employee’s computer use, including , keyboard activity, and Web sites visited v Legal for employers to use monitoring software programs p Next Privacy for Consumers and Workers Act Proposed law that employers monitoring electronic communications must notify employees

The 1996 Communications Decency Act Made it a criminal offense to distribute indecent or patently offensive material online Declared unconstitutional in June 1997 by Supreme Court Information Privacy What is one of the most controversial issues surrounding the Internet? v Availability of objectionable material such as racist literature and obscene pictures p Next

Information Privacy What is filtering software? v Can restrict access to specified Web sites v Some filter sites use specific words v Others filter messages and chat rooms p Next

Chapter 12 Complete