McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 1010 CHAPTER PRIVACY AND SECURITY.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Advertisements

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Chapter 11 Security and Privacy: Computers and the Internet.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Protecting People and Information: Threats and Safeguards
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Computer Programming I
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy, Security and Ethics
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Privacy, Security and Ethics
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 10 Privacy and Security.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Presentation transcript:

McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY

CE06_PP10-2 Competencies (Page 1 of 2) Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe the major privacy laws and the Code of Fair Information Practice Describe the security threats posted by computer criminals, computer crime, and other hazards Page 270

CE06_PP10-3 Competencies (Page 2 of 2) Discuss ways that individuals and organizations protect their security Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks Discuss what the computer industry is doing, and what you can do to protect the environment Page 270

CE06_PP10-4 Information Systems people procedures software hardware data connectivity Page 272

CE06_PP10-5 Information Systems & Privacy People  computer can be used for both good and bad Does technology make it easy to invade our privacy? When we apply for a loan, school, DL; when check out from supermarket, library, etc. is that information about us being distributed and used without our permission? When we use the web, is info about being collected?

CE06_PP10-6 Information Systems & Security Does technology make it easy for others to invade the security of business organizations like banks, public & government organizations E.g. public organization: schools, health records Government organizations: e.g. classified information fom department of defense

CE06_PP10-7 Information Systems Concerns for People PrivacyPrivacy – What are the threats to personal privacy and how can we protect our selves? SecuritySecurity – How can access to sensitive information be controlled and how can we secure hardware and software? ErgonomicsErgonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled? Environment Environment – What can individuals and organizations do to minimize the impact of technology? Page 272

CE06_PP10-8 Computer Ethics and Privacy Computer ethics provide guidelines for computer use Ethics issues include: Privacy: collection and use of data about individuals Accuracy: responsibility to ensure data is correct Property: who owns data and rights to software Access: responsibility of those who have data to control who is able to use that data Page 273

CE06_PP10-9 Large Databases Organizations are constantly collecting data The Fed. Gov. has over 2000 databases Data gatherers Information resellers or information brokers Electronic profiles are created Concerns Spreading information without consent Identify theft Spreading inaccurate information Mistaken identity Freedom of Information Act: You’re entitled to look at your records held by government agencies. Page 274 Return

CE06_PP10-10 Computer Ethics and Privacy Private networks Employer eavesdropping on employees Snoopware: software that records everything you do on your computer ~ 75% of employers use it. Legal Legal attempts to restrict its use

CE06_PP10-11 Private Networks Employers monitor e- mail Legally done Snoopware Software Online services right to censor content Screen and reject messages Terminate user accounts Page 276 Return

CE06_PP10-12 Internet and Web Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending History file Cookies – two basic types Traditional Ad network or adware cookies Cookie-cutter programs Spyware Spy removal programs Page 276

CE06_PP10-13 Computer Ethics and Privacy Privacy laws exist, but privacy remains primarily an ethical issue

CE06_PP10-14 Major Privacy Laws Page 279

CE06_PP10-15 Code of Fair Information Practice PrincipleDescription No secret databasesNo personal data that is secret Right of individual access Individuals have a right to see information about them Right of consentInformation for one purpose cannot be used again Right to correctAbility to correct errors Assurance of reliabilityData must not be misused Page 279 Return

CE06_PP10-16 Security and Computer Criminals Threats to computer security are criminals, computer crime, and hazards Computer criminals are of five types: Employees Outside users Hackers and crackers Organized crime Terrorists Page 282

CE06_PP10-17 Computer Crime Number of Computers Crimes Going Up Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act of 1986 Page 283

CE06_PP10-18 Commonly Encountered Viruses Return Page 286

CE06_PP10-19 Commonly Encountered Worms Return Page 286

CE06_PP10-20 Other Hazards Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes Civil strife and terrorism Wars Riots Terrorist acts Technological failures Voltage surge Use surge protector Human errors Page 287

CE06_PP10-21 Measures to Protect Computer Security Encrypting messages Restricting access Anticipating disasters Backing up data Encrypted Page 287 Return

CE06_PP10-22 Restricting Access Assigning passwords Biometric scanning Fingerprint scanners Retinal (eye) scanners Firewalls Special hardware and software Controls access to internal networks Page 238 Return

CE06_PP10-23 Ergonomics (Page 1 of 3) Study of human factors related to things people use Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury Page 238

CE06_PP10-24 Ergonomics (Page 2 of 3) Page 291

CE06_PP10-25 Ergonomics (Page 3 of 3) Computer technology offers ways of improving productivity but can create irritants other than physical Noise Electronic monitoring Technostress Stress associated with computer use Page 292 Return

CE06_PP10-26 The Environment Page 293

CE06_PP10-27 Personal Responsibility to Help Protect the Environment What can you do? Conserve Recycle Educate Page 294

CE06_PP10-28 A Look to the Future Presence Technology Presence technology alerts you that someone is trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances Page 295

CE06_PP10-29 Discussion Questions Discuss the relationship between databases and privacy. Discuss the Code of Fair Information Act. Why has this act not been made into law? Discuss the various kinds of computer criminals. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals What is ergonomics? How does computer use impact mental health? Physical health? Page 302