Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.

Slides:



Advertisements
Similar presentations
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Advertisements

Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Securing Information Systems
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Computer Security Keeping you and your computer safe in the digital world.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Privacy, Security and Ethics
Privacy, Security and Ethics
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 10 Privacy and Security.
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Chapter 10 Privacy and Security.
Chapter # 3 COMPUTER AND INTERNET CRIME
Privacy, Security, and Ethics
Security, Privacy, Ethics And Ergonomic
Presentation transcript:

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Identify the most significant concerns for effective implementation of computer technology.  Discuss the primary privacy issues of accuracy, property, and access.  Describe the impact of large databases, private networks, the Internet, and the Web on privacy.  Discuss online identity and major laws on privacy.

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Describe the security threats posed by computer criminals including employees, hackers, crackers, carders, organized crime, and terrorists.  Discuss computer crimes including creation of malicious programs such as viruses, worms, Trojan horse, and zombies as well as denial of service attacks, Internet scams, social networking risks, cyber-bullying, rogue Wi-Fi hotspots, theft, data manipulation, and other hazards.

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss.  Discuss computer ethics including copyright law, software piracy, and digital rights management as well as plagiarism and ways to identify plagiarism.

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy.  This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Privacy – What are the threats to personal privacy and how can we protect ourselves?  Security – How can access to sensitive information be controlled and how can we secure hardware and software?  Ethics – How do the actions of individual users and companies affect society?

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Privacy – concerns the collection and use of data about individuals  Three primary privacy issues:  Accuracy  Property  Access

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Large organizations compile information about us.  Federal government has over 2,000 databases  Telephone companies  Reverse directory lists of calls we make  Supermarkets  What we buy and when

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Information resellers or information brokers  Collect and sell personal data  Electronic profiles easily created  Personal information is a marketable commodity, which raises many issues:  Collecting public, but personally identifying information (e.g., Google’s Street View)  Spreading information without personal consent, leading to identity theft  Spreading inaccurate information  Mistaken identity  Freedom of Information Act

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Employers can monitor legally  75 percent of all businesses search employees’ electronic mail and computer files using snoopware  A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Illusion of anonymity  People are not concerned about privacy when surfing the Internet or when sending  History file in Web browsers  Cookies Cookies  Spyware Spyware

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Cookies  Small pieces of information that are deposited on your hard disk from web sites you have visited  Traditional  Ad network  Adware

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Privacy Modes  InPrivate Browsing  Internet Explorer  Private Browsing  Safari  Eliminate history files  Block cookies Return

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Web bugs  Small images or HTML code hidden within an e- mail message  When a user opens the message information is sent back to the source of the bug  Computer monitoring software  Invasive and dangerous  Record activities and keystrokes  Also known as keystroke loggers  Anti-Spyware programs Return

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  The information that people voluntarily post about themselves online  Archiving and search features of the Web make it available indefinitely

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Federal laws governing privacy matters have been created  Gramm-Leach-Bliley Act  Protects personal financial information  Health Insurance Portability and Accountability Act (HIPAA)  Protects medical records  Family Educational Rights and Privacy Act (FERPA)  Restricts disclosure of educational results and records

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  If you have installed any free software from the Internet this seemingly harmless software might actually be spying on you, even sending personal information to advertisers

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Threats to computer security include criminals, computer crimes, and other hazards  Computer criminals:  Employees  Outside users  Hackers and crackers  Carders  Organized crime  Terrorists

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Malicious Programs - Malware  Viruses  Worms  Trojan horse  Zombies  Denial of Service  (DoS) attack

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Internet scams  Phishing

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Social networking risks  Cyber-bullying  Rogue Wi-Fi hotspots  Theft  Data manipulation  Computer Fraud and Abuse Act

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Natural hazards  Civil strife and terrorism  Technological failures  Human errors

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Restricting access Restricting access  Encrypting data Encrypting data  Anticipating disasters  Physical security  Data security  Disaster recovery plan  Preventing data loss

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Biometric scanning  Fingerprint scanners  Iris (eye) scanners  Passwords  Dictionary attack  Firewalls Return

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Encryption  Coding information to make it unreadable, except to those who have the encryption key  encryption  File encryption  Web site encryption  Virtual private networks (VPNs)  Wireless network encryption  WEP, WPA, and WPA2 Return

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Standards of moral conduct  Copyright  Gives content creators the right to control the use and distribution of their work  Paintings, books, music, films, video games  Software piracy  Unauthorized copying and distribution  Digital Millennium Copyright Act  Digital rights management (DRM)  Plagiarism

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Cryptography is the science of disguising and revealing encrypted information  Usually refers to keeping any intercepted information private  Cryptographers are mathematicians who specialize in making and breaking codes  Annual salary is usually from $60,000 to over $100,000/year

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  A Webcam on Every Corner  Images of public places are more accessible than ever before (e.g., Google Street View)  “Virtual site-seeing tours”  Public webcams continue to grow in popularity

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Define privacy and discuss the impact of large databases, private networks, the Internet, and the Web.  Define and discuss online identity and the major privacy laws.  Define security and discuss computer criminals including employees, hackers, crackers, carders, and organized crime.

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Define computer crime and the impact of malicious programs, including viruses, worms, and Trojan horses, and zombies as well as cyber- bullying, denial of service, Internet scams, social networking risks, rogue Wi-Fi hotspots, theft, data manipulation, and other hazards.  Discuss ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss.

Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials  Define ethics and describe copyright law and plagiarism.