Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Information Technology, the Internet, and You
Communications and Networks
Computing Essentials 2014 Systems Analysis and Design © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Databases Chapter 11.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computers and Society, Security, Privacy, and Ethics
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Discuss techniques to prevent unauthorized computer access and use
Computing Essentials 2014 System Software © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized.
Computing Essentials 2014 Secondary Storage © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Privacy, Security and Ethics
Privacy, Security and Ethics
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Identify the most significant concerns for effective implementation of computer technology.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Computers and Society, Security, Privacy, and Ethics
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Chapter # 3 COMPUTER AND INTERNET CRIME
Privacy, Security, and Ethics
Security, Privacy, Ethics And Ergonomic
Presentation transcript:

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computing Essentials 2014 Privacy, Security, and Ethics Chapter 9

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Competencies (Page 1 of 3)  Identify the most significant concerns for effective implementation of computer technology.  Discuss the primary privacy issues of accuracy, property, and access.  Describe the impact of large databases, private networks, the Internet, and the Web on privacy.  Discuss online identity and major laws on privacy. 2

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Competencies (Page 2 of 3)  Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan horse, and zombies as well as denial of service attacks, Internet scams, social networking risks, cyberbullying, rogue Wi-Fi hotspots, theft, and data manipulation.  Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. 3

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Competencies (Page 3 of 3)  Discuss computer ethics including copyright law, software piracy, digital rights management, the Digital Millennium Copyright Act, as well as plagiarism and ways to identify plagiarism. 4

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Introduction  The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy.  This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web. 5

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. People  Privacy – What are the threats to personal privacy and how can we protect ourselves?  Security – How can access to sensitive information be controlled and how can we secure hardware and software?  Ethics – How do the actions of individual users and companies affect society? 6

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Privacy  Privacy – concerns the collection and use of data about individuals  Three primary privacy issues:  Accuracy  Property  Access 7

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Large Databases (Page 1 of 2)  Large organizations compile information about us.  Federal government has over 2,000 databases  Telephone companies  Reverse directory lists of calls we make  Supermarkets  What we buy and when 8

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Large Databases (Page 2 of 2)  Information resellers or information brokers  Collect and sell personal data  Electronic profiles easily created  Personal information is a marketable commodity, which raises many issues:  Collecting public, but personally identifying information (e.g., Google’s Street View)  Spreading information without personal consent, leading to identity theft  Spreading inaccurate information  Mistaken identity  Freedom of Information Act 9

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Private Networks  Employers can monitor legally  75 percent of all businesses search employees’ electronic mail and computer files using snoopware  A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first 10

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Viewing and Blocking Cookies  Cookies  Small pieces of information that are deposited on your hard disk from web sites you have visited  First-party cookies  Third-party cookies 11

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Online Identity  The information that people voluntarily post about themselves online  Archiving and search features of the Web make it available indefinitely  Major Laws on Privacy  Gramm-Leach-Bliley Act  Health Insurance Portability and Accountability Act (HIPAA)  Family Educational Rights and Privacy Act (FERPA) 12

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Security  Cybercrime or computer crime is any offense that involves a computer and a network  Hackers  Gain unauthorized access 13

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computer Crime (Page 1 of 3)  Malicious Programs - Malware  Viruses  Worms  Trojan horse  Zombies  Denial of Service  (DoS) attack 14

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computer Crime (Page 2 of 3)  Internet scams  Phishing 15

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computer Crime (Page 3 of 3)  Social networking risks  Cyber-bullying  Rogue Wi-Fi hotspots  Theft  Data manipulation  Computer Fraud and Abuse Act 16

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Making IT Work for You ~ Security Suites  Security Suites are software packages that include various utilities that help protect your computer from cybercrime. 17

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Making IT Work for You ~ Cloud-Based Backup  Cloud-based backup services such as Carbonite provide cloud- based backup services. 18

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Ethics  Standards of moral conduct  Copyright  Gives content creators the right to control the use and distribution of their work  Paintings, books, music, films, video games  Software piracy  Unauthorized copying and distribution  Digital Millennium Copyright Act  Digital rights management (DRM)  Plagiarism 19

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Careers in IT  IT Security Analysts maintain the security of a company’s network, systems, and data.  Must safeguard information systems against external threats  Annual salary is usually from $62,000 to $101,000  Demand for this position is expected to grow 20

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. A Look to the Future  A Webcam on Every Corner  Images of public places are more accessible than ever before (e.g., Google Street View)  “Virtual site-seeing tours”  Public webcams continue to grow in popularity 21

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Open-Ended Questions (Page 1 of 3)  Define privacy and discuss the impact of large databases, private networks, the Internet, and the Web.  Define and discuss online identity and the major privacy laws.  Define security. Define computer crime and the impact of malicious programs, including viruses, worms, Trojan horses, and zombies, as well as cyberbullying, denial of service attacks, Internet scams, social networking risks, rogue Wi-Fi hotspots, thefts, data manipulation, and other hazards. 22

Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Open-Ended Questions (Page 2 of 2)  Discuss ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss.  Define ethics, and describe copyright law and plagiarism. 23