McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 1010 CHAPTER PRIVACY AND SECURITY.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Advertisements

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Protecting People and Information: Threats and Safeguards
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
C OMPUTING E SSENTIALS Presentations by: Fred Bounds Timothy J. O’Leary Linda I. O’Leary.
Computer Programming I
in Information Systems and the Internet
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Security and Ethics Privacy Employment Health Crime Working
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy, Security and Ethics
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Privacy, Security and Ethics
10 PRIVACY AND SECURITY CHAPTER
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
10 PRIVACY AND SECURITY CHAPTER
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Chapter 10 Privacy and Security.
10 PRIVACY AND SECURITY CHAPTER
Presentation transcript:

McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY

CE06_PP10-2 Competencies (Page 1 of 2) Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe the major privacy laws and the Code of Fair Information Practice Describe the security threats posted by computer criminals, computer crime, and other hazards Page 270

CE06_PP10-3 Competencies (Page 2 of 2) Discuss ways that individuals and organizations protect their security Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks Discuss what the computer industry is doing, and what you can do to protect the environment Page 270

CE06_PP10-4 Information Systems people procedures software hardware data connectivity Page 272

CE06_PP10-5 Information Systems Concerns for People PrivacyPrivacy – What are the threats to personal privacy and how can we protect our selves? SecuritySecurity – How can access to sensitive information be controlled and how can we secure hardware and software? ErgonomicsErgonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled? Environment Environment – What can individuals and organizations do to minimize the impact of technology? Page 272

CE06_PP10-6 Computer Ethics and Privacy Privacy relates to the collection and use of personal information; concerns include: Large databases Private networks Internet/Web Privacy laws exist, but privacy remains primarily an ethical issue Computer ethics provide guidelines for computer use Ethics issues include: Privacy Accuracy Property Access Page 273

CE06_PP10-7 Large Databases Data collected daily Data gatherers Information resellers or information brokers Electronic profiles are created Concerns Spreading information without consent Identify theft Spreading inaccurate information Mistaken identity Freedom of Information Act Page 274 Return

CE06_PP10-8 Private Networks Employers monitor e- mail Legally done Snoopware Software Online services right to censor content Screen and reject messages Terminate user accounts Page 276 Return

CE06_PP10-9 Internet and Web Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending History file Cookies – two basic types Traditional Ad network or adware cookies Cookie-cutter programs Spyware Spy removal programs Page 276

CE06_PP10-10 Major Privacy Laws Page 279

CE06_PP10-11 Code of Fair Information Practice PrincipleDescription No secret databasesNo personal data that is secret Right of individual access Individuals have a right to see information about them Right of consentInformation for one purpose cannot be used again Right to correctAbility to correct errors Assurance of reliabilityData must not be misused Page 279 Return

CE06_PP10-12 Security and Computer Criminals Threats to computer security are criminals, computer crime, and hazards Computer criminals are of five types: Employees Outside users Hackers and crackers Organized crime Terrorists Page 282

CE06_PP10-13 Computer Crime Number of Computers Crimes Going Up Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act of 1986 Page 283

CE06_PP10-14 Commonly Encountered Viruses Return Page 286

CE06_PP10-15 Commonly Encountered Worms Return Page 286

CE06_PP10-16 Other Hazards Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes Civil strife and terrorism Wars Riots Terrorist acts Technological failures Voltage surge Use surge protector Human errors Page 287

CE06_PP10-17 Measures to Protect Computer Security Encrypting messages Restricting access Anticipating disasters Backing up data Encrypted Page 287 Return

CE06_PP10-18 Restricting Access Biometric scanning Fingerprint scanners Retinal (eye) scanners Assigning passwords Firewalls Special hardware and software Controls access to internal networks Page 238 Return

CE06_PP10-19 Ergonomics (Page 1 of 3) Study of human factors related to things people use Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury Page 238

CE06_PP10-20 Ergonomics (Page 2 of 3) Page 291

CE06_PP10-21 Ergonomics (Page 3 of 3) Computer technology offers ways of improving productivity but can create irritants other than physical Noise Electronic monitoring Technostress Stress associated with computer use Page 292 Return

CE06_PP10-22 The Environment Page 293

CE06_PP10-23 Personal Responsibility to Help Protect the Environment What can you do? Conserve Recycle Educate Page 294

CE06_PP10-24 A Look to the Future Presence Technology Presence technology alerts you that someone is trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances Page 295

CE06_PP10-25 Discussion Questions Discuss the relationship between databases and privacy. Discuss the Code of Fair Information Act. Why has this act not been made into law? Discuss the various kinds of computer criminals. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals What is ergonomics? How does computer use impact mental health? Physical health? Page 302