Using Information Technology

Slides:



Advertisements
Similar presentations
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Advertisements

The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security and Privacy
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
in Information Systems and the Internet
Security and backups GCSE ICT.
Computer Security, Ethics and Privacy Chapter 11.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Crime & Malpractice AS Module Heathcote Ch. 10.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Security and Ethics Privacy Employment Health Crime Working
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
IT in Business Issues in Information Technology Lecture – 13.
Data Security.
Network Security & Accounting
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
Chapter 9. CH 9 : Computer “Errors” Human Errors – Humans allowed anywhere near anything important Procedural Errors – Procedures not followed correctly.
Security and Ethics Safeguards and Codes of Conduct.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Using Information Technology
Using Information Technology
Add video notes to lecture
THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 9 Chapter.
THREATS IT in HOTEL INDUSTRY Pertemuan 8
INFS 211: Introduction to Information Technology
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Using Information Technology Chapter 9 The Challenges of the Digital Age

The Challenges of the Digital Age Society & Information Technology Today 9.1 Security Issues: Threats to Computers & Communications Systems 9.2 Security: Safeguarding Computers & Communications 9.3 Quality-of-Life Issues: The Environment, Mental Health, & the Workplace 9.4 Economic Issues: Employment & the Haves/Have-Nots 9.5 The Digital Environment: Is There a Grand Design? Key Questions (from the text): 9.1: Security Issues: Threats to Computers & Communications Systems. What are some characteristics of the key security issues for information technology? 9.2 Security: Safeguarding Computers & Communications. What are the characteristics of the four components of security? 9.3 Quality-0f-Life Issues: The Environment, Mental Health, & the Workplace. How does information technology create environmental, mental-health, and workplace problems? 9.4 Economic Issues: Employment & the Haves/Have-Nots. How may technology affect the unemployment rate and the gap between rich and poor? 9.5 The Digital Environment: Is There a Grand Design? What are the NII, the new Internet, the Telecommunications Act, the 1997 White House plan, and ICANN?

9.1 Security Issues: Threats to Computers & Communications Systems Errors & Accidents: Human errors Procedural errors Software errors Electromechanical problems “Dirty data” problems Software bug - an error in a program that causes it not to work properly. Also called a “software glitch.” Dirty data - incomplete, outdated, or otherwise inaccurate data.

Natural & Other Hazards Natural hazards Civil strife and terrorism

Crimes Against Computers & Communications Theft of hardware Theft of software and music Theft of time and services Theft of information Crimes of malice and destruction Two types of computer crime: Crimes AGAINST computers & communications. Crimes USING computers & communications.

Crimes Using Computers & Communications Production of counterfeit money Investment schemes Child pornography Steganography

Worms & Viruses Worm - a program that copies itself repeatedly into a computer’s memory or onto a disk drive Virus - a “deviant” program, stored on a computer hard drive, that can cause unexpected and often undesirable effects, such as destroying or corrupting data Anti-virus software - programs that scan a computer’s hard disk, floppy disks, and main memory to detect viruses and, sometimes, to destroy them

Computer Criminals Employees - 80% of all computer criminals! Outside users Hackers Crackers Professional criminals Hackers - people who gain unauthorized access to computer or telecommunications systems, often just for the challenge of it. Crackers - people who illegally break into computers for malicious purposes--to obtain information for financial gain, shut down hardware, pirate software, or alter or destroy data.

9.2 Security: Safeguarding Computers & Communications Identification & Access What you have… What you know Who you are Cards Keys Signatures Badges Security - a system of safeguards for protecting information technology against disasters, systems failure, and unauthorized access that can result in damage or loss.

Identification & Access What you have What you know… Who you are PIN (personal identification number) - the security number known only to you that is required to access the system Password - a special word, code, or symbol required to access a computer system

Identification & Access What you have What you know Who you are… Biometrics - science of measuring individual body characteristics Fingerprint check Iris scan

Encryption Encryption - the altering of data so it is not usable unless the changes are undone PGP - Pretty Good Privacy, a practically unbreakable encryption program DES - Data Encryption Standard, a federal standard adopted in 1976

Protection of Software & Data Control of access - restrict access to data files to those with a need to know Audit controls - tracking which programs and servers have been used, which files have been opened, etc. People controls - check resumé facts; prevent employee wandering within work site; shred papers; etc.

Disaster-Recovery Plan Disaster-recovery plan - a method of restoring information processing operations that have been halted by destruction or accident “Among the countless lessons that computer users have absorbed in the hours, days, and weeks after the [1993 ] World Trade Center bombing, the most enduring may be the need to have a disaster-recovery plan.” --New York Times reporter John Holusha

9.3 Quality-of-Life Issues: The Environment, Mental Health, & the Workplace Environmental problems: Manufacturing by-products Disposal by-products Electricity demand Environmental blight

Mental-Health Problems Isolation Gambling Stress Internet addiction/dependency

Workplace Problems: Impediments to Productivity Misuse of technology Fussing with computers Information overload

9.4 Economic Issues: Employment & the Haves/Have-Nots Technology, the Job Killer? Gap between Rich & Poor Digital divide - gap between those with and without access to information technology.

9.5 The Digital Environment: Is There a Grand Design? The National Information Infrastructure VBNS Internet2 The National Information Infrastructure (NII) - a grand vision for existing networks and technologies, as well as technologies yet to be deployed. NII envisions open access to people of all income levels. VBNS (Very-High-Speed Backbone Network Service) - the main U.S. government component to upgrade the “backbone” or primary hubs of data transmission linking supercomputers and other banks of computers across the nation. Internet2 - a cooperative university/business program to enable high-end users to quickly and reliably move huge amounts of data, using VBNS as the official backbone.

The Digital Environment: Is There a Grand Design? Next Generation Internet 1996 Telecommunications Act 1997 White House Plan for Internet Commerce ICANN Next Generation Internet (NGI) - the U.S. government’s program to parallel the university/business-sponsored effort of Internet2. It is designed to provide money to six government agencies to help tie the campus high-performance backbones into the broader federal infrastructure. 1996 Telecommunications Act - legislation designed to undo the 1934 Communications Act with its federal and state communications regulations. The 1996 Act is designed to let phone, cable, and TV businesses compete and combine more freely. 1997 White House Plan for Internet Commerce - a plan advocating that the government stay out of the way of Internet commerce. ICANN (Internet Corporation for Assigned Names & Numbers) - agency established to regulate Internet domain names.