Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identify the most significant concerns for effective implementation of computer technology.

Similar presentations


Presentation on theme: "Identify the most significant concerns for effective implementation of computer technology."— Presentation transcript:

1

2 Identify the most significant concerns for effective implementation of computer technology.
Discuss the primary privacy issues of accuracy, property, and access. Describe the impact of large databases, private networks, the Internet, and the Web on privacy. Discuss online identity and major laws on privacy.

3 Describe the security threats posed by computer criminals including employees, hackers, crackers, carders, organized crime, and terrorists. Discuss computer crimes including creation of malicious programs such as viruses, worms, Trojan horse, and zombies as well as denial of service attacks, Internet scams, social networking risks, cyber-bullying, rogue Wi-Fi hotspots, theft, data manipulation, and other hazards.

4 Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. Discuss computer ethics including copyright law, software piracy, and digital rights management as well as plagiarism and ways to identify plagiarism.

5 The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.

6 Privacy – What are the threats to personal privacy and how can we protect ourselves?
Security – How can access to sensitive information be controlled and how can we secure hardware and software? Ethics – How do the actions of individual users and companies affect society?

7 Privacy – concerns the collection and use of data about individuals
Three primary privacy issues: Accuracy Property Access Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws Accuracy – responsibility of those who collect data Secure Correct Property – who owns data and who has rights to software Access – responsibility of those who control data and use of data Technology moving faster than law can adapt

8 Large organizations compile information about us.
Federal government has over 2,000 databases Telephone companies Reverse directory lists of calls we make Supermarkets What we buy and when Data collected and stored on citizens every day Collectors include Government agencies – Federal government has 2,000 databases; businesses Telephone companies – compile lists of the calls we make; reverse directory (key term) is a special telephone directory that lists telephone numbers sequentially and can be used to gather data about the persons we call Data has value – hence the rise of the information reseller: information resellers provide this gathered data to others for a fee

9 Information resellers or information brokers
Collect and sell personal data Electronic profiles easily created Personal information is a marketable commodity, which raises many issues: Collecting public, but personally identifying information (e.g., Google’s Street View) Spreading information without personal consent, leading to identity theft Spreading inaccurate information Mistaken identity Freedom of Information Act Concerns include: Spreading information without consent – example: collecting your shopping habits and sharing; or medical records, or driver’s license number Last year over 10 million people were victimized by identity theft (key term) (illegal assumption of someone’s identity for economic gain) Spreading inaccurate information – Mistakes happen, but when those mistakes are recorded and your financial position is affected it becomes a problem Mistaken Identity – an electronic profile of one person is switched with another Under the Freedom of Information Act you are entitled to look at your records held by government agencies.

10 Employers can monitor e-mail legally
75 percent of all businesses search employees’ electronic mail and computer files using snoopware A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first Currently legal for employers to monitor electronic mail; survey reported 75% do so using snoopware Snoopware records virtually everything you do on your computer

11 History file in Web browsers Cookies Spyware
Illusion of anonymity People are not concerned about privacy when surfing the Internet or when sending History file in Web browsers Cookies Spyware Illusion of anonymity -that if you are on the Internet and selective about disclosing names or other personal information that no one knows who you are or how to “find” you - false Recent cases of people tracing other people through Internet activity When you browse the Web your activity is monitored; when you visit a Web site your browser stores critical information onto your hard disk – usually without your permission or knowledge; a history file includes the locations of sites visited by your computer system

12 The information that people voluntarily post about themselves online
Archiving and search features of the Web make it available indefinitely How would you feel if information you posted about yourself on the Web kept you from getting a job?

13 Federal laws governing privacy matters have been created
Gramm-Leach-Bliley Act Protects personal financial information Health Insurance Portability and Accountability Act (HIPAA) Protects medical records Family Educational Rights and Privacy Act (FERPA) Restricts disclosure of educational results and records

14 If you have installed any free software from the Internet this seemingly harmless software might actually be spying on you, even sending personal information to advertisers

15 Threats to computer security include criminals, computer crimes, and other hazards
Computer criminals: Employees Outside users Hackers and crackers Carders Organized crime Terrorists Computer crime – illegal action in which the perpetrator uses special knowledge of computer technology Computer criminals – those using computer technology to engage in illegal action, five types Employees – the largest category; may be trying to steal hardware, software, proprietary information and could be doing this out of resentment and trying to get back at the company Outside users – could include employees and clients or suppliers having access to a company’s computer system; could obtain confidential passwords (key term) “Hackers” and “crackers” – hackers gain unauthorized access to computer systems “for fun”, crackers on the other hand, create and share programs designed to gain unauthorized access to computer systems. Their motives are malicious and can be very destructive and costly. Carders – criminals who specialize in stealing, trading, and using stolen credit cards over the Internet Organized crime – tracking illegal enterprises, forgery, counterfeiting Terrorists – could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems Most people don’t realize that security involves theft by employees as well as deliberate thefts from viruses, electronic break-ins, etc. Re-emphasize ethics as an integral part of security – what belongs to the company, belongs to the company (computer time, software, floppies, getting into area in computer where you don’t need to be)

16 Malicious Programs - Malware
Viruses Worms Trojan horse Zombies Denial of Service (DoS) attack Creation of malicious programs – called malware (key term)which is short for malicious software Viruses (key term)–migrate through networks and operating systems and most attach themselves to different programs and databases; can alter and/or delete files; can damage system components; Computer Fraud and Abuse Act (key term) makes spreading a virus a federal offense Worms (key term) – a special type of virus Doesn’t attach to a program Fills the computer with self-replicating information or can be a carrier of a more traditional virus Trojan horse – programs that are disguised as something else; like worms they are carriers of viruses; The most common type of Trojan horses appear as free computer games. Zombies – computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes A collection of Zombie computers is knows as a botnet, or robot network. Malicious activities include password cracking or sending junk . Denial of service attacks – attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. The targets of these attacks are usually ISPs.

17 Internet scams Phishing
Internet scams (key term) –a fraudulent or deceptive act or operation to trick someone into providing personal information or spending money for little or no return

18 Social networking risks Cyber-bullying Rogue Wi-Fi hotspots Theft
Data manipulation Computer Fraud and Abuse Act Social networking risks Information posted can be used by others to steal personal identities and commit other types of crimes Cyber-bullying - the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person. sending repeated unwanted s ganging up on victims in electronic forums posting false statements designed to injure the reputation of another maliciously disclosing personal data about a person that could lead to harm to that person sending any type of communication that is threatening or harassing Rogue Wi-Fi Hotspots – imitate free Wi-Fi networks and capture any and all information sent by the users to legitimate sites including usernames and passwords. Theft – hardware, software, data, computer time, confidential information Data manipulation – finding entry into someone’s computer network and leaving a prankster’s message Computer Fraud and Abuse Act – law states that it’s a crime for an unauthorized person to view, copy or damage data using any computer across state lines

19 Civil strife and terrorism Technological failures Human errors
Natural hazards Civil strife and terrorism Technological failures Human errors Natural Hazards – fire, floods, hurricanes, tornadoes, earthquakes Civil strife and terrorism – wars, riots, terrorist activities Technological failures - voltage surge or spike, hard disk crash Human errors – data entry errors, programmer errors, filename errors

20 Anticipating disasters
Restricting access Encrypting data Anticipating disasters Physical security Data security Disaster recovery plan Preventing data loss Security involves protecting information, hardware, and software from unauthorized use, damage from intrusions, sabotage, and natural disasters Encryption – coding messages to prevent people from reading your messages Anticipating disasters Physical security (key term)– protecting hardware Data security (key term)– protecting software and data from unauthorized tampering or damage Disaster recovery plan (key term)– describing ways to continue operating until normal computer operations can be restored; can create special emergency facilities called hot sites which are fully equipped backup computer centers or cold sites if hardware must be installed to be utilized Preventing data loss Use physical backups – off-site storage using tapes or disks in case of loss of equipment

21 Standards of moral conduct Copyright
Gives content creators the right to control the use and distribution of their work Paintings, books, music, films, video games Software piracy Unauthorized copying and distribution Digital Millennium Copyright Act Digital rights management (DRM) Plagiarism Technology is moving so fast it is hard for our legal system to keep up. The essential element that controls how computers are used today is ethics. Computer ethics - guidelines for the morally acceptable use of computers Digital Millennium Copyright Act – the right of the owner to make a backup copy Digital rights management – prevents copyright violations Plagiarism – representing some other person’s work and ideas as your own without giving credit to the original person’s work and ideas as your own

22 Annual salary is usually from $60,000 to over $100,000/year
Cryptography is the science of disguising and revealing encrypted information Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually from $60,000 to over $100,000/year

23 A Webcam on Every Corner
Images of public places are more accessible than ever before (e.g., Google Street View) “Virtual site-seeing tours” Public webcams continue to grow in popularity

24 Define and discuss online identity and the major privacy laws.
Define privacy and discuss the impact of large databases, private networks, the Internet, and the Web. Define and discuss online identity and the major privacy laws. Define security and discuss computer criminals including employees, hackers, crackers, carders, and organized crime. Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements.

25 Define computer crime and the impact of malicious programs, including viruses, worms, and Trojan horses, and zombies as well as cyber-bullying, denial of service, Internet scams, social networking risks, rogue Wi-Fi hotspots, theft, data manipulation, and other hazards. Discuss ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements.

26 Define ethics and describe copyright law and plagiarism.
Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements.


Download ppt "Identify the most significant concerns for effective implementation of computer technology."

Similar presentations


Ads by Google