Download presentation
Presentation is loading. Please wait.
1
Chapter 10 Privacy and Security McGraw-Hill
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
2
Competencies (Page 1 of 2)
Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe and control cookies, web bugs, and spyware Discuss the security threats posed by computer criminals, computer crime, and other hazards Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
3
Competencies (Page 2 of 2)
Discuss ways that individuals and organizations protect their security Discuss computer ethics including copyright law and plagiarism Describe ways to protect copyrights and to identify plagiarism, including digital rights management and Turnitin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
4
Introduction The ubiquitous use of computers and technology prompts some very important questions about use of personal data and privacy. This chapter will cover issues related to the impact of technology on people and how to protect ourselves on the Web. Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
5
People Privacy – What are the threats to personal privacy and how can we protect our selves? Security – How can access to sensitive information be controlled and how can we secure hardware and software? Ethics – How do the actions of individual users and companies affect society? Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
6
Privacy Privacy – concerns the collection and use of data about individuals Three privacy issues: Accuracy Property Access Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws Privacy – collection and use of data about individuals Accuracy – responsibility of those who collect data Secure Correct Property – who owns data and who has rights to software Access – responsibility of those who control data and use of data Technology moving faster than law can adapt Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
7
Large Databases Federal government alone has over 2,000 databases
Reverse directory compiles lists of the calls we make Data gatherers Information resellers or information brokers Electronic profiles are created Data collected and stored on citizens every day Collectors include Government agencies – Federal government has 2,000 databases; businesses Telephone companies – compile lists of the calls we make; reverse directory (key term) is a special telephone directory that list telephone numbers sequentially and can be used to gather data about the persons we call Data information has value – hence the rise of the information reseller: information resellers provide this gathered data to others for a fee Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
8
Large Databases - Issues
Collecting public, but personally identifying information Spreading information without personal consent Spreading inaccurate information Mistaken identity Freedom of Information Act Concerns include: Spreading information without consent – example: collecting your shopping habits and sharing; or medical records, or driver’s license number Last year over 10 million people were victimized by identity theft (key term) (illegal assumption of someone’s identity for economic gain) Spreading inaccurate information – Mistakes happen, but when those mistakes are recorded and your financial position is affected it becomes a problem Mistaken Identity – an electronic profile of one person is switched with another Under the Freedom of Information Act you are entitled to look at your records held by government agencies. Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
9
Private Networks Employers monitor e-mail
Legally done 75 percent of all businesses search employees’ electronic mail and computer files Snoopware – a programs that records everything you do on the computer A proposed law could prohibit this type of electronic monitoring Currently legal for employers to monitor electronic mail; survey reported 75% do so using snoopware Snoopware records virtually everything you do on your computer Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
10
The Internet and the Web
Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending History file Cookies – two basic types Traditional Ad network or adware cookies Spyware Web bugs Computer monitoring software Illusion of anonymity is that if you are on the Internet and selective about disclosing names or other personal information that no one knows who you are or how to “find” you - false Recent cases of people tracing other people through Internet activity When you browse the Web your activity is monitored; when you visit a Web site your browser stores critical information onto your hard disk – usually without your permission or knowledge; a history file includes the locations of sites visited by your computer system Traditional cookies (key term) – monitor your activities at a single site Ad network cookies – monitors your activities across all sites visited; once deposited onto a hard drive, they continue to actively collect information on Web activities; form of spyware Most browsers can control many types of cookies called cookie-cutter programs – which allow users to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate Spyware – wide range of programs that are designed to secretly record and report an individual’s activities on the Internet; in addition to Internet Ad cookies, there are also Web bugs – small programs typically hidden within the HTML code for a Web page or message and can be used to secretly read message or work with cookies to collect and report information back to a predefined server on the Web Computer monitoring software (key term)– invasive and dangerous type of spyware; programs record every activity and keystroke made on a computer system including credit card numbers, bank account numbers, and messages Sniffer programs and keystroke loggers (key term)– can be deposited on a hard drive without detection from the Web or by someone installing programs directly onto a computer New category of programs known as spry removal programs – designed to detect Web bugs and monitoring software – also called anti-spyware (key term) The Gramm-Leach Bliley Act – protects personal financial information Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
11
Viewing History Files When you browse the Web, your browser stores critical information onto your hard disk History file Includes the locations of sites visited by your computer system File contents can be displayed by your browser Discuss how the contents of this file can be cleared Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
12
Viewing and Blocking Cookies
Two basic types of cookies: traditional and ad network- Traditional cookies monitor activities at a single site Ad network or adware cookies monitor activities across all sites Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
13
Spyware Removal Anti-Spyware Battles the treat of spyware
Designed to detect and remove: Cookies Web bugs Monitoring software Battles the treat of spyware Computer monitoring software is the most invasive and dangerous type of spyware It is more difficult to remove Web bugs and computer monitoring software than ad network cookies because they are more difficult to detect Use Ad-aware software to scan computer for spyware Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
14
Major Laws on Privacy Federal laws governing privacy matters have been created To learn more about existing privacy laws visit and enter the keyword law Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
15
Security Threats to computer security are criminals, computer crime, and hazards Computer criminals : Employees Outside users Hackers and crackers Organized crime Terrorists Computer crime – illegal action in which the perpetrator uses special knowledge of computer technology Computer criminals – those using computer technology to engage in illegal action, five types Employees – the largest category; may be trying to steal hardware, software, proprietary information and could be doing this out of resentment and trying to get back at the company Outside users – could include employees and clients or suppliers having access to a company’s computer system; could obtain confidential passwords (key term) “Hackers” and “crackers” – hackers gain unauthorized access to computer systems “for fun”, crackers on the other hand, create and share programs designed to gain unauthorized access to computer systems. Their motives are malicious and can be very destructive and costly. Organized crime – tracking illegal enterprises, forgery, counterfeiting Terrorists – could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems Concerned with security – on and off the Internet Most people don’t realize that security involves theft by employees as well as deliberate thefts from viruses, electronic break-ins, etc. Re-emphasize ethics as an integral part of security – what belongs to the company, belongs to the company (computer time, software, floppies, getting into area in computer where you don’t need to be) If you do happen to go somewhere in network or Internet you really didn’t intend to go, back out right away Tell your supervisor of the error and document what happened (how you got there, whom you told, and when you told the person) Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
16
Computer Crime Computer Crimes have tripled in the past two years
Malicious Programs Viruses Worms Trojan horse Zombies Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act Computer crime can take various forms: Creation of malicious programs – called malware (key term)which is short for malicious software Viruses (key term)– (**Use link to show table of common viruses when talking about viruses) migrate through networks and operating systems and most attach themselves to different programs and databases; can alter and/or delete files; can damage system components; Computer Abuse Amendments Act (key term) makes spreading a virus a federal offense Worms (key term) – a special type of virus Doesn’t attach to a program Fills the computer with self-replicating information or can be a carrier of a more traditional virus Trojan horse – programs that are disguised as something else; like worms they are carriers of viruses; can be innocently downloaded from the Internet Zombies – computers infected by a virus, worm, or Trojan hoorse that allows them to be remotely controlled Denial of service attacks – denies service from ISPs by flooding a computer or network with requests for information and data Internet scams (key term) – (**Use link to show table of common Internet scams when talking about Internet scams) a fraudulent or deceptive act or operation to trick someone into spending money Theft – hardware, software, data, computer time; unauthorized copying of programs for personal gain is called software piracy (key term). The Software Copyright Act (key term) allows only the program owner to make backup copies of programs. Data manipulation – Computer Fraud and Abuse Act – law states that it’s a crime for an unauthorized person to even view data using any computer across state lines Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
17
Common Internet Scams Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
18
Other Hazards Natural hazards Civil strife and terrorism
Fires & floods Winds Hurricanes Tornadoes Earthquakes Civil strife and terrorism Wars, riots and terrorist acts Technological failures Voltage surge Use surge protector Hard disk crashes Human errors There are plenty of other hazards to computer systems besides criminals Natural hazards include fires, floods, winds, hurricanes, etc., keep data is safe locations in case of fire or storm damage Civil strife – wars, riots, etc. are real risks Technological failures – voltage surges or spikes (key term); hard disk crashes possibly occur when the hard disk is bumped Human errors – data entry are commonplace mistakes; programming, faulty design mistakes; sloppy procedures Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
19
Measures to Protect Computer Security
Restricting access Encrypting data Anticipating disasters Preventing Data Loss Security involves protecting information, hardware, and software from unauthorized use, damage from intrusions, sabotage, and natural disasters Security growing field; currently have courses on Network security as well as Encryption – coding messages to prevent people from reading your messages Restricting access through passwords and firewalls (key term) Anticipating disasters – companies and individuals should prepare Physical security (key term)– protecting hardware Data security (key term)– protecting software and data from unauthorized tampering or damage And have a disaster recovery plan (key term)– describing ways to continue operating until normal computer operations can be restored; can create special emergency facilities called hot sites which are fully equipped backup computer centers or cold sites if hardware must be installed to be utilized Use physical backups – off-site storage using tapes or disks in case of loss of equipment (World Trade Center; Mississippi floods for example; hurricanes in Gulf states; fires in California and national parks) Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
20
Restricting Access Biometric scanning Passwords Firewalls
Fingerprint scanners Iris (eye) scanners Passwords Firewalls Computers should be protected from unauthorized access Biometric scanning Fingerprint scanners Iris scanners Passwords Dictionary attack – attempts to gain unauthorized access Firewalls – a security buffer between a corporation’s private network and all external networks Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
21
Ethics Computer ethics Copyright Software piracy Plagiarism
Standards of moral conduct Computer ethics Guidelines for the morally acceptable use of computers Users are entitled to ethical treatment Copyright is a legal concept that gives content creators the right to control use and distribution of their work Piracy – the unauthorized copying and distribution of software Digital Millennium Copyright Act – the right of the owner to make a backup copy Digital rights management – prevents copyright violations Plagiarism – representing some other person’s work and ideas as your own without giving credit to the original person’s work and ideas as your own Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
22
Careers in IT Cryptography is the science of disguising and revealing encrypted information Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to over $101,000/year Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
23
A Look to the Future A Webcam on Every Corner
Images of public places are more accessible than ever before Google Street View “Virtual site-seeing tours” Public webcams continue to grow in popularity Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
24
Open-Ended Questions (Page 1 of 2)
Discuss the impact of large databases, private networks, the Internet, and the web on privacy. Discuss the various kinds of computer criminals. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals? Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
25
Open-Ended Questions (Page 2 of 2)
What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management? What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified. Have students turn to the end of Chapter 10 in their textbooks to view the same “Open-Ended” questions/statements Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.