Presentation is loading. Please wait.

Presentation is loading. Please wait.

10 PRIVACY AND SECURITY CHAPTER

Similar presentations


Presentation on theme: "10 PRIVACY AND SECURITY CHAPTER"— Presentation transcript:

1 10 PRIVACY AND SECURITY CHAPTER
Computer systems consist not only of hardware and software but of people Because of people, computer systems may be used for good and bad purposes It is important to secure both hardware and software End users need to be knowledgeable about: Personal privacy Organizational security Ergonomics The environmental impact of technology

2 Competencies Describe concerns associated with computer technology
Discuss computer ethics Discuss privacy issues Describe the security threat posed by computer criminals, computer crime, and other hazards

3 Competencies cont. Discuss ways to protect security
Describe common types of risks associated with computers Discuss what the computer industry is doing, and what you can do to protect the environment

4 Information System Concerns
Privacy Security Ergonomics Environment Privacy – concerns collection and use of data Security – keeping private information safe Ergonomics – human factors related to the devices people use Environment – discovering ways to discourage waste in the microcomputer environment

5 Privacy Computer ethics provide guidelines for computer use
Ethics issues Privacy Accuracy Property Access Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws. Ethics defined: standards of moral conduct Computer ethics: guidelines for morally acceptable use of computers Standards or guidelines are important in this industry because technology changes are outstripping the legal system’s ability to keep up Four primary issues: Privacy – collection and use of data re individuals Accuracy – responsibility of those who collect Secure Correct Property – who owns what and who has rights Access – responsibility of those who control data and use of data Technology moving faster than law can adapt Emphasize that ethics is a standard or moral conduct – it is what is morally right and what is morally wrong – not what a court says or whether others do or do not do it!

6 Large Databases Data collected daily Data gatherers Concerns
Information resellers or information brokers Information profiles are created Concerns Identify theft Mistaken identity Data collected and stored on citizens every day Collectors include Government agencies - Federal government has 2,000 databases Businesses Social security numbers are often used as key fields in databases related to our employment, tax and credit activities This is being changed– already in education system, can’t use SS number as SID in many colleges and universities throughout US. What other steps are being taken to ensure privacy? This information has value – hence the rise of the information reseller: information resellers provide this gathered data to others for a fee

7 Private Networks Employers monitor email
Legally done Snoopware Software Online services right to censor content Screen and reject messages Terminate user accounts Currently legal for employers to monitor electronic mail; survey reported 20% do so using snoopware Snoopware records virtually everything you do on your computer Most online services reserve the right to censor content; libel, obscenity, or offensive material Can terminate your account for unacceptable “behavior” towards company

8 Internet and Web Illusion of anonymity History file Cookies
Not concerned about privacy when surfing the Internet Not concerned about privacy when sending History file Cookies Traditional Ad network or adware cookies Illusion of anonymity is that if you are on the Internet, no one knows who you are or how to “find” you Recent cases of people tracing other people through Internet activity Traditional cookies – gather info about your Internet activities – where you visited, what you did, and other information Ad network cookies – continual updating of information as you work on Internet, including address and personal profiles

9 Computer Criminals Employees Outside users Hackers and crackers
Organized crime Terrorists Computer criminals - those using computer technology to engage in Illegal action, four types Employees - the largest category; use company time to play games “Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent Organized crime - tracking illegal enterprises, forgery, counterfeiting Concerned with security – on and off the Internet Most people don’t realize that security involves theft by employees as well as deliberate thefts from viruses, electronic break-ins, etc Re-emphasize ethics as an integral part of security – what belongs to the company, belongs to the company (computer time, software, floppies, getting into area in computer where you don’t need to be) If you do happen to go somewhere in network or Internet you really didn’t intend to go, back out right away Tell your supervisor of the error and document what happened (how you got there, whom you told, and when you told the person)

10 Computer Crime Malicious Programs Denial of service (DoS)
Viruses Worms Trojan horse Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act of 1986 $1.5 trillion estimated to be lost in the past year from computer crime Computer crime can take various forms: Creation of malicious programs Viruses – can alter and/or delete files Worms – a special type of virus Doesn’t attach to a program Fills the computer with self replicating information Trojan house – programs that are disguised as something else Denial of service attacks – denies service from ISPs Internet scams – a fraudulent or deceptive act or operation to trick someone into spending money Theft Data manipulation – unauthorized use of data

11 Other Hazards Natural hazards Technological failures Voltage surge
Fires & floods Winds Hurricanes Tornadoes Earthquakes Technological failures Voltage surge Surge protector Human errors Civil strife and terrorism Wars Riots Terrorist acts There are plenty of other hazards to computer systems besides criminals Natural forces include fires, floods, winds, hurricanes, etc. Civil strife – wars, riots, etc are real risks Technological failures – voltage surges or spikes Human mistakes

12 Measures to Protect Computer Security
Encrypting messages Restricting access Anticipating disasters Backing up data Encrypted Security involves protecting information, hardware and software from unauthorized use, damage from intrusions, sabotage and natural disasters Growing field; currently have courses on Network security as well as encryption – coding messages to prevent people from reading your messages restricting access through passwords and firewalls firewalls – hardware and software to control access to internal computer networks Use physical backups – off-site storage using tapes or disks in case of loss of equipment (World Trade Center; Mississippi floods for example; hurricanes in Gulf states; fires in California and national parks)

13 Restricting Access Biometric scanning Assigning passwords Firewalls
Fingerprint scanners Retinal (eye) scanners Assigning passwords Firewalls Special hardware and software Controls access to internal networks Computers should be protected from unauthorized access Biometric scanning Fingerprint scanners Retinal scanners Passwords Firewalls – a security buffer between a corporation’s private network and all external networks Anticipate disasters Physical security Data security Most organizations have a disaster recovery plan Hot sites – centers equipped as backup operations Cold site – empty shells where hardware can be installed and the backup data processed Backing up Data Routinely copy data and store it at a remote location

14 Ergonomics Ergonomics is the study of human factors related to things people use Physical risks include: Eyestrain Backache Neck pain RSI (repetitive strain injury)

15 Ergonomics Study of human factors related to things people use
Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury The study of human factors related to things people use; concerned with fitting job to worker rather than worker to job. Take regular breaks (like every hour or two) from computer monitor to avoid eye strain, back strain, or even vibrations from the system. Avoid monitors that flicker; ensure adequate monitor brightness By keeping all objects on which you are working at the same distance, you avoid eye strain, neck strain or arm/wrist injury Keep equipment (keyboard and monitor) at comfortable level – get a chair that adjusts or rearrange your equipment! Avoid repetitive strain injury (RSI) by again having your equipment comfortable to ease the stress on tendons and muscles in your arms, wrists, back and neck. Billions of dollars in claims and productivity losses every year

16 More on Ergonomics Mental Health Technostress Noise
Electronic monitoring Technostress Stress associated with computer use Harmful to people Computers tend to emit very low frequency noise that can be stressful and/or damaging to some people. Some printers emit considerable noise. Networking of peripherals (requiring fewer printers) and the advances in technology have helped cut out a lot of this; however, still a factor to be considered. Workers electronically monitored have more health problems Recently researchers have discovered what a common sense manager already knew: human monitoring yields more productivity than electronic Capabilities of microprocessor stimulate manufacturers to load on the features, which often results in a product that is difficult to use. Trend is towards including fewer features and only those that are needed for particular job Tension that arises when trying to adapt to computers

17 The Environment Microcomputers use most of the electricity in work environment. Turn off when not using (like evenings or weekends) They account for 5% of the electricity used Most systems now come with energy-saving screens that go into “sleep mode” when not used for period of time The EPA (Environmental Protection Agency) has created the Energy Star program to discourage waste in the microcomputer industry Goal to reduce power required Organized the Green PC concept Look for energy star that indicates pc is working to follow guidelines established by EPA. What are characteristics of “Green PC”? The Green PC System Unit –energy saving microprocessor, eliminates cooling fan, sleep mode Display – flat panels, power-down monitors, screen-saver software that clears the display when not in use Manufacturing – use of fewer harmful chemicals

18 Personal Responsibility
Conserve Recycle Educate What can you do to protect the environment as a computer user?

19 A Look to the Future Presence Technology
Presence technology alerts you that someone is trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances Ask students to discuss the advantages and disadvantages of presence technology Is it always good to be found?

20 Key Terms access (269) accuracy (269) ad network cookie (272)
adware cookie (272) biometric scanning (280) carpal tunnel syndrome (284) chlorofluorocarbons (CFCs) (286) Code of Fair Information Practice (273) cold site (281) Computer Abuse Amendments Act of 1994 (277) computer crime (276) computer ethics (269) Computer Fraud and Abuse Act of 1986 (279) cookie (272)

21 Key Terms electronic monitoring (284) cookie-cutter program (272)
electronic profile (270) Encrypting (280) Energy Star (285) ergonomics (282) ethics (269) firewall (280) Freedom of Information Act (271) cookie-cutter program (272) Cracker (277) cumulative trauma disorder (283) data security (281) Denial of service attack (DoS) (278) disaster recovery plan (281)

22 Key Terms Green PC (285) hacker (277) history file (272)
hot site (281) identity theft (270) illusion of anonymity (272) information brokers (270) information resellers (270) Internet scam (278) mistaken identity (271) password (280) physical security (281) privacy (269) property (269) repetitive motion injury (283)

23 Key Terms repetitive strain injury (RSI) (283) scam (278)
security (289) snoopware (271) Software Copyright Act of 1980 (278) software piracy (278) spike (279) spyware (272) surge protector (279) technostress (284) traditional cookie (272) Trojan horse (278) virus (277) virus checker (278) voltage surge (279) worm (277)

24 FAQs What is identity theft? How does snoopware work?
I keep getting a lot of ads on my computer. What is spyware? What is the difference between hackers and crackers? My back hurts every time I sit in front of my computer. What can I do?

25 Discussion Questions Explain how access can be restricted to a computer. Discuss the various malicious programs that can attack a computer system. What can you do to protect your privacy while on the Web? Do you feel that the Code of Fair Information Practice should be made into an enforceable law? Discuss your views.


Download ppt "10 PRIVACY AND SECURITY CHAPTER"

Similar presentations


Ads by Google