Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7.

Similar presentations


Presentation on theme: "Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7."— Presentation transcript:

1 Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7

2 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -2 Objectives 1.Understand that ethics applies in the use and ownership of computers. 2.Realize that communications partners in cyberspace are people too. 3.Define the types of threats and crimes that involve computers. 4.Identify the players and their motives in computer crime.

3 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -3 Objectives cont. 5.Understand how personal information is gathered and used and think about the implications. 6.Realize that you can take steps to protect yourself and your property from computer crime.

4 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -4 A:// Ethics and Manners Ethics – actions that have serious consequences in the lives of others –Right or wrong actions Manners – our day to day behavior toward others in situations whose effects are not likely to be far-reaching –Polite or rude behavior

5 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -5 Ethics in the Use of Computers Use your computer to harm others Use your computer to steal Abuse your power Use or access someone else's computer resources without permission Copy copyrighted software It is unethical to:

6 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -6 Ethics and Computers Copyright –Legal protection –It is illegal to copy a copyrighted video game or other software without permission Fair Use Doctrine –Defines the situation in which copyrighted material may be used Pirated software

7 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -7 Software TypeYour Rights CopyrightBuy a license to use it SharewareTry before you buy FreewareUse, copy, share Public DomainUse, copy, share, sell

8 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -8 Cyber-Manners Netiquette – good manners or courtesy in cyberspace –Consideration –Respect Netiquette in the click world mirrors etiquette in the brick world Give examples of courtesy when using e-mail.

9 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -9 ISeries Insights Ethics, Security & Privacy Remember that e-mail is not private Employer has right to monitor your e-mail “If in doubt, leave it out”

10 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -10 Making the Grade Section A: // 1. The set of principles and standards we use in determining what to do in situations that affect other people is called ______. 2. The _____ says that copyrighted material may be used in certain situations. 3. When you buy copyrighted software, you’re buying only the _____ to use it. 4. ______ is copyrighted software that is copied and distributed without the permission of the owner.

11 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -11 B:// Threats in Cyberspace Computers used as weapons –To steal money, customer lists, personal identities, credit card numbers, etc. Computers are targets of computer crime –Hackers invade or damage other people’s computers

12 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -12 Computers as Weapons Credit card theft Identity theft - financial identity Dot-cons – scams on the Internet

13 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -13 Sites that Encrypt Information

14 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -14 Computers as Targets Computer viruses Macro viruses Worm Virus hoax Denial-of-Service (DoS) Combination Worm/DoS

15 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 - 15 The Love Bug Worm

16 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 - 16 Denial-of-Service Attach

17 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -17 The Perpetrators White-Hat hackers Black-Hat hackers Crackers Hactivists Script bunnies Ethical hackers

18 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -18 Making the Grade Section B: // 1. _____ theft is the impersonation by a thief of someone with good credit. 2. A _____ is a very knowledgeable computer user who uses his or her knowledge to invade other people’s computers. 3. A computer _______ is software designed intentionally to cause annoyance or damage. 4. When thousands of computers overload a target site by trying to access it at the same time, the target site may be a victim of a(n) ___________ attack.

19 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -19 C:// Privacy Matters Privacy is the right … –To be left alone –To have control over your personal information –To not be observed without your consent Privacy is the right to be free of unwanted intrusion into your private life

20 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -20 Information On Your Buying Habits & Preferences Information you volunteer Information collected by contact –Web sites collect information through cookies Information sold from one company to another –Sniffer software and Web tracking –Spam

21 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -21 Accepting Cookies

22 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -22 Government Records NCIC (National Crime Information Center) IRS (Internal Revenue Service) The Census Bureau

23 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -23 IBuy Get Yourself Virus Protection More than 50,000 viruses in circulation Many ISPs have anti-virus software Set up an anti- virus protection on your computer

24 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -24 Making the Grade Section C: // 1. _________ is the right to be left alone when you want to be. 2. A _______ is software that analyzes Web traffic. 3. _________ is electronic junk mail. 4. _________ is forging the return address on e-mail.

25 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -25 D:// How To Protect Yourself Security before you enter cyberspace –If it can be stolen, lock it up –If it can be damaged, back it up Security in cyberspace transactions –If you buy goods and services, use common sense –Be just as careful as you are in the brick- and-mortar world

26 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -26 How Do I Protect Myself in Cyberspace? Credit card & identity theft –Give information only to reputable companies –Use only secure sites, i.e., https:// –Use different passwords for different sites Dot-Cons –Be skeptical about extraordinary offers –Always read the fine print –Report fraud to the Federal Trade Commission

27 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -27 Government Protection Federal Trade Commission

28 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -28 How Do I Protect Myself in Cyberspace? Protect personal information Use anti-tracking software Avoid spam Use a firewall –Protects a computer or network from intruders –Checks and examines messages

29 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 - 29 Firewall

30 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -30 Making the Grade Section D: // 1. A _______ is hardware and/or software that protects computers from intruders. 2. ________ software prevents your being tracked while you’re surfing. 3. The _______ tracks consumer fraud of all kinds. 4. Your ______ is the key to most information about you.

31 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -31 E:// “Key” Key Terms computer virus (p. 7.11) cookie (p. 7.17) copyright (p. 7.3) cracker (p. 7.14) denial-of-service (DoS) attack (p. 7.13) ethics (p. 7.3) Fair Use Doctrine (p. 7.3) firewall (p. 7.23) hacker (p. 7.14) netiquette (p. 7.6) sniffer (p. 7.18) spam (p. 7.19) worm (p. 7.11)

32 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -32 Frequently Asked Questions My friend just bought a copy of a new software program. Why can’t she make a copy for me? What’s the difference between shareware and freeware? I got an e-mail and it was typed in all capital letters. Should I tell the sender that he is being rude?

33 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -33 FAQs cont. I want to buy some items using the Internet. How can I tell if the site is secure? What is malware? Help! What is the difference between a worm and a virus? What is a hacker? I don’t want my computer to accept cookies. What will happen if I block them?

34 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -34 Hands On Projects E-Commerce It is so easy and convenient to make air travel arrangements over the Web. But is the Internet putting the traditional travel agent out of business? How can these brick-and-mortar businesses remain competitive and not lose customers?

35 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -35 Hands On Projects On the Web Parental Control software packages are available for parents to monitor the sites visited by their children. What do you think about software that not only monitors the Web activities of employees during working hours but also prevents access to objectionable Web sites? Is this an invasion of privacy? Discuss.

36 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -36 Hands On Projects Ethics, Security, & Privacy You want to create an e-commerce music business. You don't want to run into the same legal problems as Napster. Discuss ways you can offer some free downloads, but also charge for others. You don't want recording companies to sue you, so how can stay within the legal realm of the law and still be profitable?

37 McGraw-Hill/Irwin Copyright 2002 by the McGraw-Hill Companies, Inc. All rights reserved. 7 -37 Hands On Projects Group Activities Many states have a database of unclaimed property that can include sums of money – large and small. Visit the site for your state and see if anything is waiting for you to claim. Genealogical research is really popular on the Internet. Find some Web sites and see what is needed to conduct a search.


Download ppt "Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7."

Similar presentations


Ads by Google