Presentation is loading. Please wait.

Presentation is loading. Please wait.

McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 1010 CHAPTER PRIVACY AND SECURITY.

Similar presentations


Presentation on theme: "McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 1010 CHAPTER PRIVACY AND SECURITY."— Presentation transcript:

1 McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 1010 CHAPTER PRIVACY AND SECURITY

2 CE06_PP10-2 Competencies (Page 1 of 2) Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe the major privacy laws and the Code of Fair Information Practice Describe the security threats posted by computer criminals, computer crime, and other hazards Page 270

3 CE06_PP10-3 Competencies (Page 2 of 2) Discuss ways that individuals and organizations protect their security Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks Discuss what the computer industry is doing, and what you can do to protect the environment Page 270

4 CE06_PP10-4 Information Systems people procedures software hardware data connectivity Page 272

5 CE06_PP10-5 Information Systems Concerns for People PrivacyPrivacy – What are the threats to personal privacy and how can we protect our selves? SecuritySecurity – How can access to sensitive information be controlled and how can we secure hardware and software? ErgonomicsErgonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled? Environment Environment – What can individuals and organizations do to minimize the impact of technology? Page 272

6 CE06_PP10-6 Computer Ethics and Privacy Privacy relates to the collection and use of personal information; concerns include: Large databases Private networks Internet/Web Privacy laws exist, but privacy remains primarily an ethical issue Computer ethics provide guidelines for computer use Ethics issues include: Privacy Accuracy Property Access Page 273

7 CE06_PP10-7 Large Databases Data collected daily Data gatherers Information resellers or information brokers Electronic profiles are created Concerns Spreading information without consent Identify theft Spreading inaccurate information Mistaken identity Freedom of Information Act Page 274 Return

8 CE06_PP10-8 Private Networks Employers monitor e- mail Legally done Snoopware Software Online services right to censor content Screen and reject messages Terminate user accounts Page 276 Return

9 CE06_PP10-9 Internet and Web Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending e-mail History file Cookies – two basic types Traditional Ad network or adware cookies Cookie-cutter programs Spyware Spy removal programs Page 276

10 CE06_PP10-10 Major Privacy Laws Page 279

11 CE06_PP10-11 Code of Fair Information Practice PrincipleDescription No secret databasesNo personal data that is secret Right of individual access Individuals have a right to see information about them Right of consentInformation for one purpose cannot be used again Right to correctAbility to correct errors Assurance of reliabilityData must not be misused Page 279 Return

12 CE06_PP10-12 Security and Computer Criminals Threats to computer security are criminals, computer crime, and hazards Computer criminals are of five types: Employees Outside users Hackers and crackers Organized crime Terrorists Page 282

13 CE06_PP10-13 Computer Crime Number of Computers Crimes Going Up Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act of 1986 Page 283

14 CE06_PP10-14 Commonly Encountered Viruses Return Page 286

15 CE06_PP10-15 Commonly Encountered Worms Return Page 286

16 CE06_PP10-16 Other Hazards Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes Civil strife and terrorism Wars Riots Terrorist acts Technological failures Voltage surge Use surge protector Human errors Page 287

17 CE06_PP10-17 Measures to Protect Computer Security Encrypting messages Restricting access Anticipating disasters Backing up data Encrypted e-mail Page 287 Return

18 CE06_PP10-18 Restricting Access Biometric scanning Fingerprint scanners Retinal (eye) scanners Assigning passwords Firewalls Special hardware and software Controls access to internal networks Page 238 Return

19 CE06_PP10-19 Ergonomics (Page 1 of 3) Study of human factors related to things people use Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury Page 238

20 CE06_PP10-20 Ergonomics (Page 2 of 3) Page 291

21 CE06_PP10-21 Ergonomics (Page 3 of 3) Computer technology offers ways of improving productivity but can create irritants other than physical Noise Electronic monitoring Technostress Stress associated with computer use Page 292 Return

22 CE06_PP10-22 The Environment Page 293

23 CE06_PP10-23 Personal Responsibility to Help Protect the Environment What can you do? Conserve Recycle Educate Page 294

24 CE06_PP10-24 A Look to the Future Presence Technology Presence technology alerts you that someone is trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances Page 295

25 CE06_PP10-25 Discussion Questions Discuss the relationship between databases and privacy. Discuss the Code of Fair Information Act. Why has this act not been made into law? Discuss the various kinds of computer criminals. What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals What is ergonomics? How does computer use impact mental health? Physical health? Page 302


Download ppt "McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 1010 CHAPTER PRIVACY AND SECURITY."

Similar presentations


Ads by Google