Академический Документы
Профессиональный Документы
Культура Документы
Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Learning Objectives
1. Identify the most significant concerns for effective implementation of computer
2.
3.
4.
5.
6.
7.
technology.
Discuss the primary privacy issues of accuracy, property, and access.
Describe the impact of large databases, private networks, the Internet, and the Web on
privacy.
Discuss online identity and major laws on privacy.
Discuss cybercrimes including creation of malicious programs such as viruses, worms,
Trojan horse, and zombies as well as denial of service attacks, Internet scams, identity
theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
Detail ways to protect computer security including restricting access, encrypting data,
anticipating disasters, and preventing data loss.
Discuss computer ethics including copyright law, software piracy, digital rights
management , the Digital Millennium Copyright Act, as well as plagiarism and ways to
identify plagiarism.
9-2
Introduction
The ubiquitous use of computers and technology prompts some very important
questions about the use of personal data and our right to privacy.
This chapter covers issues
related to the impact of
technology on people and
how to protect ourselves
on the Web.
9-3
People
Privacy What are the threats to personal privacy and how can we
protect ourselves?
Security How can access to sensitive information be controlled and how
can we secure hardware and software?
Ethics How do the actions of individual users and companies affect
society?
9-4
Privacy
Privacy concerns the collection and use of data about individuals
Three primary privacy issues:
9-5
Large Databases
Large organizations compile
information about us daily
Big Data
Government agencies
Telephone companies
Credit card companies
Supermarket scanners
Financial institutions
Search engines
Social networking sites
Information Resellers/Brokers
Collect and sell personal data
Create electronic profiles
9-6
9-7
Private Networks
9-8
Illusion of anonymity
that if you are on the Internet and selective about disclosing names or other
personal information that no one knows who you are or how to find you - false
People are not concerned about privacy when surfing the Internet or when sending
e-mail
History Files
Temporary Internet Files
Computing Essentials 2015
Browser cache
Cookies
Privacy Mode
Spyware
9-9
History Files
Include locations or addresses of sites you have
recently visited
Temporary Internet Files / Browser Cache
Saved files from visited websites
Return
Viewing History Files
9-10
Cookies
Cookies
Small data files that are deposited on your
hard disk from web sites you have visited
First-party cookies are generated by the website you
Blocking Cookies
Return
9-11
Privacy Modes
Private Browsing
Safari
Return
9-12
Spyware
Designed to secretly record and report your
activities on the Internet
Web bugs
Small images or HTML code hidden within an e-mail
message or a web page
When a user opens the message information is sent
back to the source of the bug
9-13
Online Identity
9-14
9-15
Security
9-16
Computer Crime
Malicious Programs Malware (created and distributed by crackers)
Viruses migrate through networks and operating systems and most attach themselves to different
programs and databases; can alter and/or delete files; can damage system components
Worms
Doesnt attach to a program
Fills the computer with self-replicating information or can be a carrier of a more traditional virus
Trojan horse - programs that are disguised as something else; like worms they are carriers of
Computing Essentials 2015
viruses; The most common type of Trojan horses appear as free computer games
Zombies
computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled
for malicious purpose
A collection of Zombie computers is knows as a botnet, or robot network. Malicious activities
include password cracking or sending junk email.
9-17
9-18
9-19
9-20
Phishing
9-21
9-22
Restricting Access
Biometric scanning
Fingerprint scanners
Iris (eye) scanners
Passwords
Dictionary attack
Security Suites
Firewalls
Fingerprint scanner
Return
9-23
Encrypting Data
Encryption
Coding information to make it
unreadable, except to those who
have the encryption key
E-mail encryption
File encryption
Web site encryption
Virtual private networks (VPNs)
Wireless network encryption
WEP, WPA, and WPA2
Return
9-24
Anticipating Disasters
Anticipating Disasters
Frequent backups
Redundant data storage
Physical Security
Data Security
Disaster Recovery Plan
9-25
9-26
Ethics
Ethics - Standards of moral conduct
Computer Ethics guidelines for the morally acceptable use of computers
Copyright
Gives content creators the right to control the use and distribution of their work
Paintings, books, music, films, video games
Software piracy
Unauthorized copying and distribution of software
Digital rights management (DRM)
Digital Millennium Copyright Act
Plagiarism
representing some other persons work and ideas as your own without giving credit
to the original persons work and ideas as your own committed by a plagiarist
9-27
Careers in IT
IT Security Analysts maintain the security
9-28
Most forums and comment areas on websites allow users to post messages
anonymously
Some use this for abusive and threatening comments
Online harassment
Cyberbullying
Stalking
Damaging reputations
9-29