Академический Документы
Профессиональный Документы
Культура Документы
McGraw-Hill
Competencies (Page 1 of 2)
Computing Essentials 2012: Making IT Work for You
Identify the most significant concerns for effective implementation of computer technology Discuss the primary privacy issues of accuracy, property, and access Describe the impact of large databases, private networks, the Internet, and the Web on privacy Discuss online identity and major laws on privacy Describe the security threats posed by computer criminals including employees, hackers, crackers, organized crime, and terrorists
McGraw-Hill
10-2
Competencies (Page 2 of 2)
Computing Essentials 2012: Making IT Work for You
Discuss computer crimes including creation of viruses and worms and implementation of denial of service attacks and Internet scams Detail ways to protect computer security Discuss computer ethics including copyright law and plagiarism Describe ways to protect copyrights and to identify plagiarism, including digital rights management and Turnitin
McGraw-Hill
10-3
Introduction
Computing Essentials 2012: Making IT Work for You
The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved. 10-4
McGraw-Hill
People
Computing Essentials 2012: Making IT Work for You
Privacy What are the threats to personal privacy and how can we protect ourselves? Security How can access to sensitive information be controlled and how can we secure hardware and software? Ethics How do the actions of individual users and companies affect society?
McGraw-Hill
10-5
Privacy
Computing Essentials 2012: Making IT Work for You
Privacy concerns the collection and use of data about individuals Three primary privacy issues:
Accuracy Property Access
McGraw-Hill
10-6
Large Databases
Computing Essentials 2012: Making IT Work for You
Federal government alone has over 2,000 databases Reverse directory compiles lists of the calls we make Data gatherers
Information resellers or information brokers Electronic profiles are easily created
McGraw-Hill
10-7
McGraw-Hill
10-8
Private Networks
Computing Essentials 2012: Making IT Work for You
A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first
McGraw-Hill
10-9
Illusion of anonymity
People are not concerned about privacy when surfing the Internet or when sending e-mail
History file (right) in Web browsers Traditional cookies from Web surfing Spyware
Ad network or adware cookies Web bugs Computer monitoring software, such as keystroke loggers
McGraw-Hill
10-10
McGraw-Hill
10-11
Spyware Removal
Computing Essentials 2012: Making IT Work for You
Anti-Spyware programs
Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers
McGraw-Hill
10-12
McGraw-Hill
10-13
Security
Computing Essentials 2012: Making IT Work for You
Threats to computer security include criminals, computer crimes, and other hazards Computer criminals: Employees Outside users Hackers and crackers Organized crime Terrorists
McGraw-Hill
10-14
Computer Crime
Computing Essentials 2012: Making IT Work for You
Computer Crimes have tripled in the past two years! Malicious Programs
Viruses Worms Trojan horse Zombies
Social networking risks Rogue Wi-Fi hotspots Theft of hardware, software, data, and computer time Data manipulation
Computer Fraud and Abuse Act
10-15
McGraw-Hill
McGraw-Hill
10-16
Other Hazards
Computing Essentials 2012: Making IT Work for You
Natural hazards
Natural forces such as fires, floods, and tornadoes
Technological failures
Voltage surge or spike Use a surge protector
Human errors
Data entry errors Programmer error
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved. 10-17
McGraw-Hill
McGraw-Hill
10-18
Restricting Access
Computing Essentials 2012: Making IT Work for You
Biometric scanning
Fingerprint scanners Iris (eye) scanners
Passwords Firewalls
Return
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved. 10-19
McGraw-Hill
Encrypting Data
Computing Essentials 2012: Making IT Work for You
Encryption is the process of coding information to make it unreadable, except to those who have the key
E-mail encryption File encryption Web site encryption Virtual private networks (VPNs) Wireless network encryption
WEP, WPA, and WPA2
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.
Return
10-20
McGraw-Hill
Ethics
Computing Essentials 2012: Making IT Work for You
Copyright
Gives content creators the right to control the use and distribution of their work
Software piracy
Unauthorized copying and distribution Digital Millenium Copyright Act Digital rights management (DRM)
Plagiarism
McGraw-Hill
10-21
Careers in IT
Computing Essentials 2012: Making IT Work for You
Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to over $100,000/year
McGraw-Hill
10-22
McGraw-Hill
10-23
Discuss the impact of large databases, private networks, the Internet, and the Web on privacy. Discuss the various kinds of computer criminals.
What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?
McGraw-Hill
10-24
What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management? What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.
McGraw-Hill
10-25