Вы находитесь на странице: 1из 25

Chapter 10: Privacy, Security, and Ethics

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Competencies (Page 1 of 2)
Computing Essentials 2012: Making IT Work for You

Identify the most significant concerns for effective implementation of computer technology Discuss the primary privacy issues of accuracy, property, and access Describe the impact of large databases, private networks, the Internet, and the Web on privacy Discuss online identity and major laws on privacy Describe the security threats posed by computer criminals including employees, hackers, crackers, organized crime, and terrorists

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-2

Competencies (Page 2 of 2)
Computing Essentials 2012: Making IT Work for You

Discuss computer crimes including creation of viruses and worms and implementation of denial of service attacks and Internet scams Detail ways to protect computer security Discuss computer ethics including copyright law and plagiarism Describe ways to protect copyrights and to identify plagiarism, including digital rights management and Turnitin

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-3

Introduction
Computing Essentials 2012: Making IT Work for You

The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web.
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved. 10-4

McGraw-Hill

People
Computing Essentials 2012: Making IT Work for You

Privacy What are the threats to personal privacy and how can we protect ourselves? Security How can access to sensitive information be controlled and how can we secure hardware and software? Ethics How do the actions of individual users and companies affect society?

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-5

Privacy
Computing Essentials 2012: Making IT Work for You

Privacy concerns the collection and use of data about individuals Three primary privacy issues:
Accuracy Property Access

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-6

Large Databases
Computing Essentials 2012: Making IT Work for You

Federal government alone has over 2,000 databases Reverse directory compiles lists of the calls we make Data gatherers
Information resellers or information brokers Electronic profiles are easily created

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-7

Large Databases - Issues


Computing Essentials 2012: Making IT Work for You

Your personal information is a marketable commodity, which raises many issues:


Collecting public, but personally identifying information (e.g., Googles Street View) Spreading information without personal consent, leading to identity theft Spreading inaccurate information
Mistaken identity Freedom of Information Act

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-8

Private Networks
Computing Essentials 2012: Making IT Work for You

Employers can monitor e-mail legally


75 percent of all businesses search employees electronic mail and computer files using snoopware

A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-9

The Internet and the Web


Computing Essentials 2012: Making IT Work for You

Illusion of anonymity
People are not concerned about privacy when surfing the Internet or when sending e-mail

History file (right) in Web browsers Traditional cookies from Web surfing Spyware
Ad network or adware cookies Web bugs Computer monitoring software, such as keystroke loggers

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-10

Viewing and Blocking Cookies


Computing Essentials 2012: Making IT Work for You

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-11

Spyware Removal
Computing Essentials 2012: Making IT Work for You

Anti-Spyware programs
Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-12

Major Laws on Privacy


Computing Essentials 2012: Making IT Work for You

Federal laws governing privacy matters have been created


Gramm-Leach-Bliley Act protects personal financial information Health Insurance Portability and Accountability Act (HIPAA) protects medical records Family Educational Rights and Privacy Act (FERPA) restricts disclosure of educational results and records

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-13

Security
Computing Essentials 2012: Making IT Work for You

Threats to computer security include criminals, computer crimes, and other hazards Computer criminals: Employees Outside users Hackers and crackers Organized crime Terrorists

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-14

Computer Crime
Computing Essentials 2012: Making IT Work for You

Computer Crimes have tripled in the past two years! Malicious Programs
Viruses Worms Trojan horse Zombies

Denial of service (DoS) attacks Internet scams, such as phishing

Social networking risks Rogue Wi-Fi hotspots Theft of hardware, software, data, and computer time Data manipulation
Computer Fraud and Abuse Act
10-15

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Common Internet Scams


Computing Essentials 2012: Making IT Work for You

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-16

Other Hazards
Computing Essentials 2012: Making IT Work for You

Natural hazards
Natural forces such as fires, floods, and tornadoes

Civil strife and terrorism


Wars, riots, and terrorist activites

Technological failures
Voltage surge or spike Use a surge protector

Human errors
Data entry errors Programmer error
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved. 10-17

McGraw-Hill

Measures to Protect Computer Security


Computing Essentials 2012: Making IT Work for You

Restricting access Encrypting data Anticipating disasters Preventing data loss

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-18

Restricting Access
Computing Essentials 2012: Making IT Work for You

Biometric scanning
Fingerprint scanners Iris (eye) scanners

Passwords Firewalls

Return
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved. 10-19

McGraw-Hill

Encrypting Data
Computing Essentials 2012: Making IT Work for You

Encryption is the process of coding information to make it unreadable, except to those who have the key
E-mail encryption File encryption Web site encryption Virtual private networks (VPNs) Wireless network encryption
WEP, WPA, and WPA2
Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

Return
10-20

McGraw-Hill

Ethics
Computing Essentials 2012: Making IT Work for You

Copyright
Gives content creators the right to control the use and distribution of their work

Software piracy
Unauthorized copying and distribution Digital Millenium Copyright Act Digital rights management (DRM)

Plagiarism

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-21

Careers in IT
Computing Essentials 2012: Making IT Work for You

Cryptography is the science of disguising and revealing encrypted information


Usually refers to keeping any intercepted information private

Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to over $100,000/year

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-22

A Look to the Future


Computing Essentials 2012: Making IT Work for You

A Webcam on Every Corner


Images of public places are more accessible than ever before (e.g., Google Street View) Virtual site-seeing tours Public webcams continue to grow in popularity

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-23

Open-Ended Questions (Page 1 of 2)


Computing Essentials 2012: Making IT Work for You

Discuss the impact of large databases, private networks, the Internet, and the Web on privacy. Discuss the various kinds of computer criminals.

What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-24

Open-Ended Questions (Page 2 of 2)


Computing Essentials 2012: Making IT Work for You

What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management? What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.

McGraw-Hill

Copyright 2012 The McGraw-Hill Companies, Inc. All rights reserved.

10-25

Вам также может понравиться