Вы находитесь на странице: 1из 28

Chapter

Privacy, Security and Ethics

Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Learning Objectives
1. Identify the most significant concerns for effective implementation of computer
2.
3.

Computing Essentials 2015

4.
5.

6.
7.

technology.
Discuss the primary privacy issues of accuracy, property, and access.
Describe the impact of large databases, private networks, the Internet, and the
Web on privacy.
Discuss online identity and major laws on privacy.
Discuss cybercrimes including creation of malicious programs such as viruses,
worms, Trojan horse, and zombies as well as denial of service attacks, Internet
scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data
manipulation.
Detail ways to protect computer security including restricting access, encrypting
data, anticipating disasters, and preventing data loss.
Discuss computer ethics including copyright law, software piracy, digital rights
management , the Digital Millennium Copyright Act, as well as plagiarism and
ways to identify plagiarism.
9-2

Introduction

Computing Essentials 2015

The ubiquitous use of computers and technology prompts some


very important questions about the use of personal data and our
right to privacy.
This chapter covers issues
related to the impact of
technology on people and
how to protect ourselves
on the Web.

9-3

People

Privacy What are the threats to personal privacy and how

Computing Essentials 2015

can we protect ourselves?


Security How can access to sensitive information be
controlled and how can we secure hardware and software?
Ethics How do the actions of individual users and
companies affect society?

9-4

Privacy
Privacy concerns the collection and use of data about
individuals
Three primary privacy issues:

Computing Essentials 2015

Accuracy
Property
Access

9-5

Large Databases
Large organizations compile
information about us daily
Big Data

Ever growing volume of data

Computing Essentials 2015

Data collectors include

Government agencies
Telephone companies
Credit card companies
Supermarket scanners
Financial institutions
Search engines
Social networking sites

Information

Resellers/Brokers

Collect and sell personal data


Create electronic profiles

9-6

Large Databases (Cont.)


Personal information is a marketable commodity, which
raises many issues:
Collecting public, but personally identifying information (e.g.,

Computing Essentials 2015

Googles Street View)


Spreading information without personal consent, leading to identity
theft
Spreading inaccurate information
Mistaken identity

Freedom of Information Act


Entitlement to look at your records held by government agencies

9-7

Private Networks

Employee monitoring software


Employers can monitor e-mail legally
A proposed law could prohibit this type of electronic

Computing Essentials 2015

monitoring or at least require the employer to notify the


employee first

9-8

The Internet and the Web

Illusion of anonymity
People are not concerned about privacy when surfing the Internet
or when sending e-mail

History Files
Temporary Internet Files
Computing Essentials 2015

Browser cache

Cookies
Privacy Mode
Spyware

9-9

History Files and Temporary Internet Files

Computing Essentials 2015

History Files
Include locations or addresses of sites you
have recently visited
Temporary Internet Files / Browser Cache
Saved files from visited websites

Return
Viewing History Files

9-10

Cookies

Cookies
Small data files that are deposited
on your hard disk from web sites
you have visited

Computing Essentials 2015

First-party cookies
Third-party cookies

Blocking Cookies

Return
9-11

Privacy Modes

Privacy Modes
InPrivate Browsing
Internet Explorer

Private Browsing
Computing Essentials 2015

Safari

Eliminate history
files

Return
9-12

Spyware
Designed to secretly record and report
your activities on the Internet
Web bugs

Computing Essentials 2015

Small images or HTML code hidden within


an e-mail message
When a user opens the message
information is sent back to the source of
the bug

Computer monitoring software


Invasive and dangerous
Keystroke Loggers
Record activities and keystrokes

Anti-Spyware programs

9-13

Online Identity

The information that people voluntarily post about

Computing Essentials 2015

themselves online
Archiving and search features of the Web make it
available indefinitely
Major Laws on Privacy
Gramm-Leach-Bliley Act
Health Insurance Portability and Accountability Act
(HIPAA)
Family Educational Rights and Privacy Act (FERPA)

9-14

Security

Involves protecting individuals or organizations from theft and


danger
Hackers

Computing Essentials 2015

Gain unauthorized access

Cybercrime / Computer Crime


Criminal offense that involves a computer and a network

Effects over 400 million people annually


Costs over $400 billion each year

9-15

Computer Crime

Malicious Programs - Malware

Computing Essentials 2015

Viruses
Worms
Trojan horse
Zombies

Denial of Service
(DoS) attack

9-16

Computer Crime (Cont.)

Rogue Wi-Fi hotspots


Data manipulation
Computer Fraud and

Computing Essentials 2015

Abuse Act

Identity Theft
Cyber-bullying

9-17

Computer Crime (Cont.)


Internet scams

Computing Essentials 2015

Phishing

9-18

Measures to Protect Computer Security

Computing Essentials 2015

Principle measures to ensure computer security


Restricting access
Encrypting data
Anticipating disasters
Physical security
Data security
Disaster recovery plan

Preventing data loss

9-19

Restricting Access
Biometric scanning

Computing Essentials 2015

Fingerprint scanners
Iris (eye) scanners

Passwords
Dictionary attack

Security Suites
Firewalls

Fingerprint scanner

Return
9-20

Encrypting Data

Computing Essentials 2015

Encryption
Coding information to make
it unreadable, except to
those who have the
encryption key

E-mail encryption
File encryption
Web site encryption
Virtual private networks (VPNs)
Wireless network encryption
WEP, WPA, and WPA2

Return
9-21

Anticipating Disasters

Anticipating Disasters

Frequent backups
Redundant data storage

Computing Essentials 2015

Physical Security
Data Security
Disaster Recovery Plan

Preventing Data Loss

9-22

Making IT Work for You ~ Cloud-Based


Backup
Cloud-based backup

Computing Essentials 2015

services such as
Carbonite provide
cloud-based backup
services.

9-23

Ethics
Ethics - Standards of moral conduct
Computer Ethics guidelines for the morally acceptable use of
computers
Copyright
Gives content creators the right to control the use and distribution of their

Computing Essentials 2015

work
Paintings, books, music, films, video games

Software piracy
Unauthorized copying and distribution of software
Digital rights management (DRM)
Digital Millennium Copyright Act

Plagiarism

9-24

Careers in IT

Computing Essentials 2015

IT Security Analysts maintain the

security of a companys network,


systems, and data.
Must safeguard information
systems against external threats
Annual salary is usually from
$62,000 to $101,000
Demand for this position is
expected to grow

9-25

A Look to the Future ~ The End of


Anonymity
Most forums and comment areas on websites allow users to post

Computing Essentials 2015

messages anonymously
Some use this for abusive and threatening comments

Online harassment
Cyberbullying
Stalking
Damaging reputations

How do you feel?

9-26

Open-Ended Questions (Page 1 of 3)

1. Define privacy and discuss the impact of large databases, private


networks, the Internet, and the Web.

Computing Essentials 2015

2. Define and discuss online identity and the major privacy laws.

3. Define security. Define computer crime and the impact of


malicious programs, including viruses, worms, Trojan horses, and
zombies, as well as cyberbullying, denial of service attacks,
Internet scams, social networking risks, rogue Wi-Fi hotspots,
thefts, data manipulation, and other hazards.

9-27

Open-Ended Questions (Page 2 of 2)

4. Discuss ways to protect computer security including restricting


access, encrypting data, anticipating disasters, and preventing
data loss.

Computing Essentials 2015

5. Define ethics, and describe copyright law and plagiarism.

9-28

Вам также может понравиться