Академический Документы
Профессиональный Документы
Культура Документы
|
u
|
!"
#$%&
#
o Customers: 9 of the 10 largest credit-
card issuers
o Acxiom has 20 billion records on
± 110 million people
± 96% of households
o Makes and sells lists to customers
o Merges and protects databases
()*+
'
#
,
-
.+ /*+0+
.* *.1
o Actions in ethical dilemmas
determined by
± Your basic ethical structure
± The circumstances of the situation
o Your basic ethical structure
determines what you consider to be
± Minor ethical violations
± Serious ethical violations
± Very serious ethical violations
%
"*. *.1.
2
*./.+ **+
11.1+(
o
± intangible
creative work that is embodied in
physical form
o
± legal protection afforded
an expression of an idea
o ± may use
copyrighted material in certain
situations
$
11.1+(
34
5
33
*6.(
*6*1
o £
3
*1*++(
+/
3'
*(
3%
*(
o ¦
± a
technique to gain personal information for the
purpose of identity theft
o NEVER
± Reply without question to an e-mail asking for personal
information
± Click directly on a ºeb site provided in such an e-mail
32
/*
3
*6.(/1+(
3$
*6.(/1+(
4
+++*+*
3
*6.(+/
++7*
'
/
o G
± unsolicited e-mail from
businesses advertising goods and
services
o Gets past spam filters by
± Inserting extra characters
± Inserting HTML tags that do nothing
± Replying usually increases, rather than
decreases, amount of spam
o This can be filtered at the server level
and therefore never get to you
,
0(0
-
0*5*+++
%
+8++0
o á ± software
you don¶t want inside software you do
want
o Some ways to detect Trojan horse
software
± AdAware at www.lavasoftUSA.com
± The Cleaner at www.moosoft.com
± Trojan First Aid Kit (TFAK) at
www.wilders.org
± Check it out before you download at
www.spychecker.com
2
!9+
o º ± one line of information for every
visitor to a ºeb site
o ± records information about
you during a ºeb surfing session such as
what ºeb sites you visited, how long you
were there, what ads you looked at, and
what you bought.
o ë
º ëº ) ±
hides your identity from the ºeb sites you
visit
± The Anonymizer at www.anonymizer.com
± SuftSecret at www.surfsecret.com
*6.(+6/
.*
o About 2,000 government agencies
have databases with information on
people
o Government agencies need
information to operate effectively
o ºhenever you are in contact with
government agency, you leave behind
information about yourself
$
+6/.*+*
+1
+/*+
o Law enforcement
± NCIC (National Crime Information Center)
± FBI
o Electronic Surveillance
± Carnivore or DCS-1000
± Magic Lantern (software key logger)
± NSA (National Security Agency)
± Echelon collect electronic information by
satellite
'4
+6/.*+*
+1
+/*+
o IRS
o Census Bureau
o Student loan services
o Social Security Administration
o Social service agencies
o Department of Motor Vehicles
'3
#
'
.*(
*
o ± knowledgeable computer users
who use their knowledge to invade other
people's computers
o
± software that is
written with malicious intent to cause
annoyance or damage
o º ± type of virus that spreads itself from
computer to computer usually via e-mail
o G ± floods a
ºeb site with so many requests for service
that it slows down or crashes
''
+/5*:
',
+0.;0+/<
; *0+/<
'-
2,--*.*'4/*
'%
.*(
[ ë ± detects and
removes or quarantines computer viruses
O -spyware and anti-adware software
3. Spam protection software ± identifies and
marks and/or deletes Spam
4. Anti-phishing software lets you know
when phishing attempts are being made
± hardware and/or software that
protects a computer or network from
intruders
'2
.*(
5. Anti-rootkit software ± stops outsiders
taking control of your machine
ÿ Ô
± scrambles the contents of a
file so that you can¶t read it without the
decryption key ± hard drive specific
± the use of physiological
characteristics for identification purposes
'
o Management is fully responsible for
what happens with their
± Servers
± Communications network . Ex. ºIFI
± ºorkstations and personal computers
o The greatest threat is from the internet
and without it ???????????????
'$