Вы находитесь на странице: 1из 39

— 


— 
  




| 
 u |  

  
!"
# $%&

 —
# 

o Customers: 9 of the 10 largest credit-
card issuers
o Acxiom has 20 billion records on
± 110 million people
± 96% of households
o Makes and sells lists to customers
o Merges and protects databases


—()*+

1. Do you feel comfortable about so


many people collecting information
about you and distributing it freely?
2. Is it an invasion of your privacy or
just good business?
3. Should there be any laws regulating
the collection and use of data by data
brokers?

'

#—


o Handling information responsibly


means understanding the following
issues
± Ethics
± Personal privacy
± Threats to information
± Protection of information
o Technology makes breaking the rules
easier - ?????

,
 —

o Ô  ± the principles and standards


that guide our behavior toward other
people
o Ethics are rooted in history, culture,
and religion
o Example? Different cultures?

-
.+ /*+0+
.*  *.1 
o Actions in ethical dilemmas
determined by
± Your basic ethical structure
± The circumstances of the situation
o Your basic ethical structure
determines what you consider to be
± Minor ethical violations
± Serious ethical violations
± Very serious ethical violations

%
"*.  *.1.

2
—*./.+ **+

1. Consequences of the action or inaction


2. Society¶s opinion of the action or inaction
3. Likelihood of effect of action or inaction
4. Time to consequences of action or inaction
5. Relatedness of people who will be affected by
action or inaction
6. Reach of result of action or inaction


11.1+(

o   

 ± intangible
creative work that is embodied in
physical form
o 
 ± legal protection afforded
an expression of an idea
o       ± may use
copyrighted material in certain
situations

$
11.1+(

o Using copyrighted software without permission


violates copyright law
o ¦       ± the unauthorized use,
duplication, distribution, or sale of copyrighted
software

34
 5—

o ¦  ± the right to left alone when you want to


be, to have control over your own personal
possessions, and not to be observed without your
consent
o Dimensions of privacy
± Psychological: to have a sense of control
± Legal: to be able to protect yourself

33
*6.(
  *6*1

o £    

      ± a program that, when


installed on a computer, records every keystroke and mouse
click
o Screen capture programs ± capture screen from video card
o E-mail is stored on many computers as it travels from sender
to recipient
o       ± hardware device that captures
keystrokes moving between keyboard and motherboard.
o Event Data Recorders (EDR) ± located in the airbag control
module and collects data from your car as you are driving.

3
 *1*++(
—+/

3'
*( 

ºhy make calls


when a computer
can do it?
3,
3-
*( 

o    ± the forging of someone¶s identity


for the purpose of fraud

3%
*( 

o ¦        
  ± a
technique to gain personal information for the
purpose of identity theft
o NEVER
± Reply without question to an e-mail asking for personal
information
± Click directly on a ºeb site provided in such an e-mail

32
 /*

o ¦   - rerouting your request for a


legitimate ºeb site
± sending it to a slightly different ºeb address
± or by redirecting you after you are already on the
legitimate site
o Pharming is accomplished by gaining access to
the giant databases that Internet providers use to
route ºeb traffic.
o It often works because it¶s hard to spot the tiny
difference in the ºeb site address.

3
*6.( /1+(

o Companies need information about their


employees to run their business effectively
o As of March 2005,
± 60% of employers monitored employee e-mails
± 70% of ºeb traffic occurs during work hours
± 78% of employers reported abuse
± 60% employees admitted abuse

3$
*6.( /1+(

o Cyberslacking ± misuse of company resources


o Visiting inappropriate sites
o Gaming, chatting, stock trading, social
networking, etc.

4
+++*+*

o Hire the best people possible


o Ensure appropriate behavior on the
job
o Avoid litigation for employee
misconduct

3
*6.(—+/

o Consumers want businesses to


± Know who they are, but not to know too
much
± Provide what they want, but not gather
information on them
o Let them know about products, but not
pester them with advertising
o Yet your computer has information
about you«..


—++7*

o   ± a small file that contains


information about you and your ºeb
activities, which a ºeb site places on
your computer
o Handle cookies by using
± ºeb browser cookie management option

'
/

o G
 ± unsolicited e-mail from
businesses advertising goods and
services
o Gets past spam filters by
± Inserting extra characters
± Inserting HTML tags that do nothing
± Replying usually increases, rather than
decreases, amount of spam
o This can be filtered at the server level
and therefore never get to you
,
0(0

o ë  ± software to generate ads


that installs itself when you download
another program
o G
         ±
software that comes hidden in
downloaded software and helps itself
to your computer resources

-
0*5*++ +

%
+8++0

o á        ± software
you don¶t want inside software you do
want
o Some ways to detect Trojan horse
software
± AdAware at www.lavasoftUSA.com
± The Cleaner at www.moosoft.com
± Trojan First Aid Kit (TFAK) at
www.wilders.org
± Check it out before you download at
www.spychecker.com
2
!9+
o º   ± one line of information for every
visitor to a ºeb site
o   ± records information about
you during a ºeb surfing session such as
what ºeb sites you visited, how long you
were there, what ads you looked at, and
what you bought.
o ë   º    ëº ) ±
hides your identity from the ºeb sites you
visit
± The Anonymizer at www.anonymizer.com
± SuftSecret at www.surfsecret.com

*6.(+6/
.*
o About 2,000 government agencies
have databases with information on
people
o Government agencies need
information to operate effectively
o ºhenever you are in contact with
government agency, you leave behind
information about yourself

$
+6/.*+*
+1 +/*+
o Law enforcement
± NCIC (National Crime Information Center)
± FBI
o Electronic Surveillance
± Carnivore or DCS-1000
± Magic Lantern (software key logger)
± NSA (National Security Agency)
± Echelon collect electronic information by
satellite

'4
+6/.*+*
+1 +/*+
o IRS
o Census Bureau
o Student loan services
o Social Security Administration
o Social service agencies
o Department of Motor Vehicles

'3
 —#  
 

o Attacks on information and computer


resources come from inside and
outside the company
o Computer sabotage costs about $10
billion per year
o In general, employee misconduct is
more costly than assaults from
outside

'
.*(
* 
o   ± knowledgeable computer users
who use their knowledge to invade other
people's computers
o  
      ± software that is
written with malicious intent to cause
annoyance or damage
o º  ± type of virus that spreads itself from
computer to computer usually via e-mail
o      G   ± floods a
ºeb site with so many requests for service
that it slows down or crashes
''
—+/5*—:

o Hurt your hardware


± Ex: Monitors, printers, processors, etc.
o Hurt any files they weren¶t designed to
attack
± Ex: A worm designed to attack Outlook
won¶t attack other e-mail programs
o Infect files on write-protected media

',
+0.;0+/<
;  *0+/<

'-
2,--*.*'4/*

'%
.*(
[ ë       ± detects and
removes or quarantines computer viruses
O -spyware and anti-adware software
3. Spam protection software ± identifies and
marks and/or deletes Spam
4. Anti-phishing software   lets you know
when phishing attempts are being made
  ± hardware and/or software that
protects a computer or network from
intruders

'2
.*(
5. Anti-rootkit software ± stops outsiders
taking control of your machine
ÿ Ô 
 ± scrambles the contents of a
file so that you can¶t read it without the
decryption key ± hard drive specific
    ± the use of physiological
characteristics for identification purposes

'
o Management is fully responsible for
what happens with their
± Servers
± Communications network . Ex. ºIFI
± ºorkstations and personal computers
o The greatest threat is from the internet
and without it ???????????????

'$

Вам также может понравиться