Privacy , Security and Ethics Presentation

Post on 15-Dec-2014

321 views 0 download

Tags:

description

 

transcript

PRIVACY , SECURITY AND ETHICS-prisecethics-

Hamimah bte Mohd Jamil

MUHAMMAD BIN MOHD SUKERI (A13CS0068) NURUL EMIRA BINTI ABDUL AZIZ

(A13CS0128) WAN HAJARUL ASIKIN BINTI WAN

ZUNAIDI (A13CS0168)

PRIVACY

PRIVACY

• Computing technology makes it possible to collect and use our data.

• The website we visit is one of the way the data collection.

• Would you matter if your personal information is been shared ?

PRIMARY PRIVACY ISSUES

ACCURACY :Relates to the responsibility of those who collect the data is correct

PROPERTY :who on data and right to the software

ACCESS :relates to the responsibility of those who have data to control who is able to use it

LARGE DATABASE

• Large organisation are constantly compiling information about us.

• There are about 2000 database• Example : Telephone companies-compile lists of

the call we make.• REVERSE DIRECTORY list telephone

number followed by subscriber names.• *insert picture• *change title

• Information reseller(information broker) : Collect and sell personal data. Electronic Profiles : are compiled from database to provide highly detailed and personalized descriptions of individual

• Our personal information has been a marketable commodity. This raises many issues including :

1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING INFORMATION.

2.SPREADING INFORMATION WITHOUT PERSONAL CONSENT.

3.SPREADING INACCURATE INFORMATION

IDENTITY THEFT :• Is the illegal assumption of someone’s

identity for the purpose of economic gain.

MISTAKEN IDENTITY :• Occurs when an electronic profile of one

person is switched with another.• INFORMATION OF INFORMATION ACT :

entitles individuals access to governmental records relating to them.

• PRIVATE NETWORKMany organization monitor employee e-mail and computer files using software called SNOOPWARE• THE INTERNET AND THE WEBMany people believe that, while using the web, little can be done to invade their privacy. This is called the illusion of anonymity• HISTORY FILERecord location of visited sites• COOKIESTwo basic type are TRADITIONAL COOKIES AND AD NETWORK COOKIES(ADWARE COOKIES).

• TRADITIONAL COOKIES-Provide information to a single sites,a cookies is deposited with the information that identifies specifically

• AD NETWORK(ADWARE COOKIES-Record your activities across different sites.

• PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)-eliminate history files and block cookies.

• SPYWARE-Secretly record and report internet activities.

• COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what you do.

• WEB BUGS-Provide information back to spammers about activity on e-mail account.

• ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and monitoring software.

MAJOR LAWS ON PRIVACY

• Protect personal financial information

GRAMM-LEACH-BLILEY ACT

• Protect medical records

HEALTH INSURANCE PROTABILITY AND ACCOUNTABILITY ACT(HIPAA)

• Restricts disclosure of educational records

FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT(FREPA)

SECURITY

COMPUTER CRIMAL :

• Computer criminal included employee , outside users , hacker and crackers ,carders , organized crime, and terrorist

• HACKER :Create or improve programs and shared those program with fellow hackers . Typically are not criminal.

• CRACKERS :Share programs designed to gain unauthorized access computer systems or disrupt networks.Typically are criminals.

• CARDERS :Specialize in stealing,trading and using stolen credit cards over the internet.

COMPUTER CRIME : Is an illegal action involving special knowledge of computer technology

• CYBER-BULLYING : intended to hurt or embarrass another person.

• ROGUE WI-FI HOTSPOT :Capture personal information

• SCAMS : designed to trick people into spending their time/money.

• DENIAL OF SERVICE ATTACK(DOS) : Is attempt to shut down or stop a computer system/network.it floods a computer or network with requests for information and data.

• Theft : Takes many forms including stealing hardware, software, data and computer time.

• Data manipulation : Involves changing data or leaving prank messages .The Computer Fraud and Abuse Act helps protect against data manipulation.

• MALICIOUS PROGRAMS (MALWARE) : Design to damage or disrupt computer system.3 most common types of malware are viruses, worms, and Trojan horses.

VIRUSES• Some of the viruses are harmless while some of it can damaging our system

component.

WORMS• It fill the computer a computer system with self replicating information,

clogging the system that is operation are slowed/stopped• Typically find their way into microcomputer through e-mail

attached/programs downloaded from internet

Trojan horses

• Disguised as something else• Not a viruses , but it carries viruses.

Zombies

• Remotely controlled infected computer for malicious purpose.• A collection of zombies computer is known as botnet or robot network

OTHER HARZARD :-

• Included fires,flod,wind,hurricans and tornado.Even computer users should store backup disk of programms and data in safe location.

NATURAL DISASTER:

• Wars,riot,and terrorist activities are real risks in all parts of the world.

CIVIL STRIFE AND TERRORISM:

• Microcomputer should use a surge protector,a divice that separate the computer from the power source of the wall outlet.This may protect the computer

TECHNOLOGICAL FAILURES:

• Human mistakes are inevitable.Data entry errors are probably the most commonplace could lead to mistaken identity.

• Occur when office workers save important documents under files names that are not descriptive and not recognizable by others

HUMAN ERRORS:

MEASURES TO PROTECT COMPUTER SECURITY

RESTRICTING ACCESS : Sometimes security matter of putting guards on company computer rooms and checking the identification of everyone admitted.Other times it use biometric scanning such as fingerprint and iris. Password are secret words or phrases that must be keyed into a

computer system to gain access.

ENCRYPTING DATA:- E-MAIL ENCRYPTING : Protect e-mails messages as the moves across the internet.FILE ENCRYPTING :Protects sensitive files by encrypting them before they stored on a hard drive.WEB SITES ENCRYPTING :Secures Web transaction,especially financial transactionVIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections between company networks and remote users such as workers connecting from homeWIRELESS NETWORK ENCRYPTING :Restricts access to authorized uses on wireless network.WEA(WIRED EQUIVALENT PRIVACY) is one of the best-known wireless encryption protocols.

Ethics

Ethics ? Standards of moral products.

-the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.

2 important issues in computer ethics.

1. Copyright and Digital Right Management

2. Plagiarism

Copyright

• Gives content creators the right to control the use and distribution of their work.Example of materials :• Paintings , books , music, films , video games.

Others : make unauthorized copies• Digital media. (violates copyright)

Software piracy• Is the unauthorized copying and distribution of software.Digital Millennium Copyright Act-established the right of the program owner to make a backup copy and disallow the creation of copies.-illegal to download copyright-protected music and videos from Internet.

Digital rights management (DRM)-collection of technologies designed to prevent copyright violations. -control the number of devices that can access given file.-limits the kinds of devices that can access a file.

Plagiarism• The illegal and unethical representation of

some other person’s work and ideas as your own without giving credit to the original source.

• Example : cutting & pasting Web content into a report or paper.

Carrier in ITCryptographers design encryption algorithms,

break codes, and provide support to nasional security efforts.

PhD in mathematics and broad experience in computer science are required.

Salary range is $60.000 to over $100,000.

The End . Thank you for your

attention