+ All Categories

CHAPTER

Date post: 03-Jan-2016
Category:
Upload: carol-mcleod
View: 27 times
Download: 5 times
Share this document with a friend
Description:
10. CHAPTER. PRIVACY AND SECURITY. Competencies (Page 1 of 2). Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe the major privacy laws and the Code of Fair Information Practice - PowerPoint PPT Presentation
Popular Tags:
29
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 10 10 C H A P T E R PRIVACY AND SECURITY
Transcript
Page 1: CHAPTER

McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved.

10101010CH

AP

TE

R

PRIVACY AND SECURITY

Page 2: CHAPTER

CE06_PP10-2

Competencies (Page 1 of 2) Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web

Describe the major privacy laws and the Code of Fair Information Practice

Describe the security threats posted by computer criminals, computer crime, and other hazards

Page 270

Page 3: CHAPTER

CE06_PP10-3

Competencies (Page 2 of 2)

Discuss ways that individuals and organizations protect their security

Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks

Discuss what the computer industry is doing, and what you can do to protect the environment

Page 270

Page 4: CHAPTER

CE06_PP10-4

Information Systems

people procedures

software

hardwaredata

connectivity

Page 272

Page 5: CHAPTER

CE06_PP10-5

Information Systems & Privacy

People computer can be used for both good and bad

Does technology make it easy to invade our privacy?

When we apply for a loan, school, DL; when check out from supermarket, library, etc. is that information about us being distributed and used without our permission?

When we use the web, is info about being collected?

Page 6: CHAPTER

CE06_PP10-6

Information Systems & Security

Does technology make it easy for others to invade the security of business organizations like banks, public & government organizations

E.g. public organization: schools, health records

Government organizations: e.g. classified information fom department of defense

Page 7: CHAPTER

CE06_PP10-7

Information Systems Concerns for People

Privacy – What are the threats to personal privacy and how can we protect our selves?Security – How can access to sensitive information be controlled and how can we secure hardware and software?Ergonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled?Environment – What can individuals and organizations do to minimize the impact of technology?

Page 272

Page 8: CHAPTER

CE06_PP10-8

Computer Ethics and Privacy

Computer ethics provide guidelines for computer use Ethics issues include:

Privacy: collection and use of data about individualsAccuracy: responsibility to ensure data is correctProperty: who owns data and rights to softwareAccess: responsibility of those who have data to control who is able to use that data

Page 273

Page 9: CHAPTER

CE06_PP10-9

Large DatabasesOrganizations are constantly collecting data

The Fed. Gov. has over 2000 databases

Data gatherersInformation resellers or information brokersElectronic profiles are created

Concerns Spreading information without consent

Identify theft

Spreading inaccurate informationMistaken identity

Freedom of Information Act: You’re entitled to look at your records held by government agencies.

Page 274

Return

Page 10: CHAPTER

CE06_PP10-10

Computer Ethics and Privacy

Private networksEmployer eavesdropping on employees

Snoopware: software that records everything you do on your computer

~ 75% of employers use it.

Legal

Legal attempts to restrict its use

Page 11: CHAPTER

CE06_PP10-11

Private Networks

Employers monitor e-mail

Legally done

Snoopware Software

Online services right to censor content

Screen and reject messages

Terminate user accounts

Page 276

Return

Page 12: CHAPTER

CE06_PP10-12

Internet and WebIllusion of anonymity

Not concerned about privacy when surfing the InternetNot concerned about privacy when sending e-mail

History fileCookies – two basic types

Traditional Ad network or adware cookies

Cookie-cutter programsSpywareSpy removal programs

Page 276

Page 13: CHAPTER

CE06_PP10-13

Computer Ethics and Privacy

Privacy laws exist, but privacy remains primarily an ethical issue

Page 14: CHAPTER

CE06_PP10-14

Major Privacy Laws

Page 279

Page 15: CHAPTER

CE06_PP10-15

Code of Fair Information PracticePrinciple Description

No secret databases No personal data that is secret

Right of individual access

Individuals have a right to see information about them

Right of consent Information for one purpose cannot be used again

Right to correct Ability to correct errors

Assurance of reliability Data must not be misused

Page 279

Return

Page 16: CHAPTER

CE06_PP10-16

Security and Computer Criminals

Threats to computer security are criminals, computer crime, and hazards

Computer criminals are of five types:

Employees

Outside users

Hackers and crackers

Organized crime

Terrorists

Page 282

Page 17: CHAPTER

CE06_PP10-17

Computer CrimeNumber of Computers Crimes Going Up

Malicious ProgramsViruses

Worms

Trojan horse

Denial of service (DoS)

Internet Scams

TheftHardware or software

Data

Computer time

Data Manipulation Computer Fraud and Abuse Act of 1986

Page 283

Page 18: CHAPTER

CE06_PP10-18

Commonly Encountered Viruses

Return

Page 286

Page 19: CHAPTER

CE06_PP10-19

Commonly Encountered Worms

Return

Page 286

Page 20: CHAPTER

CE06_PP10-20

Other Hazards Natural hazards

Fires & floods

Winds

Hurricanes

Tornadoes

Earthquakes

Civil strife and terrorism

Wars

Riots

Terrorist acts

Technological failuresVoltage surge

Use surge protector

Human errors

Page 287

Page 21: CHAPTER

CE06_PP10-21

Measures to Protect Computer Security

Encrypting messages

Restricting access

Anticipating disasters

Backing up data

Encrypted e-mail

Page 287

Return

Page 22: CHAPTER

CE06_PP10-22

Restricting Access

Assigning passwords

Biometric scanningFingerprint scanners

Retinal (eye) scanners

FirewallsSpecial hardware and software

Controls access to internal networks

Page 238

Return

Page 23: CHAPTER

CE06_PP10-23

Ergonomics (Page 1 of 3)

Study of human factors related to things people use

Physical HealthEyestrain and headache

Back and neck pain

Repetitive strain injury

Page 238

Page 24: CHAPTER

CE06_PP10-24

Ergonomics (Page 2 of 3)

Page 291

Page 25: CHAPTER

CE06_PP10-25

Ergonomics (Page 3 of 3)

Computer technology offers ways of improving productivity but can create irritants other than physical

Noise

Electronic monitoring

Technostress

Stress associated with computer use

Page 292

Return

Page 26: CHAPTER

CE06_PP10-26

The Environment

Page 293

Page 27: CHAPTER

CE06_PP10-27

Personal Responsibility to Help Protect the Environment

What can you do?

Conserve

Recycle

Educate

Page 294

Page 28: CHAPTER

CE06_PP10-28

A Look to the FuturePresence Technology

Presence technology alerts you that someone is trying to reach you

People can locate you

People can tell which device is best to contact you

Could become a standard feature of new cars, phones, and appliances

Page 295

Page 29: CHAPTER

CE06_PP10-29

Discussion Questions

Discuss the relationship between databases and privacy.

Discuss the Code of Fair Information Act. Why has this act not been made into law?

Discuss the various kinds of computer criminals.

What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals

What is ergonomics? How does computer use impact mental health? Physical health?

Page 302


Recommended