privacy, security and ethics

28
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Chapter Privacy, Security and Ethics 9

Upload: samantha-gray

Post on 17-Jan-2018

251 views

Category:

Documents


0 download

DESCRIPTION

Learning Objectives Identify the most significant concerns for effective implementation of computer technology. Discuss the primary privacy issues of accuracy, property, and access. Describe the impact of large databases, private networks, the Internet, and the Web on privacy. Discuss online identity and major laws on privacy. Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan horse, and zombies as well as denial of service attacks, Internet scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation. Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. Discuss computer ethics including copyright law, software piracy, digital rights management , the Digital Millennium Copyright Act, as well as plagiarism and ways to identify plagiarism.

TRANSCRIPT

Page 1: Privacy, Security and Ethics

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Chap

ter

Privacy, Security and Ethics9

Page 2: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-2

Learning Objectives

1. Identify the most significant concerns for effective implementation of computer technology.2. Discuss the primary privacy issues of accuracy, property, and access.3. Describe the impact of large databases, private networks, the Internet, and the Web on

privacy.4. Discuss online identity and major laws on privacy.5. Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan

horse, and zombies as well as denial of service attacks, Internet scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.

6. Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss.

7. Discuss computer ethics including copyright law, software piracy, digital rights management , the Digital Millennium Copyright Act, as well as plagiarism and ways to identify plagiarism.

Page 3: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-3

Introduction

• The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. • This chapter covers issues

related to the impact oftechnology on people andhow to protect ourselveson the Web.

Page 4: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-4

People

• Privacy – What are the threats to personal privacy and how can we protect ourselves?• Security – How can access to sensitive information be controlled and how

can we secure hardware and software?• Ethics – How do the actions of individual users and companies affect

society?

Page 5: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-5

Privacy

• Privacy – concerns the collection and use of data about individuals• Three primary privacy issues: • Accuracy• Property• Access

Page 6: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-6

Large Databases

• Large organizations compile information about us daily• Big Data• Ever growing volume of data

• Data collectors include• Government agencies• Telephone companies• Credit card companies• Supermarket scanners• Financial institutions• Search engines• Social networking sites

• Information Resellers/Brokers• Collect and sell personal data• Create electronic profiles

Page 7: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-7

Large Databases (Cont.)

• Personal information is a marketable commodity, which raises many issues:• Collecting public, but personally identifying information (e.g., Google’s Street View)• Spreading information without personal consent, leading to identity theft• Spreading inaccurate information

• Mistaken identity

• Freedom of Information Act • Entitlement to look at your records held by government agencies

Page 8: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-8

Private Networks

Employee monitoring software• Employers can monitor e-mail legally• A proposed law could prohibit this type of electronic monitoring or at

least require the employer to notify the employee first

Page 9: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-9

The Internet and the Web

• Illusion of anonymity• People are not concerned about privacy when surfing the Internet or when sending

e-mail• History Files• Temporary Internet Files• Browser cache

• Cookies• Privacy Mode• Spyware

Page 10: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-10

History Files and Temporary Internet Files

History Files• Include locations or addresses of sites you have

recently visitedTemporary Internet Files / Browser Cache• Saved files from visited websites

Viewing History Files

Return

Page 11: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-11

Cookies

• Cookies • Small data files that are deposited on your

hard disk from web sites you have visited• First-party cookies• Third-party cookies

Blocking Cookies

Return

Page 12: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-12

Privacy Modes

•Privacy Modes• InPrivate Browsing • Internet Explorer

• Private Browsing• Safari

• Eliminate history files

Return

Page 13: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-13

Spyware

Designed to secretly record and report your activities on the Internet• Web bugs• Small images or HTML code hidden within an e-mail

message• When a user opens the message information is sent

back to the source of the bug• Computer monitoring software• Invasive and dangerous• Keystroke Loggers

• Record activities and keystrokes

• Anti-Spyware programs

Page 14: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-14

Online Identity

• The information that people voluntarily post about themselves online• Archiving and search features of the Web make it available

indefinitely•Major Laws on Privacy• Gramm-Leach-Bliley Act• Health Insurance Portability and Accountability Act (HIPAA)• Family Educational Rights and Privacy Act (FERPA)

Page 15: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-15

Security

Involves protecting individuals or organizations from theft and danger• Hackers• Gain unauthorized access

Cybercrime / Computer Crime• Criminal offense that involves a computer and a network• Effects over 400 million people annually• Costs over $400 billion each year

Page 16: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-16

Computer Crime

•Malicious Programs - Malware• Viruses• Worms• Trojan horse• Zombies

• Denial of Service • (DoS) attack

Page 17: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-17

Computer Crime (Cont.)

• Rogue Wi-Fi hotspots• Data manipulation • Computer Fraud and Abuse

Act• Identity Theft • Cyber-bullying

Page 18: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-18

Computer Crime (Cont.)

• Internet scams• Phishing

Page 19: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-19

Measures to Protect Computer Security

Principle measures to ensure computer security• Restricting access• Encrypting data• Anticipating disasters• Physical security• Data security• Disaster recovery plan

• Preventing data loss

Page 20: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-20

Restricting Access

• Biometric scanning• Fingerprint scanners• Iris (eye) scanners

• Passwords• Dictionary attack

• Security Suites• Firewalls

ReturnFingerprint scanner

Page 21: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-21

Encrypting Data

Encryption • Coding information to make it

unreadable, except to those who have the encryption key• E-mail encryption• File encryption• Web site encryption• Virtual private networks (VPNs)• Wireless network encryption

• WEP, WPA, and WPA2

Return

Page 22: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-22

Anticipating Disasters

• Anticipating Disasters• Physical Security• Data Security• Disaster Recovery Plan

• Preventing Data Loss• Frequent backups• Redundant data storage

Page 23: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-23

Making IT Work for You ~ Cloud-Based Backup

• Cloud-based backup services such as Carbonite provide cloud-based backup services.

Page 24: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-24

Ethics

Ethics - Standards of moral conductComputer Ethics – guidelines for the morally acceptable use of computers• Copyright• Gives content creators the right to control the use and distribution of their work• Paintings, books, music, films, video games

• Software piracy• Unauthorized copying and distribution of software• Digital rights management (DRM)• Digital Millennium Copyright Act

• Plagiarism

Page 25: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-25

Careers in IT

• IT Security Analysts maintain the security of a company’s network, systems, and data.• Must safeguard information systems

against external threats• Annual salary is usually from $62,000 to

$101,000• Demand for this position is expected to

grow

Page 26: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-26

A Look to the Future ~ The End of Anonymity

• Most forums and comment areas on websites allow users to post messages anonymously• Some use this for abusive and threatening comments• Online harassment• Cyberbullying• Stalking• Damaging reputations

• How do you feel?

Page 27: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-27

Open-Ended Questions (Page 1 of 3)

1. Define privacy and discuss the impact of large databases, private networks, the Internet, and the Web.

2. Define and discuss online identity and the major privacy laws.

3. Define security. Define computer crime and the impact of malicious programs, including viruses, worms, Trojan horses, and zombies, as well as cyberbullying, denial of service attacks, Internet scams, social networking risks, rogue Wi-Fi hotspots, thefts, data manipulation, and other hazards.

Page 28: Privacy, Security and Ethics

Com

putin

g Es

senti

als 2

015

9-28

Open-Ended Questions (Page 2 of 2)

4. Discuss ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss.

5. Define ethics, and describe copyright law and plagiarism.