1 / 12

Competencies

Chapter 10 Privacy and Security. Competencies Privacy issues related to the presence of large databases, private networks, the Internet and the Web How to control cookies , web bugs, and spyware Security threats caused by computer criminals, computer crime, and other hazards

diem
Download Presentation

Competencies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 10 Privacy and Security • Competencies • Privacy issues related to the presence of large databases, private networks, the Internet and the Web • How to control cookies , web bugs, and spyware • Security threats caused by computer criminals, computer crime, and other hazards • The methods through which individuals and organizations protect their security • The types of physical and mental risks related to computer use • What are the computer industry and we doing to protect the environment

  2. Question Proposed • The computer systems may be used for both good and bad purposes by the people. • Questions • Does technology make it easy for others to invade our personal privacy? • Is our private information being distributed and used without our permission? • Is our information being collected and shared with others? • What about health risks to people who use computers? • Do computers pose a threat to our ecology? • ….. • Our concern: • privacy and security

  3. People • One main part of an information system, focused by this chapter. • Positive effects and negative effects caused by people • The most significant concerns are: • Privacy • Security • Ergonomics • Environmental protection

  4. Privacy • The legal system can’t keep up with the development of computer technology • Ethics: Standard of moral conduct • Computer Ethics: Guidelines for the morally used of computers • Four computer ethics: • Privacy • Concerns the collection and use of data about individuals • Accuracy • relates to the responsibility of those who should ensure the data is correct • Property • relates to who owns data and rights to software • Access • relates to the responsibility of those who is able to use the data

  5. Large Databases • Used by large companies, such telephone companies, banks, credit card companies, supermarkets, and so on to store the people’s private data • Information resellers and information brokers • collect data to create electronic profiles and sell them • The personal information has become a marketable commodity • Some raised issues: • Spreading information without personal consent: identify theft • Spreading inaccurate information: mistaken identity

  6. Private networks • Snoopware: a kind of software used for electronic monitoring • The network and the web • History files • The locations of sites visited by the browser • Cookies • Cookies are created when you use your browser to visit a website • Cookies are usually small text files, given ID tags that are stored on your computer's browser directory or program data subfolders. • id@web[number].txt • Functions: keep track of your movements within the site, help you resume where you left off, remember your registered login, theme selection, preferences, and other customization functions.

  7. UTP and RJ-45 connector Visit History Internet Temporary Files

  8. Two basic types of cookies: • Traditional cookies • Ad newtwork or advare cookies • Spyware • Web bugs: small program hidden within html code • Computing monitoring software: Keystroke loggers • Anti-spyware or spy removal programs • www.360.com • www.spydoctor.com • Major laws on Privacy

  9. Security • Computer criminals • Employees • Outside users • Hackers and crackers • Organized crime • Terrorists • Computer crime • Malicious programs: malware • Types: • Viruses • Worms • Trojan horses

  10. Denial of Service(DoS) • DoS attack: attempts to slow down or stop a computer system or network • Internet Scams • A fraudulent or deceptive act or operation • Theft • Data manipulation • Other hazards • Natural hazards • Civil strife and terrorism • Technological failures • Human errors

  11. Measures to protect computer security • Encrypting messages • Restricting access: password, Firewalls • Anticipating disasters : Physical security, data security, disaster recovery plan • Backing up data • Description

  12. Ergonomics • Physical Health • Eyestrain and headache • Back and neck pain • Repetitive strain injury • Mental Health • Noise • Electronic monitoring • Environmental protection • Green PC • Personal Responsibility • Conserve • Recycle

More Related