1 / 29

CHAPTER

10. CHAPTER. PRIVACY AND SECURITY. Competencies (Page 1 of 2). Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe the major privacy laws and the Code of Fair Information Practice

Download Presentation

CHAPTER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 10 CHAPTER PRIVACY AND SECURITY

  2. Competencies (Page 1 of 2) • Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web • Describe the major privacy laws and the Code of Fair Information Practice • Describe the security threats posted by computer criminals, computer crime, and other hazards Page 270

  3. Competencies (Page 2 of 2) • Discuss ways that individuals and organizations protect their security • Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks • Discuss what the computer industry is doing, and what you can do to protect the environment Page 270

  4. Information Systems hardware data connectivity people procedures software Page 272

  5. Information Systems & Privacy • People computer can be used for both good and bad • Does technology make it easy to invade our privacy? • When we apply for a loan, school, DL; when check out from supermarket, library, etc. is that information about us being distributed and used without our permission? • When we use the web, is info about being collected?

  6. Information Systems & Security • Does technology make it easy for others to invade the security of business organizations like banks, public & government organizations • E.g. public organization: schools, health records • Government organizations: e.g. classified information fom department of defense

  7. Information Systems Concerns for People • Privacy – What are the threats to personal privacy and how can we protect our selves? • Security – How can access to sensitive information be controlled and how can we secure hardware and software? • Ergonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled? • Environment– What can individuals and organizations do to minimize the impact of technology? Page 272

  8. Computer ethics provide guidelines for computer use Ethics issues include: Privacy: collection and use of data about individuals Accuracy: responsibility to ensure data is correct Property: who owns data and rights to software Access: responsibility of those who have data to control who is able to use that data Computer Ethics and Privacy Page 273

  9. Large Databases • Organizations are constantly collecting data • The Fed. Gov. has over 2000 databases • Data gatherers • Information resellers or information brokers • Electronic profiles are created • Concerns • Spreading information without consent • Identify theft • Spreading inaccurate information • Mistaken identity • Freedom of Information Act: You’re entitled to look at your records held by government agencies. Return Page 274

  10. Computer Ethics and Privacy • Private networks • Employer eavesdropping on employees • Snoopware: software that records everything you do on your computer • ~ 75% of employers use it. • Legal • Legal attempts to restrict its use

  11. Private Networks • Employers monitor e-mail • Legally done • Snoopware Software • Online services right to censor content • Screen and reject messages • Terminate user accounts Return Page 276

  12. Internet and Web • Illusion of anonymity • Not concerned about privacy when surfing the Internet • Not concerned about privacy when sending e-mail • History file • Cookies – two basic types • Traditional • Ad network or adware cookies • Cookie-cutter programs • Spyware • Spy removal programs Page 276

  13. Computer Ethics and Privacy • Privacy laws exist, but privacy remains primarily an ethical issue

  14. Major Privacy Laws Page 279

  15. Code of Fair Information Practice Return Page 279

  16. Security and Computer Criminals • Threats to computer security are criminals, computer crime, and hazards • Computer criminals are of five types: • Employees • Outside users • Hackers and crackers • Organized crime • Terrorists Page 282

  17. Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act of 1986 Computer CrimeNumber of Computers Crimes Going Up Page 283

  18. Commonly Encountered Viruses Return Page 286

  19. Commonly Encountered Worms Return Page 286

  20. Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes Civil strife and terrorism Wars Riots Terrorist acts Technological failures Voltage surge Use surge protector Human errors Other Hazards Page 287

  21. Encrypted e-mail Measures to Protect Computer Security • Encrypting messages • Restricting access • Anticipating disasters • Backing up data Return Page 287

  22. Restricting Access • Assigning passwords • Biometric scanning • Fingerprint scanners • Retinal (eye) scanners • Firewalls • Special hardware and software • Controls access to internal networks Return Page 238

  23. Ergonomics (Page 1 of 3) • Study of human factors related to things people use • Physical Health • Eyestrain and headache • Back and neck pain • Repetitive strain injury Page 238

  24. Ergonomics(Page 2 of 3) Page 291

  25. Ergonomics (Page 3 of 3) • Computer technology offers ways of improving productivity but can create irritants other than physical • Noise • Electronic monitoring • Technostress • Stress associated with computer use Return Page 292

  26. The Environment Page 293

  27. Personal Responsibility to Help Protect the Environment • What can you do? • Conserve • Recycle • Educate Page 294

  28. A Look to the FuturePresence Technology • Presence technology alerts you that someone is trying to reach you • People can locate you • People can tell which device is best to contact you • Could become a standard feature of new cars, phones, and appliances Page 295

  29. Discussion Questions • Discuss the relationship between databases and privacy. • Discuss the Code of Fair Information Act. Why has this act not been made into law? • Discuss the various kinds of computer criminals. • What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals • What is ergonomics? How does computer use impact mental health? Physical health? Page 302

More Related