Chapter10 - Privacy Security and Ethics

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Privacy, Security, and Ethics

Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Identify the most significant concerns for


effective implementation of computer
technology.
 Discuss the primary privacy issues of accuracy,
property, and access.
 Describe the impact of large databases,
private networks, the Internet, and the Web on
privacy.
 Discuss online identity and major laws on
privacy.

10-2
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Describe the security threats posed by


computer criminals including employees,
hackers, crackers, carders, organized crime,
and terrorists.
 Discuss computer crimes including creation of
malicious programs such as viruses, worms,
Trojan horse, and zombies as well as denial of
service attacks, Internet scams, social
networking risks, cyber-bullying, rogue Wi-Fi
hotspots, theft, data manipulation, and other
hazards.
10-3
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Detail ways to protect computer security


including restricting access, encrypting data,
anticipating disasters, and preventing data
loss.
 Discuss computer ethics including copyright law,
software piracy, and digital rights
management as well as plagiarism and ways
to identify plagiarism.

10-4
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 The ubiquitous use of computers and


technology prompts some very important
questions about the use of personal data and
our right to privacy.
 This chapter covers issues
related to the impact of
technology on people and
how to protect ourselves
on the Web.

10-5
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Privacy – What are the threats to personal


privacy and how can we protect ourselves?
 Security – How can access to sensitive information
be controlled and how can we secure hardware
and software?
 Ethics – How do the actions of individual users and
companies affect society?

10-6
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Privacy – concerns the collection and use of


data about individuals
 Three primary privacy issues:
 Accuracy
 Property
 Access

10-7
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Large organizations
compile information about
us.
 Federal government has
over 2,000 databases
 Telephone companies
 Reverse directory lists
of calls we make
 Supermarkets
 What we buy and
when

10-8
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Information resellers or information brokers


 Collect and sell personal data
 Electronic profiles easily created
 Personal information is a marketable
commodity, which raises many issues:
 Collecting public, but personally identifying
information (e.g., Google’s Street View)
 Spreading information without personal consent,
leading to identity theft
 Spreading inaccurate information
 Mistaken identity
 Freedom of Information Act

10-9
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Employers can monitor e-mail legally


 75 percent of all businesses search employees’
electronic mail and computer files using snoopware
 A proposed law could
prohibit this type of
electronic monitoring
or at least require the
employer to notify
the employee first

10-10
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Illusion of anonymity
 People are not concerned about
privacy when surfing the Internet
or when sending e-mail
 History file in Web browsers
 Cookies
 Spyware

10-11
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 The information that people voluntarily post


about themselves online
 Archiving and search features of the Web
make it available indefinitely

10-15
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Federal laws governing privacy matters have


been created
 Gramm-Leach-Bliley Act
 Protects personal financial information
 Health Insurance Portability and Accountability Act
(HIPAA)
 Protects medical records
 Family Educational Rights and Privacy Act (FERPA)
 Restricts disclosure of educational results and records

10-16
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 If you have installed


any free software from
the Internet this
seemingly harmless
software might actually
be spying on you, even
sending personal
information to
advertisers

10-17
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Threats to computer security include criminals,


computer crimes, and other hazards
 Computer criminals:
 Employees
 Outside users
 Hackers and crackers
 Carders
 Organized crime
 Terrorists

10-18
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Malicious Programs - Malware


 Viruses
 Worms
 Trojan horse
 Zombies
 Denial of Service
 (DoS) attack

10-19
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Internet scams
 Phishing

10-20
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Social networking risks


 Cyber-bullying
 Rogue Wi-Fi hotspots
 Theft
 Data manipulation
 Computer Fraud and Abuse Act

10-21
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Natural hazards
 Civil strife and terrorism
 Technological failures
 Human errors

10-22
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Restricting access
 Encrypting data
 Anticipating disasters
 Physical security
 Data security
 Disaster recovery plan
 Preventing data loss

10-23
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Standards of moral conduct


 Copyright
 Gives content creators the right to control the use
and distribution of their work
 Paintings, books, music, films, video games
 Software piracy
 Unauthorized copying and distribution
 Digital Millennium Copyright Act
 Digital rights management (DRM)
 Plagiarism

10-26
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Cryptography is the science of disguising


and revealing encrypted information
 Usually refers to keeping any intercepted
information private
 Cryptographers are
mathematicians who
specialize in making and
breaking codes
 Annual salary is usually
from $60,000 to over
$100,000/year

10-27
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 A Webcam on Every Corner


 Images of public places are more accessible than
ever before (e.g., Google Street View)
 “Virtual site-seeing tours”
 Public webcams continue to grow in popularity

10-28
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Define privacy and discuss the impact of large


databases, private networks, the Internet, and
the Web.

 Define and discuss online identity and the


major privacy laws.

 Define security and discuss computer criminals


including employees, hackers, crackers,
carders, and organized crime.

10-29
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Define computer crime and the impact of


malicious programs, including viruses, worms, and
Trojan horses, and zombies as well as cyber-
bullying, denial of service, Internet scams, social
networking risks, rogue Wi-Fi hotspots, theft, data
manipulation, and other hazards.

 Discuss ways to protect computer security including


restricting access, encrypting data, anticipating
disasters, and preventing data loss.

10-30
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics

 Define ethics and describe copyright law and


plagiarism.

10-31
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.

You might also like