Chapter10 - Privacy Security and Ethics
Chapter10 - Privacy Security and Ethics
Chapter10 - Privacy Security and Ethics
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-2
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-4
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-5
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-6
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-7
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
Large organizations
compile information about
us.
Federal government has
over 2,000 databases
Telephone companies
Reverse directory lists
of calls we make
Supermarkets
What we buy and
when
10-8
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-9
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-10
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
Illusion of anonymity
People are not concerned about
privacy when surfing the Internet
or when sending e-mail
History file in Web browsers
Cookies
Spyware
10-11
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-15
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-16
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-17
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-18
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-19
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
Internet scams
Phishing
10-20
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-21
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
Natural hazards
Civil strife and terrorism
Technological failures
Human errors
10-22
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
Restricting access
Encrypting data
Anticipating disasters
Physical security
Data security
Disaster recovery plan
Preventing data loss
10-23
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-26
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-27
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-28
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-29
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-30
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security, and Ethics
10-31
Computing Essentials 2013 © 2013 The McGraw-Hill Companies, Inc. All rights reserved.