Tải bản đầy đủ (.ppt) (24 trang)

Oleary2012Comp ppt ch10 11

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.28 MB, 24 trang )

Chapter 10: Privacy,
Security, and Ethics

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.


mputing Essentials 2012: Making IT Work for You

Introduction
• Information systems consist of
people, procedures, software,
hardware and data.
• This chapter focuses on people.

• Effective implementation of
computer technology involves
maximizing its positive effects
while minimizing its negative
effects. Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
McGraw-Hill
reserved.

10-2


mputing Essentials 2012: Making IT Work for You

People


• Privacy – What are the threats
to personal privacy and how can
we protect ourselves?
• Security – How can access to
sensitive information be
controlled and how can we
secure hardware and software?
• Ethics – How do the actions of
individual users and companies
affect society?

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-3


mputing Essentials 2012: Making IT Work for You

Privacy
• Privacy – concerns the
collection and use of data
about individuals
• Three primary privacy issues:
– Accuracy
– Property
– Access


McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-4


mputing Essentials 2012: Making IT Work for You

Large Databases
• Federal government alone
has over 2,000 databases
• Reverse directory compiles
lists of the calls we make
• Data gatherers
– Information resellers or
information brokers
– Electronic profiles are
easily created

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-5


mputing Essentials 2012: Making IT Work for You


Large Databases Issues

• Your personal information is a
marketable commodity, which
raises many issues:

– Collecting public, but personally
identifying information (e.g., Google’s
Street View)
– Spreading information without personal
consent, leading to identity theft
– Spreading inaccurate information

McGraw-Hill

• Mistaken identity
• Freedom of Information Act
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-6


mputing Essentials 2012: Making IT Work for You

Private Networks
• Employers can monitor e-mail
legally
– 75 percent of all businesses search

employees’ electronic mail and
computer files using snoopware
– A proposed law could prohibit this
type of
electronic monitoring
or at least require the
employer to notify
the employee first

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-7


mputing Essentials 2012: Making IT Work for You

The Internet and the
Web

• Illusion of anonymity

– People are not concerned about
privacy when surfing the Internet or
when sending e-mail

• History file in Web browsers
• Traditional cookies from

Web surfing
• Spyware




McGraw-Hill

Ad network or adware cookies
Web bugs
Computer
Copyrightmonitoring
© 2012 The McGraw-Hillsoftware
Companies, Inc. All rights
reserved.

10-8


mputing Essentials 2012: Making IT Work for You

McGraw-Hill

Viewing and Blocking
Cookies

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-9



mputing Essentials 2012: Making IT Work for You

Spyware Removal
• Anti-Spyware programs

– Designed to detect and remove
cookies, web bugs, and monitoring
software, such as key loggers

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-10


mputing Essentials 2012: Making IT Work for You

Privacy Law In SA
The National Assemble approved a
law that will protect people from the
illegal use of their private information
- 11 Sep 2012 in the.
E-mail users
will be
protected
from junk mail


People will not
need to
tolerate
unwanted
calls at
inconvenient
times

The gathering, publication and
selling of computer numbers will be a
crime with a maximum of 10 years
jail sentence.

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-11


mputing Essentials 2012: Making IT Work for You

Security
• Threats to computer security
include criminals, computer
crimes, and other hazards
• Computer criminals:







McGraw-Hill

Employees
Outside users
Hackers and crackers
Organized crime
Terrorists
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-12


mputing Essentials 2012: Making IT Work for You

Computer Crime
• Malicious
Programs





Viruses
Worms

Trojan horse
Zombies

• Social networking
risks
• Rogue Wi-Fi hotspots

• Denial of
• Theft of hardware,
service (DoS)
software, data, and
attacks
computer time
• Internet scams,
such as
• Data manipulation
phishing

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-13


mputing Essentials 2012: Making IT Work for You

McGraw-Hill


Common Internet
Scams

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-14


mputing Essentials 2012: Making IT Work for You

Other Hazards
• Natural hazards

– Natural forces such as fires, floods, and
tornadoes

• Civil strife and terrorism

– Wars, riots, and terrorist activities

• Technological failures
– Voltage surge or spike
– Use a surge protector

• Human errors

– Data entry errors
Copyright ©
2012 The McGraw-Hill Companies, Inc. All rights

– Programmer
error
McGraw-Hill
reserved.

10-15


mputing Essentials 2012: Making IT Work for You

Measures to Protect
Computer Security
• Restricting access
• Encrypting data
• Anticipating disasters
• Preventing data loss

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-16


mputing Essentials 2012: Making IT Work for You

Ethics
• Copyright


– Gives content creators the right to
control the use and distribution of
their work

• Software piracy




Unauthorized copying and distribution
Digital Millennium Copyright Act
Digital rights management (DRM)

ã Plagiarism

McGraw-Hill

Copyright â 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-19


mputing Essentials 2012: Making IT Work for You

McGraw-Hill

VRAE?

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights

reserved.

10-20


Chapter 11: Your Future
and Information
Technology

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.


mputing Essentials 2012: Making IT Work for You

Changing Times
• Banks
– ATM
– ATM cards
– Internet banking
– S/w verify signatures

McGraw-Hill

Copyright © 2012 The McGraw-Hill Companies, Inc. All rights
reserved.

10-22




Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×