IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security,...

46
IT 10103 IT 10103 Introduction to Information Introduction to Information Technology Technology CHAPTER 11 – Computers and Society, CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics Security, Privacy, and Ethics

Transcript of IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security,...

Page 1: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

IT 10103 IT 10103 Introduction to Information TechnologyIntroduction to Information Technology

CHAPTER 11 – Computers and Society, Security, CHAPTER 11 – Computers and Society, Security, Privacy, and EthicsPrivacy, and Ethics

Page 2: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Computer Security RisksComputer Security Risks

A computer security risk is any event or A computer security risk is any event or action that could cause a loss of or damage action that could cause a loss of or damage

to computer hardware, software, data, to computer hardware, software, data, information, or processing capability.information, or processing capability.

Page 3: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Computer Security RisksComputer Security Risks

CybercrimeCybercrimeOnline or internet based illegal actsOnline or internet based illegal acts

An FBI top 10 priorityAn FBI top 10 priority

Page 4: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan Horses

VirusVirusA potentially damaging computer programA potentially damaging computer program

Page 5: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan Horses

WormWormA program that copies itself to create some A program that copies itself to create some type of problem for the infected computer or type of problem for the infected computer or

networknetwork

Page 6: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan Horses

Trojan HorseTrojan HorseA program that hides within a legitimate A program that hides within a legitimate

program. Activates on some trigger.program. Activates on some trigger.

Page 7: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesVirus Symptoms:Virus Symptoms:

Unusual Screen MessagesUnusual Screen MessagesMusic or Sounds play randomlyMusic or Sounds play randomly

Memory is reducedMemory is reducedPrograms disappearPrograms disappearFiles are corruptedFiles are corrupted

Programs do not work correctlyPrograms do not work correctlyUnknown programs appearUnknown programs appearSystem properties changeSystem properties change

Page 8: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesHow do we get these?How do we get these?

Opening an infected fileOpening an infected fileRunning an infected programRunning an infected program

Booting an infected computer with a disk Booting an infected computer with a disk that is infectedthat is infected

Opening infected E-mail messagesOpening infected E-mail messages

Page 9: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesThere are over 90,000 known viruses, etc.There are over 90,000 known viruses, etc.

6 - 10 new viruses, etc 6 - 10 new viruses, etc are discovered each dayare discovered each day

Page 10: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesGetting rid of viruses, etc.Getting rid of viruses, etc.

Avast! Anti-Virus http://www.avast.com

Page 11: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesPreventing Viruses, etc:Preventing Viruses, etc:

Page 562Page 562

Page 12: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized AccessUsing a computer or network without Using a computer or network without

permissionpermissionCracker = illegally accesses a computer Cracker = illegally accesses a computer

networknetworkHacker = Same as cracker, but more elite Hacker = Same as cracker, but more elite

statusstatus

Page 13: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized AccessFirewallFirewall

One way to prevent hacking or cracking.One way to prevent hacking or cracking.It is a combination of hardware and It is a combination of hardware and

software that blocks unwanted attacks from software that blocks unwanted attacks from your computer or networkyour computer or network

Page 14: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized Access

Page 15: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized AccessUsernames and PasswordsUsernames and Passwords

Username = UserID or identificationUsername = UserID or identificationPassword = private combination of Password = private combination of

characters to allow accesscharacters to allow access

Page 16: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized AccessPasswordsPasswords

Page 17: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized AccessBiometric DevicesBiometric Devices

Physical biometric systems measure a unique Physical biometric systems measure a unique physical trait, such as the fingerprint or blood physical trait, such as the fingerprint or blood

vessel pattern of the retina, whereas behavioral vessel pattern of the retina, whereas behavioral biometric systems measure a unique behavioral biometric systems measure a unique behavioral attribute, such as the way a person talks or signs attribute, such as the way a person talks or signs

his or her name. his or her name.

Page 18: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized AccessBiometric DevicesBiometric Devices

Page 19: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Unauthorized AccessUnauthorized AccessBiometric DevicesBiometric Devices

Page 20: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

TheftTheftPrevent Hardware TheftPrevent Hardware Theft

Physical locationPhysical locationPhysical securityPhysical security

Regular visual inspectionRegular visual inspection

Page 21: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

TheftTheftPrevent Software TheftPrevent Software Theft

License AgreementsLicense AgreementsActivation SchemesActivation Schemes

Regular System ScansRegular System Scans

Page 22: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

TheftTheftPrevent Information TheftPrevent Information TheftEncryption & DecryptionEncryption & Decryption

Page 23: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

TheftTheftEncryption & DecryptionEncryption & Decryption

Page 24: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

TheftTheftTwo Types of Encryption:Two Types of Encryption:

In In private-key encryptionprivate-key encryption, the sender and receiver , the sender and receiver of information share a secret--a key that is used of information share a secret--a key that is used

for both encryption and decryption. for both encryption and decryption.

In In public-key encryptionpublic-key encryption, two different , two different mathematically related keys (a key pair) are used mathematically related keys (a key pair) are used

to encrypt and decrypt data. Information to encrypt and decrypt data. Information encrypted with one key may only be decrypted by encrypted with one key may only be decrypted by

using the other half of the key pair. using the other half of the key pair.

Page 25: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

TheftTheftPGP (Pretty Good Privacy) PGP (Pretty Good Privacy) Encryption SoftwareEncryption Software

http://www.pgp.comhttp://www.pgp.com

Page 26: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

System FailureSystem FailureNoise = any unwanted signal mixed with Noise = any unwanted signal mixed with

normal voltage input to the computernormal voltage input to the computerUnder voltage = electrical supply dropsUnder voltage = electrical supply drops

Over voltage = Power SurgeOver voltage = Power Surge

Page 27: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

System FailureSystem FailureSafeguardsSafeguards

Surge Protector (Minimum Protection)Surge Protector (Minimum Protection)UPS – Uninterruptible Power Supply (Best UPS – Uninterruptible Power Supply (Best

Protection)Protection)

APC 750VA UPS = $ 90.00

Page 28: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

BackupBackupThe Ultimate SafeguardThe Ultimate Safeguard

Making copies of your important filesMaking copies of your important files

Page 29: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Internet Security RisksInternet Security RisksDenial of Service Attacks (DoS Attack)Denial of Service Attacks (DoS Attack)

An assault on computer networks to disrupt An assault on computer networks to disrupt serviceservice

Page 30: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Internet Security RisksInternet Security RisksInternet TransactionsInternet Transactions

Digital CertificatesDigital CertificatesSSL (Secure Sockets Layer)SSL (Secure Sockets Layer)

SET (Secure Electronics Transactions)SET (Secure Electronics Transactions)Digital SignaturesDigital Signatures

Page 31: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyComputer EthicsComputer Ethics

Page 578Page 578

Page 32: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyInformation AccuracyInformation Accuracy

Everything you see on the internet may not Everything you see on the internet may not be accurate. You have to learn to judge or be accurate. You have to learn to judge or

discern what is correct and what is notdiscern what is correct and what is notRemember what your parents used to say:Remember what your parents used to say:

““Just because it is on TV or radio or in a Just because it is on TV or radio or in a newspaper doesn’t mean it is true!”newspaper doesn’t mean it is true!”

Also “Would you jump off a bridge if your Also “Would you jump off a bridge if your friends did?”friends did?”

Page 33: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyIntellectual Property RightsIntellectual Property Rights

Rights of the creator to their own work(s)Rights of the creator to their own work(s)Copyright – Automatically given when you Copyright – Automatically given when you

create something, doesn’t have to be create something, doesn’t have to be registered to be upheld in courtregistered to be upheld in court

Page 34: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyIT Code of ConductIT Code of Conduct

Page 580Page 580

Page 35: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyInformation PrivacyInformation Privacy

Your right to deny or restrict the use of your Your right to deny or restrict the use of your personal informationpersonal information

Page 581Page 581

Page 36: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyCookiesCookies

A small text file that a web server stores on A small text file that a web server stores on your computeryour computer

Page 37: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietySpywareSpyware

A program placed on your computer without A program placed on your computer without your knowledge that secretly collects your knowledge that secretly collects

information about you.information about you.Adaware SEAdaware SE

SpybotSpybot

Page 38: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietySpamSpam

Unsolicited E-mailUnsolicited E-mail4 out of 5 messages are spam today4 out of 5 messages are spam today

Page 39: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyEmployee MonitoringEmployee Monitoring

Using a computer to observe, record and Using a computer to observe, record and review an employee’s use of a computer.review an employee’s use of a computer.

Page 40: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Ethics and SocietyEthics and SocietyContent FilteringContent Filtering

Restricting access to certain material on the Restricting access to certain material on the webweb

Page 41: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Health ConcernsHealth ConcernsRSI – Repetitive Strain InjuryRSI – Repetitive Strain Injury

CTS – Carpal Tunnel SyndromeCTS – Carpal Tunnel SyndromeCVS – Computer Vision SyndromeCVS – Computer Vision Syndrome

Blindness recently reported as related to Blindness recently reported as related to Short-Sightedness and long-term computer Short-Sightedness and long-term computer

monitor usemonitor use

Page 42: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Health ConcernsHealth ConcernsComputer AddictionComputer Addiction

When computers consume someone’s When computers consume someone’s entire social lifeentire social life

Page 43: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Health ConcernsHealth ConcernsIAD – Internet Addiction DisorderIAD – Internet Addiction Disorder

When using the internet consumes When using the internet consumes someone’s entire social life but feels social someone’s entire social life but feels social to the addict as they interact with others via to the addict as they interact with others via

the internetthe internet

Page 44: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Health ConcernsHealth ConcernsSymptoms of both disorders:Symptoms of both disorders:

Craves Computer TimeCraves Computer TimeOverjoyed when at computerOverjoyed when at computer

Unable to stop computer activityUnable to stop computer activityIrritable when not at a computerIrritable when not at a computer

Neglects family and friendsNeglects family and friendsProblems at work or schoolProblems at work or school

Page 45: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Chapter 11Chapter 11Questions?Questions?

Page 46: IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.

Chapter 11Chapter 11Assignment 07Assignment 07

At Issue 11-2 on page 568At Issue 11-2 on page 568

Answer the questions as presented and Answer the questions as presented and defend your opinion.defend your opinion.

Show references as well.Show references as well.