Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All...

25
Privacy and Security Chapter 10 McGraw-Hill Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Transcript of Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All...

Page 1: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Privacy and SecurityChapter 10

McGraw-Hill Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 2: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Competencies (Page 1 of 2)

• Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web

• Describe and control cookies, web bugs, and spyware

• Discuss the security threats posed by computer criminals, computer crime, and other hazards

1-2 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 3: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Competencies (Page 2 of 2)

• Discuss ways that individuals and organizations protect their security

• Discuss computer ethics including copyright law and plagiarism

• Describe ways to protect copyrights and to identify plagiarism, including digital rights management and Turnitin

1-3 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 4: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

The ubiquitous use of computers and technology prompts some very important questions about use of personal data and privacy.

This chapter will cover issues related to the impact of technology on people and how to protect ourselves on the Web.

Introduction

1-4 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 5: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

• Privacy – What are the threats to personal privacy and how can we protect our selves?

• Security – How can access to sensitive information be controlled and how can we secure hardware and software?

• Ethics – How do the actions of individual users and companies affect society?

People

1-5 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 6: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Privacy• Privacy – concerns the collection and use

of data about individuals

• Three privacy issues: – Accuracy– Property– Access

1-6 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 7: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Large Databases• Federal government alone has over 2,000

databases• Reverse directory compiles lists of the calls

we make• Data gatherers

– Information resellers or information brokers

– Electronic profiles are created

1-7 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 8: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Large Databases - Issues

• Collecting public, but personally identifying information

• Spreading information without personal consent

• Spreading inaccurate information– Mistaken identity – Freedom of Information Act

1-8 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 9: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Private Networks• Employers monitor e-mail

– Legally done – 75 percent of all businesses search employees’

electronic mail and computer files

• Snoopware – a programs that records everything you do on the computer

– A proposed law could prohibit this type of electronic monitoring

1-9 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 10: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

• Illusion of anonymity– Not concerned about privacy when surfing the

Internet– Not concerned about privacy when sending e-mail

• History file• Cookies – two basic types

– Traditional – Ad network or adware cookies

• Spyware• Web bugs• Computer monitoring software

The Internet and the Web

1-10 Return Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 11: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Viewing History Files

1-11 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 12: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Viewing and Blocking Cookies

1-12 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 13: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Spyware Removal

• Anti-Spyware– Designed to detect

and remove:• Cookies• Web bugs• Monitoring software

– Battles the treat of spyware

1-13 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 14: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

• Federal laws governing privacy matters have been created

• To learn more about existing privacy laws visit www.computing2011.com and enter the keyword law

Major Laws on Privacy

1-14 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 15: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

• Threats to computer security are criminals, computer crime, and hazards

• Computer criminals :– Employees– Outside users– Hackers and

crackers– Organized crime– Terrorists

Security

1-15 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 16: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Computer CrimeComputer Crimes have tripled in the past two years

• Malicious Programs– Viruses– Worms– Trojan horse– Zombies

• Denial of service (DoS)

• Internet Scams

• Theft– Hardware or software– Data– Computer time

• Data Manipulation – Computer Fraud and

Abuse Act

1-16 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 17: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Common Internet Scams

1-17 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 18: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Other Hazards • Natural hazards

– Fires & floods– Winds – Hurricanes– Tornadoes– Earthquakes

• Civil strife and terrorism– Wars, riots and terrorist

acts

• Technological failures– Voltage surge

• Use surge protector

• Hard disk crashes

• Human errors

1-18 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 19: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Measures to Protect Computer Security

• Restricting access• Encrypting data• Anticipating disasters• Preventing Data Loss

1-19 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 20: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Restricting Access

• Biometric scanning– Fingerprint scanners– Iris (eye) scanners

• Passwords• Firewalls

1-20

ReturnCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 21: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Ethics

• Computer ethics

• Copyright

• Software piracy

• Plagiarism

1-21 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 22: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Careers in IT• Cryptography is the science

of disguising and revealing encrypted information

• Usually refers to keeping any intercepted information private

• Cryptographers are mathematicians who specialize in making and breaking codes

• Annual salary is usually between $60,000 to over $101,000/year

1-22 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 23: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

• A Webcam on Every Corner – Images of public places are more accessible

than ever before– Google Street View– “Virtual site-seeing tours”– Public webcams continue

to grow in popularity

A Look to the Future

1-23 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 24: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

• Discuss the impact of large databases, private networks, the Internet, and the web on privacy.

• Discuss the various kinds of computer criminals.

• What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?

Open-Ended Questions (Page 1 of 2)

1-24 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Page 25: Privacy and Security Chapter 10 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

• What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management?

• What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.

Open-Ended Questions (Page 2 of 2)

1-25 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.