Oleary2012Comp ppt ch10 11

24 2 0
Oleary2012Comp ppt ch10 11

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 10: Privacy, Security, and Ethics McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved mputing Essentials 2012: Making IT Work for You Introduction • Information systems consist of people, procedures, software, hardware and data • This chapter focuses on people • Effective implementation of computer technology involves maximizing its positive effects while minimizing its negative effects Copyright © 2012 The McGraw-Hill Companies, Inc All rights McGraw-Hill reserved 10-2 mputing Essentials 2012: Making IT Work for You People • Privacy – What are the threats to personal privacy and how can we protect ourselves? • Security – How can access to sensitive information be controlled and how can we secure hardware and software? • Ethics – How the actions of individual users and companies affect society? McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-3 mputing Essentials 2012: Making IT Work for You Privacy • Privacy – concerns the collection and use of data about individuals • Three primary privacy issues: – Accuracy – Property – Access McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-4 mputing Essentials 2012: Making IT Work for You Large Databases • Federal government alone has over 2,000 databases • Reverse directory compiles lists of the calls we make • Data gatherers – Information resellers or information brokers – Electronic profiles are easily created McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-5 mputing Essentials 2012: Making IT Work for You Large Databases Issues • Your personal information is a marketable commodity, which raises many issues: – Collecting public, but personally identifying information (e.g., Google’s Street View) – Spreading information without personal consent, leading to identity theft – Spreading inaccurate information McGraw-Hill • Mistaken identity ã Freedom of Information Act Copyright â 2012 The McGraw-Hill Companies, Inc All rights reserved 10-6 mputing Essentials 2012: Making IT Work for You Private Networks • Employers can monitor e-mail legally – 75 percent of all businesses search employees’ electronic mail and computer files using snoopware – A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-7 mputing Essentials 2012: Making IT Work for You The Internet and the Web • Illusion of anonymity – People are not concerned about privacy when surfing the Internet or when sending e-mail • History file in Web browsers • Traditional cookies from Web surfing • Spyware – – – McGraw-Hill Ad network or adware cookies Web bugs Computer Copyrightmonitoring © 2012 The McGraw-Hillsoftware Companies, Inc All rights reserved 10-8 mputing Essentials 2012: Making IT Work for You McGraw-Hill Viewing and Blocking Cookies Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-9 mputing Essentials 2012: Making IT Work for You Spyware Removal • Anti-Spyware programs – Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-10 mputing Essentials 2012: Making IT Work for You Privacy Law In SA The National Assemble approved a law that will protect people from the illegal use of their private information - 11 Sep 2012 in the E-mail users will be protected from junk mail People will not need to tolerate unwanted calls at inconvenient times The gathering, publication and selling of computer numbers will be a crime with a maximum of 10 years jail sentence McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-11 mputing Essentials 2012: Making IT Work for You Security • Threats to computer security include criminals, computer crimes, and other hazards • Computer criminals: – – – – – McGraw-Hill Employees Outside users Hackers and crackers Organized crime Terrorists Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-12 mputing Essentials 2012: Making IT Work for You Computer Crime • Malicious Programs – – – – Viruses Worms Trojan horse Zombies • Social networking risks • Rogue Wi-Fi hotspots • Denial of • Theft of hardware, service (DoS) software, data, and attacks computer time • Internet scams, such as • Data manipulation phishing McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-13 mputing Essentials 2012: Making IT Work for You McGraw-Hill Common Internet Scams Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-14 mputing Essentials 2012: Making IT Work for You Other Hazards • Natural hazards – Natural forces such as fires, floods, and tornadoes • Civil strife and terrorism – Wars, riots, and terrorist activities • Technological failures – Voltage surge or spike – Use a surge protector • Human errors – Data entry errors Copyright © 2012 The McGraw-Hill Companies, Inc All rights – Programmer error McGraw-Hill reserved 10-15 mputing Essentials 2012: Making IT Work for You Measures to Protect Computer Security • Restricting access • Encrypting data • Anticipating disasters • Preventing data loss McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-16 mputing Essentials 2012: Making IT Work for You Ethics • Copyright – Gives content creators the right to control the use and distribution of their work • Software piracy – – – Unauthorized copying and distribution Digital Millennium Copyright Act Digital rights management (DRM) ã Plagiarism McGraw-Hill Copyright â 2012 The McGraw-Hill Companies, Inc All rights reserved 10-19 mputing Essentials 2012: Making IT Work for You McGraw-Hill VRAE? Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-20 Chapter 11: Your Future and Information Technology McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved mputing Essentials 2012: Making IT Work for You Changing Times • Banks – ATM – ATM cards – Internet banking – S/w verify signatures McGraw-Hill Copyright © 2012 The McGraw-Hill Companies, Inc All rights reserved 10-22

Ngày đăng: 11/04/2023, 16:05

Tài liệu cùng người dùng

Tài liệu liên quan