Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Competencies PowerPoint Presentation
Download Presentation
Competencies

Competencies

188 Vues Download Presentation
Télécharger la présentation

Competencies

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Chapter 10 Privacy and Security • Competencies • Privacy issues related to the presence of large databases, private networks, the Internet and the Web • How to control cookies , web bugs, and spyware • Security threats caused by computer criminals, computer crime, and other hazards • The methods through which individuals and organizations protect their security • The types of physical and mental risks related to computer use • What are the computer industry and we doing to protect the environment

  2. Question Proposed • The computer systems may be used for both good and bad purposes by the people. • Questions • Does technology make it easy for others to invade our personal privacy? • Is our private information being distributed and used without our permission? • Is our information being collected and shared with others? • What about health risks to people who use computers? • Do computers pose a threat to our ecology? • ….. • Our concern: • privacy and security

  3. People • One main part of an information system, focused by this chapter. • Positive effects and negative effects caused by people • The most significant concerns are: • Privacy • Security • Ergonomics • Environmental protection

  4. Privacy • The legal system can’t keep up with the development of computer technology • Ethics: Standard of moral conduct • Computer Ethics: Guidelines for the morally used of computers • Four computer ethics: • Privacy • Concerns the collection and use of data about individuals • Accuracy • relates to the responsibility of those who should ensure the data is correct • Property • relates to who owns data and rights to software • Access • relates to the responsibility of those who is able to use the data

  5. Large Databases • Used by large companies, such telephone companies, banks, credit card companies, supermarkets, and so on to store the people’s private data • Information resellers and information brokers • collect data to create electronic profiles and sell them • The personal information has become a marketable commodity • Some raised issues: • Spreading information without personal consent: identify theft • Spreading inaccurate information: mistaken identity

  6. Private networks • Snoopware: a kind of software used for electronic monitoring • The network and the web • History files • The locations of sites visited by the browser • Cookies • Cookies are created when you use your browser to visit a website • Cookies are usually small text files, given ID tags that are stored on your computer's browser directory or program data subfolders. • id@web[number].txt • Functions: keep track of your movements within the site, help you resume where you left off, remember your registered login, theme selection, preferences, and other customization functions.

  7. UTP and RJ-45 connector Visit History Internet Temporary Files

  8. Two basic types of cookies: • Traditional cookies • Ad newtwork or advare cookies • Spyware • Web bugs: small program hidden within html code • Computing monitoring software: Keystroke loggers • Anti-spyware or spy removal programs • www.360.com • www.spydoctor.com • Major laws on Privacy

  9. Security • Computer criminals • Employees • Outside users • Hackers and crackers • Organized crime • Terrorists • Computer crime • Malicious programs: malware • Types: • Viruses • Worms • Trojan horses

  10. Denial of Service(DoS) • DoS attack: attempts to slow down or stop a computer system or network • Internet Scams • A fraudulent or deceptive act or operation • Theft • Data manipulation • Other hazards • Natural hazards • Civil strife and terrorism • Technological failures • Human errors

  11. Measures to protect computer security • Encrypting messages • Restricting access: password, Firewalls • Anticipating disasters : Physical security, data security, disaster recovery plan • Backing up data • Description

  12. Ergonomics • Physical Health • Eyestrain and headache • Back and neck pain • Repetitive strain injury • Mental Health • Noise • Electronic monitoring • Environmental protection • Green PC • Personal Responsibility • Conserve • Recycle