10 PRIVACY AND SECURITY 10-2 Competencies Describe concerns associated with computer technology Discuss computer ethics Discuss privacy issues Describe the security threat posed by computer criminals, computer crime, and other hazards © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-3 Competencies cont. Discuss ways to protect security Describe common types of risks associated with computers Discuss what the computer industry is doing, and what you can do to protect the environment © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-4 Information System Concerns Privacy Security Ergonomics Environment © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-5 Privacy Computer ethics provide guidelines for computer use Ethics issues Privacy Accuracy Property Access © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-6 Large Databases Data collected daily Data gatherers Information resellers or information brokers Information profiles are created Concerns Identify theft Mistaken identity © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-7 Private Networks Employers monitor email Legally done Snoopware Software Online services right to censor content Screen and reject messages Terminate user accounts © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-8 Internet and Web Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending e-mail History file Cookies Traditional Ad network or adware cookies © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-10 Computer Criminals Employees Outside users Hackers and crackers Organized crime Terrorists © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-11 Computer Crime Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Internet Scams Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act of 1986 © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-12 Other Hazards Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes Technological failures Voltage surge Surge protector Human errors Civil strife and terrorism Wars Riots Terrorist acts © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-13 Measures to Protect Computer Security Encrypting messages Restricting access Anticipating disasters Backing up data Encrypted e-mail © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-14 Restricting Access Biometric scanning Fingerprint scanners Retinal (eye) scanners Assigning passwords Firewalls Special hardware and software Controls access to internal networks © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-15 Ergonomics © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-16 Ergonomics Study of human factors related to things people use Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-17 More on Ergonomics Mental Health Noise Electronic monitoring Technostress Stress associated with computer use Harmful to people © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-18 The Environment © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-19 Personal Responsibility Conserve Recycle Educate © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-20 A Look to the Future Presence Technology Presence technology alerts you that someone is trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-21 Key Terms access (269) accuracy (269) ad network cookie (272) adware cookie (272) biometric scanning (280) carpal tunnel syndrome (284) chlorofluorocarbons (CFCs) (286) Code of Fair Information Practice (273) cold site (281) Computer Abuse Amendments Act of 1994 (277) computer crime (276) computer ethics (269) Computer Fraud and Abuse Act of 1986 (279) cookie (272) © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-22 Key Terms cookie-cutter program (272) Cracker (277) cumulative trauma disorder (283) data security (281) Denial of service attack (DoS) (278) disaster recovery plan (281) electronic monitoring (284) electronic profile (270) Encrypting (280) Energy Star (285) ergonomics (282) ethics (269) firewall (280) Freedom of Information Act (271) © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-23 Key Terms Green PC (285) hacker (277) history file (272) hot site (281) identity theft (270) illusion of anonymity (272) information brokers (270) information resellers (270) Internet scam (278) mistaken identity (271) password (280) physical security (281) privacy (269) property (269) repetitive motion injury (283) © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-24 Key Terms repetitive strain injury (RSI) (283) scam (278) security (289) snoopware (271) Software Copyright Act of 1980 (278) software piracy (278) spike (279) spyware (272) surge protector (279) technostress (284) traditional cookie (272) Trojan horse (278) virus (277) virus checker (278) voltage surge (279) worm (277) © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-25 FAQs What is identity theft? How does snoopware work? I keep getting a lot of ads on my computer. What is spyware? What is the difference between hackers and crackers? My back hurts every time I sit in front of my computer. What can I do? © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 10-26 Discussion Questions Explain how access can be restricted to a computer. Discuss the various malicious programs that can attack a computer system. What can you do to protect your privacy while on the Web? Do you feel that the Code of Fair Information Practice should be made into an enforceable law? Discuss your views. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved.