ImageVerifierCode 换一换
格式:PPT , 页数:29 ,大小:5.66MB ,
资源ID:7355872      下载积分:10 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.docduoduo.com/d-7355872.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录   微博登录 

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Computing Essentials Chapter10.ppt)为本站会员(j35w19)主动上传,道客多多仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知道客多多(发送邮件至docduoduo@163.com或直接QQ联系客服),我们立即给予删除!

Computing Essentials Chapter10.ppt

1、Chapter 10,Privacy and Security,10-2,Competencies (Page 1 of 2),Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe and control cookies, web bugs, and spyware Describe the security threats posed by computer crime, and other haza

2、rds,Page 282,10-3,Competencies (Page 2 of 2),Discuss ways that individuals and organizations protect their security Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks Discuss what the computer industry is doing, and wh

3、at you can do, to protect the environment,Page 282,10-4,Introduction,The ubiquitous use of computers and technology prompts some very important questions about use of personal data and privacy. This chapter will cover issues related to the impact of technology on people and how to protect ourselves

4、on the Web.,Page 283,10-5,Information Systems Concerns for People,Privacy What are the threats to personal privacy and how can we protect our selves? Security How can access to sensitive information be controlled and how can we secure hardware and software? Ergonomics What are the physical and menta

5、l risks to technology and how can these risks be eliminated or controlled? Environment What can individuals and organizations do to minimize the impact of technology?,Page 283,10-6,Computer Ethics and Privacy,Privacy relates to the collection and use of personal information; concerns include: Large

6、databases Private networks Internet/Web Privacy laws exist, but privacy remains primarily an ethical issue,Computer ethics provide guidelines for computer use Ethics issues include: Privacy Accuracy Property Access,Page 284,10-7,Large Databases,Data collected daily Data gatherers Information reselle

7、rs or information brokers Electronic profiles are created Concerns Spreading information without consent Identify theft Spreading inaccurate information Mistaken identity Freedom of Information Act,Page 284,Return,10-8,Private Networks,Employers monitor e-mail Legally done Snoopware Software Online

8、services right to censor content Screen and reject messages Terminate user accounts,Page 286,Return,10-9,The Internet and the Web,Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending e-mail History file Cookies two basic types Tradition

9、al Ad network or adware cookies Cookie-cutter programs Spyware Spy removal programs Financial Modernization Act,Page 286,Return,10-10,Viewing History Files,Page 287,10-11,Viewing and Blocking Cookies,Page 287,10-12,Spyware Removal,Anti-Spyware is used for: Finding and removing spyware Automating spy

10、ware removal Staying up to date,Return,Page 290,10-13,Major Laws on Privacy,Federal laws governing privacy matters have been created To learn more about existing privacy laws visit and enter the keyword law,Page 292,10-14,Security and Computer Criminals,Threats to computer security are criminals, c

11、omputer crime, and hazards Computer criminals are of five types: Employees Outside users Hackers and crackers Organized crime Terrorists,Page 292,Return,10-15,Computer Crime Computer Crimes have tripled in the past two years,Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Inter

12、net Scams,Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act,Page 293,10-16,Commonly Encountered Viruses,Page293,Return,10-17,Common Internet Scams,Return,Page 294,10-18,Other Hazards,Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes,Civi

13、l strife and terrorism Wars, riots and terrorist acts Technological failures Voltage surge Use surge protector Hard disk crashes Human errors,Page295,10-19,Measures to Protect Computer Security,Encrypting messages Restricting access Anticipating disasters Backing up data,Page 296,10-20,Restricting A

14、ccess,Biometric scanning Fingerprint scanners Iris (eye) scanners Assigning passwords Firewalls Special hardware and software Controls access to internal networks,Page 297,Return,10-21,Ergonomics (Page 1 of 3) Study of human factors related to things people use,Page 299,10-22,Ergonomics (Page 2 of 3

15、),Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury (RSI),Page 299,10-23,Ergonomics (Page 3 of 3),Computer technology offers ways of improving productivity but can create irritants other than physical Noise Electronic monitoring Technostress Stress associated with co

16、mputer use,Page 301,Return,10-24,Environmental Protection,Page 302,The Green PC,10-25,Personal Responsibility to Help Protect the Environment,What can computer users do?Conserve Recycle Educate,Page 303,10-26,Careers in IT,Cryptography is the science of disguising and revealing encrypted information

17、 Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to $101,000/year,Page 304,10-27,A Look to the Future Presence Technology,Presence technology alerts you that someone i

18、s trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances,Page 305,10-28,Discussion Questions (Page 1 of 2),Discuss the impact of large databases, private networks, the Internet, and the web on

19、privacy.Discuss the various kinds of computer criminals.What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?,Page 312,10-29,Discussion Questions (page 2 of 2),What is ergonomics? How does computer use impact mental health? Physical health?Describe the basic elements of the Green PC and what you can do to protect the environment.,Page 312,

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:道客多多官方知乎号:道客多多

经营许可证编号: 粤ICP备2021046453号世界地图

道客多多©版权所有2020-2025营业执照举报