1、Chapter 10,Privacy and Security,10-2,Competencies (Page 1 of 2),Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web Describe and control cookies, web bugs, and spyware Describe the security threats posed by computer crime, and other haza
2、rds,Page 282,10-3,Competencies (Page 2 of 2),Discuss ways that individuals and organizations protect their security Describe the common types of physical and mental risks associated with computer use and ways to protect yourself against these risks Discuss what the computer industry is doing, and wh
3、at you can do, to protect the environment,Page 282,10-4,Introduction,The ubiquitous use of computers and technology prompts some very important questions about use of personal data and privacy. This chapter will cover issues related to the impact of technology on people and how to protect ourselves
4、on the Web.,Page 283,10-5,Information Systems Concerns for People,Privacy What are the threats to personal privacy and how can we protect our selves? Security How can access to sensitive information be controlled and how can we secure hardware and software? Ergonomics What are the physical and menta
5、l risks to technology and how can these risks be eliminated or controlled? Environment What can individuals and organizations do to minimize the impact of technology?,Page 283,10-6,Computer Ethics and Privacy,Privacy relates to the collection and use of personal information; concerns include: Large
6、databases Private networks Internet/Web Privacy laws exist, but privacy remains primarily an ethical issue,Computer ethics provide guidelines for computer use Ethics issues include: Privacy Accuracy Property Access,Page 284,10-7,Large Databases,Data collected daily Data gatherers Information reselle
7、rs or information brokers Electronic profiles are created Concerns Spreading information without consent Identify theft Spreading inaccurate information Mistaken identity Freedom of Information Act,Page 284,Return,10-8,Private Networks,Employers monitor e-mail Legally done Snoopware Software Online
8、services right to censor content Screen and reject messages Terminate user accounts,Page 286,Return,10-9,The Internet and the Web,Illusion of anonymity Not concerned about privacy when surfing the Internet Not concerned about privacy when sending e-mail History file Cookies two basic types Tradition
9、al Ad network or adware cookies Cookie-cutter programs Spyware Spy removal programs Financial Modernization Act,Page 286,Return,10-10,Viewing History Files,Page 287,10-11,Viewing and Blocking Cookies,Page 287,10-12,Spyware Removal,Anti-Spyware is used for: Finding and removing spyware Automating spy
10、ware removal Staying up to date,Return,Page 290,10-13,Major Laws on Privacy,Federal laws governing privacy matters have been created To learn more about existing privacy laws visit and enter the keyword law,Page 292,10-14,Security and Computer Criminals,Threats to computer security are criminals, c
11、omputer crime, and hazards Computer criminals are of five types: Employees Outside users Hackers and crackers Organized crime Terrorists,Page 292,Return,10-15,Computer Crime Computer Crimes have tripled in the past two years,Malicious Programs Viruses Worms Trojan horse Denial of service (DoS) Inter
12、net Scams,Theft Hardware or software Data Computer time Data Manipulation Computer Fraud and Abuse Act,Page 293,10-16,Commonly Encountered Viruses,Page293,Return,10-17,Common Internet Scams,Return,Page 294,10-18,Other Hazards,Natural hazards Fires & floods Winds Hurricanes Tornadoes Earthquakes,Civi
13、l strife and terrorism Wars, riots and terrorist acts Technological failures Voltage surge Use surge protector Hard disk crashes Human errors,Page295,10-19,Measures to Protect Computer Security,Encrypting messages Restricting access Anticipating disasters Backing up data,Page 296,10-20,Restricting A
14、ccess,Biometric scanning Fingerprint scanners Iris (eye) scanners Assigning passwords Firewalls Special hardware and software Controls access to internal networks,Page 297,Return,10-21,Ergonomics (Page 1 of 3) Study of human factors related to things people use,Page 299,10-22,Ergonomics (Page 2 of 3
15、),Physical Health Eyestrain and headache Back and neck pain Repetitive strain injury (RSI),Page 299,10-23,Ergonomics (Page 3 of 3),Computer technology offers ways of improving productivity but can create irritants other than physical Noise Electronic monitoring Technostress Stress associated with co
16、mputer use,Page 301,Return,10-24,Environmental Protection,Page 302,The Green PC,10-25,Personal Responsibility to Help Protect the Environment,What can computer users do?Conserve Recycle Educate,Page 303,10-26,Careers in IT,Cryptography is the science of disguising and revealing encrypted information
17、 Usually refers to keeping any intercepted information private Cryptographers are mathematicians who specialize in making and breaking codes Annual salary is usually between $60,000 to $101,000/year,Page 304,10-27,A Look to the Future Presence Technology,Presence technology alerts you that someone i
18、s trying to reach you People can locate you People can tell which device is best to contact you Could become a standard feature of new cars, phones, and appliances,Page 305,10-28,Discussion Questions (Page 1 of 2),Discuss the impact of large databases, private networks, the Internet, and the web on
19、privacy.Discuss the various kinds of computer criminals.What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?,Page 312,10-29,Discussion Questions (page 2 of 2),What is ergonomics? How does computer use impact mental health? Physical health?Describe the basic elements of the Green PC and what you can do to protect the environment.,Page 312,