Professional Documents
Culture Documents
CHAPTER VI Computer Security and Safety Ethics and Privacy
CHAPTER VI Computer Security and Safety Ethics and Privacy
Discovering Computers
Fundamentals
Your Interactive Guide
to the Digital World
Objectives Overview
Discuss ways to
Discuss issues
prevent health-related
surrounding
disorders and injuries
information privacy
due to computer use
See Page 381 Discovering Computers Fundamentals, 2012 Edition 3
for Detailed Objectives Chapter 10
Computer Security Risks
Unethical
Cyberextortionists Cyberterrorists
Employees
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
Information
Insurance
security
agencies
departments
Page 392 Discovering Computers Fundamentals, 2012 Edition 17
Chapter 10
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
Illegally
Illegally copies a registers and/or
program activates a
program
Page 393 Discovering Computers Fundamentals, 2012 Edition 20
Chapter 10
Software Theft
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
Page 394 Discovering Computers Fundamentals, 2012 Edition 21
Chapter 10
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully
Parent
Child
• Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
• Green computing
involves reducing the
electricity and
environmental waste
while using a computer
– ENERGY STAR program
Track how
Target
often users
advertisements
visit a site
Pages 403 - 404 Discovering Computers Fundamentals, 2012 Edition 41
Chapter 10
Ethics and Society
• Spam is an unsolicited
e-mail message or
newsgroup posting
• E-mail filtering blocks
e-mail messages from
designated sources
• Anti-spam programs
attempt to remove
spam before it reaches
your inbox
• Phishing is a scam in
which a perpetrator sends
an official looking e-mail
message that attempts to
obtain your personal and
financial information
• Pharming is a scam
where a perpetrator
attempts to obtain your
personal and financial
information via spoofing