Professional Documents
Culture Documents
Computing and IT in The Workplace: Ethical & Legal Issues Part 1
Computing and IT in The Workplace: Ethical & Legal Issues Part 1
Computing and IT in The Workplace: Ethical & Legal Issues Part 1
CT006-1
Information
Unauthorized Software theft
accuracy
use of computers
and networks Intellectual property
rights—rights to which Codes of
creators are entitled conduct
for their work
Information
privacy
CT024 PDT Introduction 4
Unauthorized Access and Use
• What is unauthorized access and how is
it achieved?
Use of a computer or
network without permission
Hackers typically break into computer by
connecting to it and then logging in as a
legitimate user
Hacker - someone who accesses a computer or
network illegally. Cracker –
one who accesses a computer or network illegally
with the INTENTION of destroying, stealing data
CT024 PDT Introduction 5
Unauthorized Access and Use
• How can companies protect against
hackers?
Access control defines who
Intrusion detection software can access computer and
analyzes network traffic, assesses
system vulnerabilities, and identifies
what actions they can take
intrusions and suspicious behavior
• What is a cookie
manager?
Software
program
that
selectively
blocks
cookies
Collects spam in
Service that
blocks e-mail E-mail filtering central location
that you can
messages from
view any time
designated
sources
Anti-spam program
Attempts to Sometimes
remove spam removes valid
e-mail messages
CT024 PDT Introduction 25
Privacy Law
• What privacy laws have been enacted?
Web filtering
software
restricts access
to specified sites
Q&A