Professional Documents
Culture Documents
Chapter 9 - Security, Privacy, Etchic & Ergonomic
Chapter 9 - Security, Privacy, Etchic & Ergonomic
9 Security, Privacy,
Ethics And
Ergonomic
Chapter 9
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Learning Objectives
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
People
Privacy – What are the threats to personal privacy and how can we
protect ourselves?
Ethics – How do the actions of individual users and companies affect
society?
Ergonomics - How do the science devoted to incorporating comfort,
efficiency, and safety into the design of items in the workplace?
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Security
Any illegal act involving the use of a computer or related devices generally is
referred to as a computer crime
A cybercrime is an online or Internet-based illegal act
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Forms of Computer Crime
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Malicious Programs - Malware
Ref: DC16 – C05
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Cyber Crime
Denial of Service
(DoS) attack attempts to slow down or stop a computer
system or network by flooding it with requests for
information or data
Rogue Wi-Fi hotspots
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Internet Scams
Cyber-bullying
Use of the Internet, cell phones, or other devices to send or post
content intended to harm
Phishing
Attempts to trick Internet users into thinking a fake but official-
looking website is legitimate
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Types of Internet Scams
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Measures to Protect Computer Security
Principle measures to
ensure computer security
Restricting access
Encrypting data
Computing Essentials 2017
Anticipating disasters
Physical security
Data security
Disaster recovery plan
Preventing data loss
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Restricting Access
geometry Voice
verification
Uses software to try system
system
thousands of common
words sequentially in an
attempt to gain
unauthorized access to a Signature Iris recognition
user’s account verification system system
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Automated Security Tasks
Ways to perform and automate important security
tasks
Security Suites
Provide a collection of utility programs designed to
protect your privacy and security
Firewalls
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Encryption
Anticipating Disasters
Physical Security protects hardware
Data Security protects software and data from
unauthorized tampering or damage
Disaster Recovery Plan describes ways to continue
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Preventing Data Loss
damaged, or destroyed
To back up a file means to make a copy of it
Off-site backups are stored in a location separate
from the computer or mobile device site
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Large Databases
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Large Databases (Cont.)
Mistaken identity
Freedom of Information Act
Entitlement to look at your records held by government agencies
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Private Networks
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
The Internet and the Web
Illusion of anonymity
People are not concerned about privacy when surfing the Internet
or when sending e-mail
When browsing the web, critical information is stored on
the hard drive in these locations:
History Files
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
History Files and Temporary Internet
Files
History Files
Include locations or addresses
of sites you have recently visited
Temporary Internet Files /
Browser Cache
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Cookies
the website
Also known as tracking cookies that keep
track of your Internet activities through 3 rd
party cookies
Refer to the accompanying graphic
displaying how to block 3rd party cookies
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy Modes
Private Browsing
Safari
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy Threats
Web bugs
Invisible images or HTML code hidden within
an e-mail message or web page
When a user opens the message information
is sent back to the source of the bug
Spyware
Wide range of programs that are designed to
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Online Identity
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Making IT Work for You ~
Cloud-Based Backup
Cloud-based
backup services
such as
Carbonite
provide cloud-
Computing Essentials 2017
based backup
services.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ethics
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ethics and Society
Page 241 29
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
Figure 5-22 or posted on a website, in whole or part.
Plagiarism
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ergonomics
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use
32
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use
Computing Essentials 2017
33
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use
Craves
Computing Essentials 2017
Overjoyed when
computer time at the computer
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
A Look to the Future ~
The End of Anonymity
Cyberbullying
Stalking
Damaging reputations
How do you feel?
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Open-Ended Questions (Page 1 of 3)
2. Define and discuss online identity and the major privacy laws.
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Open-Ended Questions (Page 2 of 2)
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.