Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Contents

Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Privacy, Security
and Ethics
Start Here
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Introduction
Right now, criminals are trying to break into your e-mail,
your online bank account, and even your cellphone.
Organizations are recording and analyzing your every
digital decision, leading many to believe that the future of
the internet will result in the end of privacy as we know it.

*You can delete this slide.


Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

● Cybercrime- protect yourself from viruses, internet scams, and


identity theft.

● Privacy rights- learn what companies can legally record about


your internet usage and how they use that information.

● Safe computing- avoid embarrassment and worse by knowing


the way Facebook and social networking share your information.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Desired learning outcomes/ Competencies

At the end of this discussion, the students should:

● Identify the most significant concerns for effective implementation of computer


technology
● Discuss the primary privacy issues for accuracy, property and access
● Detail ways to protect computer security including restricting access, encrypting
data and etc.
● Discuss computer ethics as well as plagiarism and ways to identify plagiarism.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Key terms
Mistaken identity- occurs when an electronic profile of one person is switched
with another

Cookies- are small data files that are deposited on your hard disk from websites
you have visited.

History files- include the locations, or addresses, of sites that you have recently
visited.

Privacy- concerns the collection and use of data about individuals.


Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

5.1
5.1People
People
Information
Information system
system consist
consist of
of people,
people, procedures,
procedures, software,
software, hardware,
hardware, data
data
and
andthe
theinternet.
internet.

5.2
5.2Privacy
Privacy
Technology
Technologymakes
makesititpossible
possibletotocollect
collectand
anduse
usedata
dataof
ofall
allkinds,
kinds,including
including
information
informationabout
aboutpeople.
people.
Concerns
Concernsthe
thecollection
collectionand
anduse
useof
ofdata
dataabout
aboutindividuals.
individuals.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Three
ThreePrimary
PrimaryIssues:
Issues:

•• Accuracy
Accuracyrelates
relatestotothe
theresponsibility
responsibilityof
ofthose
thosewho
whocollect
collectdata
datatotoensure
ensurethat
thatdata
data
isiscorrect.
correct.
•• Property
Propertyrelates
relatestotoowns
ownsdata.
data.
•• Access
Accessrelates
relatestotothetheresponsibility
responsibilityof
ofthose
thosewho
whohave
havedata
datatotocontrol
controlwho
whoisisable
able
totouse
usethat
thatdata.
data.

A.
A. Large
LargeDatabases
Databases

Large
Large organizations
organizations areare constantly
constantly compiling
compiling information
information about
about us.us. The
The
Federal
Federal government
government alone
alone has
has over
over 2,000
2,000 databases.
databases. Every
Every day,
day, data
data isis gathered
gathered
about
aboutand
andstored
storedininlarge
largedatabases.
databases.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Big data--the
Bigdata theever-growing
ever-growingvolume
volumeof data..
ofdata
Information
Informationresellers
resellersor
orInformation
InformationBrokers-A
Brokers-Avast
vastindustry
industryof
ofdata
datagatherers.
gatherers.ItIt
collects,
collects,analyzes,
analyzes,and
andsells
sellssuch
suchpersonal
personaldata.
data.
Electronic
Electronicprofiles-
profiles-highly
highlydetailed
detailedand
andpersonalized
personalizeddescriptions
descriptionsof
ofindividuals.
individuals.

Important
Importantissues
issuesincludes:
includes:

•• Collecting
Collectingpublic,
public,but
butpersonally
personallyidentifying,
identifying,information.
information.
•• Spreading
Spreadinginformation
informationwithout
withoutpersonal
personalconsent.
consent.
•• Spreading
Spreadinginaccurate
inaccurateinformation
information
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Mistaken
MistakenIdentity-
Identity-occurs
occurswhen
whenananelectronic
electronicprofile
profileofofone
oneperson
personisisswitched
switchedwith
withanother.
another.
Freedom
FreedomofofInformation
InformationAct-
Act-entitles
entitlesindividuals
individualsaccess
accesstotogovernmental
governmentalrecords
recordsrelated
relatedtoto
them.
them.

B.)
B.)Private
PrivateNetworks
Networks
*employee-monitoring
*employee-monitoringsoftware-
software- these
theseprograms
programsrecord
recordvirtually
virtuallyeverything
everythingyou
youdo
doon
on
your
yourcomputer.
computer.

C.)
C.)The
TheInternet
InternetAndAndTheTheWeb
Web
*Illusion
*Illusionofofanonymity-
anonymity- isiswhen
whenpeople
peoplethinks
thinksthat
thatasaslong
longasasthey
theyare
areusing
usingtheir
theirown
own
computer
computer andand are
are selective
selective about
about disclosing
disclosing their
their names
names oror other
other personal
personal information,
information,
then
thenlittle
littlecan
canbe
bedone
donetotoinvade
invadetheir
theirpersonal
personalprivacy.
privacy.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

•• History
HistoryFiles-
Files-include
includethethelocations,
locations,or oraddresses,
addresses,ofofsites
sitesthat
thatyou
youhave
haverecently
recently
visited.
visited.
•• Temporary
Temporary Internet
Internet Files-
Files- also
also known
known asas browser
browser cache,
cache, contain
contain web
web page
page
content
contentand
andinstructions
instructionsfor
fordisplaying
displayingthis
thiscontent.
content.
•• Cookies-
Cookies- arearesmall
smalldata
datafiles
filesthat
thatare
aredeposited
deposited on
on your
yourhard
hard disk
disk from
fromwebsite
website
you
youhave
havevisited.
visited.
•• AAfirst-party
first-partycookie-
cookie-oneonethat
thatisisgenerated
generated(and
(andthen
thenread)
read)only
onlybybythe
the website
website
you
youare
arecurrently
currentlyvisiting.
visiting.
•• AA third-party
third-party cookie-
cookie- isis usually
usually generated
generated byby an
an advertising
advertising company
company that
that isis
affiliated
affiliated with
with the
the website
website youyou areare currently
currently visiting.
visiting. Often
Often referred
referred toto as
as
tracking
trackingcookies.
cookies.
•• Privacy
Privacymode-
mode-which
whichensures
ensuresthatthatyour
yourbrowsing
browsingactivity
activityisisnot
notrecorded
recordedononyour
your
hard
harddisk.
disk.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Web
Webbugs-
bugs-which
whichareareinvisible
invisibleimages
imagesor orHTML
HTMLcode codehidden
hiddenaaweb webor ore-messages,
e-messages,
can
canbe
beused
usedtototransmit
transmitinformation
informationwithout
withoutyour
yourknowledge.
knowledge.
Spyware-
Spyware- thethe most
most dangerous
dangerous type type of
of privacy
privacy threat.
threat. IsIs used
used toto describe
describe aa wide
wide
range
range of
of programs
programs that
that are
are design
design toto secretly
secretly record
record andand report
report anan individual’s
individual’s
activities
activitieson
onthe
theinternet.
internet.*Computer
*ComputerMonitoring
Monitoringsoftware-
software-isisperhaps
perhapsthethemost
most
invasive
invasiveand
anddangerous
dangeroustypetypeofofspyware.
spyware.
*Keystroke
*Keystrokelogger-
logger-records
recordsevery
everyactivity
activityand
andkeystroke
keystrokemademadeon onyour
your
computer
computer system,
system, including
including credit
credit card
card numbers,
numbers, passwords,
passwords, and and e-mail
e-mail
messages.
messages.
*Antispyware
*Antispyware or or spy
spy removal
removal programs-
programs- which which are
are design
design toto detect
detect
and
andremove
removevarious
varioustype
typeofofprivacy
privacythreats.
threats.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

D.)
D.) Online
Online identity-
identity- the
the information
information that
that people
people voluntarily
voluntarily post
post about
about themselves
themselves
online.
online.

Major
MajorLaws
Lawson
onPrivacy
Privacy

•• Gramm-
Gramm-Leach-Bliley
Leach-BlileyAct-
Act-protects
protectspersonal
personalfinancial
financialinformation.
information.
•• Health
Health Insurance
Insurance Portability
Portability And
And Accountability
Accountability ActAct (HIPAA)
(HIPAA) –– protects
protects
medical
medicalrecord.
record.
•• Family
FamilyEducational
EducationalRights
RightsAnd
AndPrivacy
PrivacyAct
Act(FERPA)-
(FERPA)- restricts
restrictsdisclosure
disclosureof
of
educational
educationalrecords.
records.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

5.3
5.3Security
Security
Involves
Involves protecting
protecting individuals
individuals ad ad organizations
organizations from
from theft
theft and
and danger.
danger.
Computer
Computer security specifically focuses on protecting information, hardware, and
security specifically focuses on protecting information, hardware, and
software
software from
from unauthorized
unauthorized use,
use, as
as well
well as
as preventing
preventing or
or limiting
limiting the
the damage
damage from
from
intrusions,
intrusions,sabotage,
sabotage,and
andnatural
naturaldisasters.
disasters.

Cybercrime-
Cybercrime-or
orcomputer
computercrime
crimeisisany
anycriminal
criminaloffense
offensethat
thatinvolves
involvesaacomputer
computerand
and
aanetwork.
network.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Cybercrimes
Cybercrimes can
can take
take various
various forms
forms including
including the
the creation
creation of
of
malicious
malicious programs,
programs, denial
denial ofof service
service attacks,
attacks, rouge
rouge Wi-Fi
Wi-Fi hotspots,
hotspots, data
data
manipulation,
manipulation,identity
identitytheft,
theft,internet
internetscams,
scams,and
andcyberbullying.
cyberbullying.
Malicious
Malicious programs.
programs.AAcracker
cracker isis aa computer
computer criminal
criminal who
who creates
creates and
and distributes
distributes
malicious
malicious programs.
programs. These
These programs
programs areare called
called malware,
malware, which
which isis short
short for
for
malicious
malicioussoftware.
software.
•• Viruses
Viruses––are
areprograms
programsthat
thatmigrate
migratethrough
throughnetworks
networksand
andoperating
operatingsystems,
systems,and
and
most
most attach
attach themselves
themselves toto different
different programs
programs and
and databases.
databases. Creating
Creating and
and
knowingly
knowingly spreading
spreading aa virus
virus isis aa very
very serious
serious crime
crime and
and aa federal
federal offense
offense
punishable
punishableunder
underthe
theComputer
ComputerFraud FraudAnd AndAbuse
AbuseAct.
Act.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

•• Worms-
Worms- areare programs
programs that
that simply
simply replicate
replicate themselves
themselves over
over and
and over
over again.
again. AA worm
worm
typically
typicallydid
didnot
notattach
attachitself
itselftotoaaprogram
programororalter
alterand/or
and/ordelete
deletefiles.
files.Worms,
Worms,however,
however,
can
cancarry
carryaavirus.
virus.
Antivirus
Antivirusprograms
programsalerts
alertsusers
userswhen
whencertain
certainkinds
kindsofofviruses
virusesand
andworms
wormsenter
entertheir
theirsystem.
system.
Example are Avast! Free Antivirus and Microsoft Security Essentials.
Example are Avast! Free Antivirus and Microsoft Security Essentials.
•• Trojan
Trojanhorses-
horses-are
areprograms
programsthat
thatappear
appeartotobe
beharmless;
harmless;however,
however,they
theycontain
containmalicious
malicious
programs.
programs.
Zombies-
Zombies-are
arecomputers
computersinfected
infectedby
byaavirus,
virus,worm
wormororTrojan
Trojanhorse
horsethat
thatallows
allowsthem
them
totobe remotely controlled for malicious purposes.
be remotely controlled for malicious purposes.

Botnets
Botnetsor
orrobot
robotnetwork-
network-password
passwordcracking
crackingororsending
sendingjunk
junke-mail.
e-mail.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Denial
DenialofofService
Service(DoS)-
(DoS)-attacks
attacksattempts
attemptstotoslow
slowdown
downororstop
stopaacomputer
computersystem
systemorornetwork
network
by flooding a computer or network with requests for information and data.
by flooding a computer or network with requests for information and data.
Rogue
RogueWi-Fi
Wi-Fihotspots-
hotspots-free
freeWi-Fi
Wi-Finetworks
networksare areavailable
availablealmost
almosteverywhere
everywherefrom
fromlibraries
librariestoto
fast-food
fast-foodrestaurants
restaurantsand
andcoffee
coffeeshops.
shops.ItItimitates
imitatesthe
thefree
freenetworks.
networks.
Data
DataManipulation-
Manipulation-finding
findingentry
entryinto
intosomeone’s
someone’scomputer
computernetwork
networkand
andleaving
leavingaaprankster’s
prankster’s
message
messagemay
mayseem
seemlike
likefun,
fun,which
whichisiswhy
whyhackers
hackersdo
doit.it.
Identity
IdentityTheft-
Theft-isisthe
theillegal
illegalassumption
assumptionofofsomeone’s
someone’sidentity
identityfor
forthe
thepurpose
purposeofofeconomic
economic
gain.
gain.
Internet
Internet Scams-
Scams- aa scam
scam isis aa fraudulent
fraudulent oror deceptive
deceptive act
act oror operation
operation designed
designed toto trick
trick
individuals into providing personal or spending their time and money for little or no
individuals into providing personal or spending their time and money for little or no return.return.

Internet
InternetScam-
Scam-isissimply
simplyaascam
scamusing
usinginternet.
internet.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Phishing- attempts to trick internet users into thinking a fake but official-looking
website or e-mail is legitimate.

Cyberbullying- a fairly recent and all-too-common phenomenon. Is the use of the


internet, smartphones, or other devices to send or post content intended to hurt or
embarrass another person.

Measures to Protect Computer Security

 Restricting Access-security experts are constantly devising ways to protect


computer system from access by unauthorized persons.

Biometric scanning- devices such as fingerprint and iris.


Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Physical
Physical security-
security- isis concerned
concerned with
with protecting
protecting hardware
hardware from
from possible
possible human
human and
and
natural
naturaldisasters.
disasters.

Data
Data security-
security- isis concerned
concerned with
with protecting
protecting software
software and
and data
data from
from unauthorized
unauthorized
tampering
tamperingor
ordamage.
damage.

Disaster
Disaster recovery
recovery plans-
plans- describing
describing ways
ways toto continue
continue operating
operating until
until normal
normal
operations
operationscan
canbe
berestored.
restored.

Preventing
Preventing data
data Loss-
Loss- making
making frequent
frequentbackups
backupsof
ofdata
dataisisessential
essentialtotoprevent
preventdata
data
loss.
loss.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

5.4
5.4Ethics
Ethics
Ethics,
Ethics,as
asyou
youknow,
know,are
arestandards
standardsof
ofmoral
moralconduct.
conduct.

Computer
Computer ethics-
ethics- are
are guidelines
guidelines for
for the
the morally
morally acceptable
acceptable use
use of
of computer
computer inin our
our
society.
society.

a)
a) Copyright
CopyrightAnd
AndDigital
DigitalRights
RightsManagement
Management

Copyright-
Copyright- isis aa legal
legalconcept
conceptthat
thatgives
givescontent
contentcreators
creatorsthe
the right
righttoto control
controluse
use and
and
distribution
distributionof
oftheir
theirwork.
work.

Software
Softwarepiracy-
piracy-isisthe
theunauthorized
unauthorizedcopying
copyingand/or
and/ordistribution
distributionof
ofsoftware.
software.
Contents
Contents Description
Description Assignments
Assignments Grading
Grading Materials
Materials Absences
Absences

Digital
Digital rights
rights management
management (DRM)-
(DRM)- encompasses
encompasses various
various technologies
technologies that
that control
control
access
access toto electronic
electronic media
media and
and files.
files. The
The act
act also
also establishes
establishes that
that copies
copies ofof
commercial
commercialprograms
programsmay
maynot
notbe
belegally
legallyresold
resoldor
orgiven
givenaway.
away.

b.)
b.)Plagiarism
Plagiarism
Plagiarism-
Plagiarism- which
which means
means representing
representing some
some other
other person’s
person’s work
work and
and ideas
ideas as
as your
your
own
ownwithout
withoutgiving
givingcredit
credittotothe
theoriginal
originalsource.
source.

You might also like