1. Hamimah bte Mohd Jamil
MUHAMMAD BIN MOHD SUKERI
(A13CS0068)
NURUL EMIRA BINTI ABDUL AZIZ
(A13CS0128)
WAN HAJARUL ASIKIN BINTI WAN
ZUNAIDI (A13CS0168)
2.
3. PRIVACY
• Computing technology makes it possible to
collect and use our data.
• The website we visit is one of the way the data
collection.
• Would you matter if your personal
information is been shared ?
PRIMARY
PRIVACY
ISSUES
ACCURACY :Relates to the responsibility of those who collect the data is
correct
PROPERTY :who on data and right to the software
ACCESS :relates to the responsibility of those who have data to control who
is able to use it
4. LARGE DATABASE
• Large organisation are constantly compiling
information about us.
• There are about 2000 database
• Example : Telephone companies-compile lists of
the call we make.
• REVERSE DIRECTORY
list telephone
number followed by subscriber names.
• *insert picture
• *change title
5. • Information reseller(information broker) : Collect
and sell personal data. Electronic Profiles : are
compiled from database to provide highly detailed
and personalized descriptions of individual
• Our personal information has been a marketable
commodity. This raises many issues including :
1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING
INFORMATION.
2.SPREADING INFORMATION WITHOUT PERSONAL
CONSENT.
3.SPREADING INACCURATE INFORMATION
6. IDENTITY THEFT :
• Is the illegal assumption of someone’s
identity for the purpose of economic gain.
MISTAKEN IDENTITY :
• Occurs when an electronic profile of one
person is switched with another.
• INFORMATION OF INFORMATION ACT :
entitles individuals access to
governmental records relating to them.
7. Many organization monitor employee e-mail and
computer files using software called SNOOPWARE
Many people believe that, while using the web, little
can be done to invade their privacy. This is called the
illusion of anonymity
Record location of visited sites
Two basic type are TRADITIONAL COOKIES AND AD
NETWORK COOKIES(ADWARE COOKIES).
8. • TRADITIONAL COOKIES-Provide information to a single sites,a
cookies is deposited with the information that identifies specifically
• AD NETWORK(ADWARE COOKIES-Record your activities across
different sites.
• PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)eliminate history files and block cookies.
• SPYWARE-Secretly record and report internet activities.
• COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what
you do.
• WEB BUGS-Provide information back to spammers about activity
on e-mail account.
• ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and
monitoring software.
9. GRAMM-LEACH-BLILEY ACT
• Protect personal financial information
HEALTH INSURANCE PROTABILITY AND
ACCOUNTABILITY ACT(HIPAA)
• Protect medical records
FAMILY EDUCATIONAL RIGHTS AND PRIVACY
ACT(FREPA)
• Restricts disclosure of educational records
10.
11. • Computer criminal included employee , outside
users , hacker and crackers ,carders , organized
crime, and terrorist
• HACKER :Create or improve programs and shared
those program with fellow hackers . Typically are
not criminal.
• CRACKERS :Share programs designed to gain
unauthorized access computer systems or disrupt
networks.Typically are criminals.
• CARDERS :Specialize in stealing,trading and using
stolen credit cards over the internet.
12. Is an illegal action involving special knowledge
of computer technology
• CYBER-BULLYING : intended to hurt or embarrass
another person.
• ROGUE WI-FI HOTSPOT :Capture personal
information
• SCAMS : designed to trick people into spending
their time/money.
13. • DENIAL OF SERVICE ATTACK(DOS) : Is attempt to
shut down or stop a computer system/network.it
floods a computer or network with requests for
information and data.
• Theft : Takes many forms including stealing
hardware, software, data and computer time.
• Data manipulation : Involves changing data or
leaving prank messages .The Computer Fraud and
Abuse Act helps protect against data manipulation.
14. • MALICIOUS PROGRAMS (MALWARE) : Design to damage or
disrupt computer system.3 most common types of malware
are viruses, worms, and Trojan horses.
VIRUSES
• Some of the viruses are harmless while some of it can damaging our system
component.
WORMS
• It fill the computer a computer system with self replicating
information, clogging the system that is operation are slowed/stopped
• Typically find their way into microcomputer through e-mail
attached/programs downloaded from internet
Trojan horses
• Disguised as something else
• Not a viruses , but it carries viruses.
Zombies
• Remotely controlled infected computer for malicious purpose.
• A collection of zombies computer is known as botnet or robot network
15. NATURAL DISASTER:
• Included fires,flod,wind,hurricans and tornado.Even computer users should store
backup disk of programms and data in safe location.
CIVIL STRIFE AND TERRORISM:
• Wars,riot,and terrorist activities are real risks in all parts of the world.
TECHNOLOGICAL FAILURES:
• Microcomputer should use a surge protector,a divice that separate the computer
from the power source of the wall outlet.This may protect the computer
HUMAN ERRORS:
• Human mistakes are inevitable.Data entry errors are probably the most
commonplace could lead to mistaken identity.
• Occur when office workers save important documents under files names that are
not descriptive and not recognizable by others
16. RESTRICTING ACCESS :
Sometimes security matter of putting guards on
company computer rooms and checking the
identification of everyone admitted.Other times it use
biometric scanning such as fingerprint and iris.
Password are secret words or phrases that must be
keyed into a computer system to gain access.
17. E-MAIL ENCRYPTING : Protect e-mails messages as the moves
across the internet.
FILE ENCRYPTING :Protects sensitive files by encrypting them
before they stored on a hard drive.
WEB SITES ENCRYPTING :Secures Web transaction,especially
financial transaction
VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections
between company networks and remote users such as
workers connecting from home
WIRELESS NETWORK ENCRYPTING :Restricts access to
authorized uses on wireless network.WEA(WIRED
EQUIVALENT PRIVACY) is one of the best-known wireless
encryption protocols.
18.
19. Ethics ?
Standards of moral products.
-the right to keep personal information, such as credit
ratings and medical histories, from getting into
unauthorized hands.
20. 2 important issues in computer ethics.
1. Copyright and Digital Right Management
2. Plagiarism
21. • Gives content creators the right to control the
use and distribution of their work.
Example of materials :
• Paintings , books , music, films , video games.
Others : make unauthorized copies
• Digital media. (violates copyright)
22. • Is the unauthorized copying and distribution of software.
Digital Millennium Copyright Act
-established the right of the program owner to make a backup
copy and disallow the creation of copies.
-illegal to download copyright-protected music and videos from
Internet.
Digital rights management (DRM)
-collection of technologies designed to prevent copyright
violations.
-control the number of devices that can access given file.
-limits the kinds of devices that can access a file.
23. • The illegal and unethical representation of
some other person’s work and ideas as your
own without giving credit to the original
source.
• Example :
cutting &
pasting Web content
into a report or paper.
24. Cryptographers design encryption algorithms,
break codes, and provide support to nasional
security efforts.
PhD in mathematics and broad experience in
computer science are required.
Salary range is $60.000 to over $100,000.