SlideShare a Scribd company logo
1 of 34
COMPUTER SECURITY AND SAFETY, ETHICS
AND PRIVACY
TECHNIQUES ON HOW TO KEEP
PERSONAL DATA PRIVATE
• Fill only necessary information on rebate, warranty and registration
forms.
• Do not preprim your telephone number or Social Security number
on personal checks.
• If Caller ID is available in your area, find out how to block your
number from displaying on the receiver system.
• Do not write your telephone number on charge or credit receipts.
TECHNIQUES ON HOW TO KEEP
PERSONAL DATA PRIVATE
• Ask merchants not to write credit numbers, telephone numbers,
Social Security numbers and driver’s license numbers on the
back of your personal checks.
• Purchase goods with cash, rather than charge or credit receipts.
• Avoid shopping club and buyer cards.
• If merchants ask personal question, fin out why they want to
know before releasing the information.
• Inform merchants that you do not them to disturb your personal
information.
• Request, in writing, to be removed form mailing list.
TECHNIQUES ON HOW TO KEEP
PERSONAL DATA PRIVATE
• Obtain your credit report once a year from each of the three (3)
major credit reporting agencies and correct any errors.
• Request a free copy of your medical records once a year from the
Medical Information Bureau.
• Limit the amount of information you provide to Web sites. Fill only
required information.
• Install a cookie manager to filter cookies.
• Clear your history file when you are finished browsing.
• Set up a free e-mail account. Use this e-mail address for merchant
forms.
TECHNIQUES ON HOW TO KEEP
PERSONAL DATA PRIVATE
• Turn off file and printer sharing on your Internet account.
• Install a personal firewall.
• Sign up for e-mail filtering through your Internet access provider
or use an anti-spam program.
• Do not reply to spam for any reason.
• Surf the Web anonymously with a program through an
anonymous Web site.
SPYWARE AND ADWARE
• Spyware
• Spyware is a program placed on a computer without the
user’s knowledge that securely collects information about
the user.
• Some vendors or employers use spyware to collect
information about program usage or employees. Internet
advertising firms often collect information about user’s
Web browsing habits by hiding spyware in adware.
SPYWARE AND ADWARE
• Adware
• Adware is a program that displays an online advertisement
in a banner or pop-up window on Web pages, e-mail
messages or other Internet services.
• To remove spyware and adware, obtain a spyware and
adware remover that can detect spyware and adware.
Some operating systems and Web browsers include
spyware removers.
SPAM
• Spam is an unsolicited message or newsgroup posting sent
to multiple recipients or newsgroups at once.
• spam is an Internet junk mail.
• The content of spams range from selling a product
service, to promoting a business opportunity, to
advertising offensive material.
• One study indicates more than 92% of e-mail is spam.
SPAM
• Some spam reduction techniques:
• Use some e-mail programs that have built-pin settings that
allow users to delete spams automatically.
• Users can also sign up for e-mail filtering from their Internet
access provider.
• E-mail filtering is a service that blocks e-mail messages
from designated sources.
• Anti-spam programs are programs that attempt to remove
spams before it reaches to the user’s inbox.
• One disadvantage of e-mail filtering and anti-spam
programs is that sometimes they remove valid messages.
PHISHING, PHARMING &
CLICKJACKING
• Phishing
• Phishing is a scam in which a perpetrator sends an official looking
e-mail message that attempts to obtain your personal and financial
information.
• Some phishing e-mail message ask you to reply with your
information; others direct you to a phony Web site, or pop-up
window that looks like a Web site that collects the information.
• And If you receive an e-mail that looks legitimate and requests
you to update any of your private information, the FTC
recommends you visit the Web site directly to determine the
validity of the request. Never click a link in a e-mail message,
instead retype the Web address in you browser.
PHISHING, PHARMING &
CLICKJACKING
• phishing filter is a program that warns or blocks you from potentially
fraudulent or suspicious Web sites. Some Web browsers include
phishing filters.
•
• Pharming
• Pharming is a scam similar to phishing, where a perpetrator
attempts to obtain your personal an financial information, except
they do so via spoofing.
• That is, when you type a Web address on your browser, you are
redirected to a phony Web site that looks legitimate and then
requests your confidential information.
PHISHING, PHARMING &
CLICKJACKING
• Clickjacking
• Clickjacking is another similar scam, with clickjacking, an
object that can be clicked on a Web site such as button,
images or link that contains malicious program.
• When users click the disguised object, they may be
redirected to a phony Web site that requests personal
information, or a virus may download to their computer.
SOCIAL ENGINEERING
• Social Engineering
• Social engineering, as related to the use of computers, is
defined as gaining unauthorized access or obtaining
confidential information by taking advantage of the trusting
human nature of some victims and the naivety of others.
• Some social engineers trick their victims into revealing
confidential information such as user names and
passwords on the telephone, or on the Internet.
SOCIAL ENGINEERING
• Techniques they use include pretending to be an
administrator or other authoritative figure, feigning an
emergency situation or impersonation an acquaintance.
• Social engineers also obtain information from users who do
not destroy or conceal information properly.
• These perpetrator sift through company dumpsters, watch or
film people dialing telephone numbers or using TAM’s and
snoop around computers looking for openly displayed
confidential information.
PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS
CONCERNING PRIVACY)
DATE LAW PURPOSE
2006 Telephone Records and Privacy
Protection Act
Makes it illegal to use fraudulent means to
obtain someone’s telephone records.
2003 CAN-SPAM Act Gives law enforcement the right to impose
penalties on people using the Internet to
distribute spam.
2002 Sarbanes-Oxley Act Requires corporate officers, auditors and
attorneys of publicly traded companies to follow
strict financial report guidelines.
2001 Children’s Internet Protection Act
(CIPA)
Protects minors from inappropriate content when
accessing the Internet in schools and libraries.
2001 Provide Appropriate tools Required to
Intercept and Obstruct Terrorism
(PATRIOT) Act
Give law enforcement the right to monitor
people’s activities including Web and e-mail
habits.
PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS
CONCERNING PRIVACY)
DATE LAW PURPOSE
1999 Gramm-Lech-Bliley Act (GLBA) or
Financial Modernization Act
Protects consumers from disclosure o their
personal financial information and requires
institutions to alert consumers of information
disclosure policies.
1998 Digital Millennium Copyright Act
(DMCA)
Makes it illegal to circumvent anti-piracy
schemes on commercial software; outlaws
sales devices that copy software illegally.
1998 Children’s Online Privacy Protection
Act (COPPA)
Requires Web sites protect personal information
of children under 13 years old.
1997 No Electronic Theft (NET) Act Closes a narrow loophole in the law that allowed
people to give away copyrighted material such
as software on the Internet without legal
permission.
1996 Health Insurance Portability and
Accountability Act (HIPAA)
Protects individuals against the wrongful
disclosure of their health information.
PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS
CONCERNING PRIVACY)
DATE LAW PURPOSE
1996 National Information Infrastructure
Protection Act
Penalizes theft of information across state lines,
threats against networks and computer system
trespassing.
1994 Computer Abuse Amendments Act Amends 1984 act of outlaw transmission of
harmful computer code such as viruses.
1992 Cable Act Extends the privacy of the Cable
Communications Policy Act of 1984 to include
cellular and other wireless devices.
1991 Telephone Consumer Protection Act Restricts activities of telemarkets.
1988 Computer Matching and Privacy Act Regulates the use of government data to
determine the eligibility of individuals for federal
benefits.
PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS
CONCERNING PRIVACY)
DATE LAW PURPOSE
1988 Video Privacy Protection Act Forbids retailers from releasing or selling video-
rental records without customer consent or a
court order.
1986 Electronics Communications Privacy
Act (ECPA)
Provides the same right of privacy protection for
the postal delivery service and telephone
companies to the new forms of electronic
communications such as voice mail, e-mail and
cell phone.
1984 Cable Communications Policy Act Regulates disclosure of cable television
subscriber records.
1984 Computer Fraud and Abuse Act Outlaws unauthorized access of federal
government computers.
PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS
CONCERNING PRIVACY)
DATE LAW PURPOSE
1978 Right to Financial Privacy Act Strictly outlines the procedures federal agencies
must follow when looking a customer records in
banks.
1974 Privacy Act Forbids federal agencies from allowing
information to be used for a reason other than
that for which it was collected.
1974 Family Educational Rights and Privacy
Act
Gives students and parents access to school
records and limits disclosure of unauthorized
parties.
1970 Fair Credit Reporting Act Prohibits credit reporting agencies from
releasing credit information to unauthorized
people and allows consumers to review their
own credit records.
PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS
CONCERNING PRIVACY)
• Common points of the laws listed include the following:
• Information collected and stored about individuals should be
limited what is necessary to carry out the function of the
business or government agency collecting the data.
• Once collected, provisions should be made to restrict access
o the data to those employees within the organization who
need access to it to perform their job duties.
PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS
CONCERNING PRIVACY)
• Personal information should be released outside the
organization collecting the data only when the person has
agreed to its disclosure.
• When the information is collected about individual, the
individual should know that the data is being collected and
have the opportunity to determine the accuracy of the data.
EMPLOYEE MONITORING
• Employee monitoring involves the use of computers to
observe, record and review an employee’s use of a computer,
including communications such as e-mails, keyboard activity
(used to measure productivity) and Web site visited.
• Some employers use programs that easily allow them to
observe their employees. Further, it is legal for the employers to
use these programs.
CONTENT FILTERING
• Content Filtering is the process of restricting access to certain
material on the Web.
• This is due to the issues all around in Internet concerning
objectionable materials such as racist literature, violence
and obscene pictures that some believed that these have to
be banned and some believed that these material should be
filtered, that is, restricted.
• Content filtering opponents argue that banning nay materials
violates constitutional guarantees of free speech and
personal rights.
CONTENT FILTERING
• Web Filtering software is a program that restricts access to
specified Web sites.
• Some also filters sites that use specific words. Others allow
you to filter e-mail messages, chat rooms and programs.
• Many Internet security programs include a firewall, antivirus
program and filtering capabilities combined.
COMPUTER USAGE @ WORK
• National and Local Security
• Since 2001, the federal and local governments, businesses
and individuals have been implementing aggressive new
security measures because of the increased terrorist activity.
As a result, computers now assist these sectors in
maintaining and monitoring security.
• Advanced computer visions enable computers to monitor
indoor and outdoor areas that might be high in criminal
activity. One good example of this is the installation of
cameras in the problematic areas.
COMPUTER USAGE @ WORK
• Computers also use facial recognition to identify
individuals who do not belong in a particular area. For
example, one theme park in Florida, USA often takes a
pictures of individuals they escort out of and ban from the
park so that when the cameras installed in the most
strategic areas of the park found a match image of the
faces coming out of their cars and walks towards the
park from the banned people, the computer alerts an
officer and then investigates the situation.
• Computers also help the government in banning a person
who are not authorized to go out of the country by
restraining him/her from his/her flight.
COMPANIES ON THE CUTTING EDGE
• MCAFEE Intrusion Prevention Products Developer
• Founded by John McAfee in Santa Clara, California on 1987.
• McAfee protects more than 60 million consumers and
more than 100 million mobile devices.
• The McAfee Initiative to Fight Cybercrime is a global
effort to thwart security threats and criminal activity.
• In 2009, McAfee launched a new online backup capacity
that allows consumers to back up and encrypt their
important files such as documents, photos, music and e-
mail messages.
COMPANIES ON THE CUTTING EDGE
• SYMANTEC Computer Security Solutions Leader
• Was founded in 1982 and has offices in more than 40
countries. Its primary manufacturing facility is in Dublin,
Ireland.
• Created and developed a new security model that
created the latest versions of Norton AntiVirus and
Norton Internet Security.
• In 2009, Symantec released the latest version of it
Norton Internet Security Software. A rating service tested
level of protection provided by 10 different security
products ,and gave Norton Internet Security the only
perfect score.
TECHNOLOGY TRAILBLAZERS
• RICHARD STALLMAN Software Freedom Advocate
• an advocate of free software and campaigned against
software patents and copyright laws.
• Developed the concept of Copyleft, which gives each
person who has purchased a software product the ability
to copy, adapt and distribute the program as long as the
new software has the same lack of restrictions.
• Began the GNU/Linux Project in 1983 as an effort to
develop and use the concept of copyleft.
TECHNOLOGY TRAILBLAZERS
• RICHARD STALLMAN Software Freedom Advocate
• Also started the Free Software Foundation in 1985 to
promote free software for the GNU Project. The Free
Software Directory Catalogs more than 5,300 packages
that run on the Linux and GNU operating system.
TECHNOLOGY TRAILBLAZERS
• GENE SPAFFORD Computer Security Expert
• Known as Spaf.
• Recognized as one of the foremost experts in the computer
security, intelligence, cybercrime and software engineering
fields.
• Deconstructed and analyzed the 1988 Morris Worm,
considered the first computer worm distributed on the
Internet. His work led to the conviction of the Cornell
University student Robert Morris, the developer of the
Morris Worm.
TECHNOLOGY TRAILBLAZERS
• GENE SPAFFORD Computer Security Expert
• For 30 years, he has advised major corporations
including Microsoft, Intel and Unisys. The US Air
Force, the Federal Bureau of Investigation. And two
(2) US Presidents.
• Noted for several firsts in the computer security field
i.e., he defined the terms, software forensics and
firewall, wrote the first English-Language book on
the topics of viruses and malwares.
TECHNOLOGY TRAILBLAZERS
• GENE SPAFFORD Computer Security Expert
• Founded the world’s first multidisciplinary academic
security awareness group: the Center for
Education and Research in Information
Assurance and Security (CERIAS).
-END-
THANK YOU!
ERLY JOHN D. VALDEZ

More Related Content

What's hot

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 

What's hot (20)

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Hacking
HackingHacking
Hacking
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Spyware
SpywareSpyware
Spyware
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Network security
Network securityNetwork security
Network security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 

Viewers also liked

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qRamy Eltarras
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 

Viewers also liked (10)

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 

Similar to Computer security privacy and ethics

Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Computer Security and Safety, Ethics, and.pptx
Computer Security and Safety, Ethics, and.pptxComputer Security and Safety, Ethics, and.pptx
Computer Security and Safety, Ethics, and.pptxEigraEmliuqer
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 

Similar to Computer security privacy and ethics (20)

Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Computer Security and Safety, Ethics, and.pptx
Computer Security and Safety, Ethics, and.pptxComputer Security and Safety, Ethics, and.pptx
Computer Security and Safety, Ethics, and.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
E commerce
E commerce E commerce
E commerce
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
E commerce
E commerceE commerce
E commerce
 

Recently uploaded

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 

Recently uploaded (20)

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 

Computer security privacy and ethics

  • 1. COMPUTER SECURITY AND SAFETY, ETHICS AND PRIVACY
  • 2. TECHNIQUES ON HOW TO KEEP PERSONAL DATA PRIVATE • Fill only necessary information on rebate, warranty and registration forms. • Do not preprim your telephone number or Social Security number on personal checks. • If Caller ID is available in your area, find out how to block your number from displaying on the receiver system. • Do not write your telephone number on charge or credit receipts.
  • 3. TECHNIQUES ON HOW TO KEEP PERSONAL DATA PRIVATE • Ask merchants not to write credit numbers, telephone numbers, Social Security numbers and driver’s license numbers on the back of your personal checks. • Purchase goods with cash, rather than charge or credit receipts. • Avoid shopping club and buyer cards. • If merchants ask personal question, fin out why they want to know before releasing the information. • Inform merchants that you do not them to disturb your personal information. • Request, in writing, to be removed form mailing list.
  • 4. TECHNIQUES ON HOW TO KEEP PERSONAL DATA PRIVATE • Obtain your credit report once a year from each of the three (3) major credit reporting agencies and correct any errors. • Request a free copy of your medical records once a year from the Medical Information Bureau. • Limit the amount of information you provide to Web sites. Fill only required information. • Install a cookie manager to filter cookies. • Clear your history file when you are finished browsing. • Set up a free e-mail account. Use this e-mail address for merchant forms.
  • 5. TECHNIQUES ON HOW TO KEEP PERSONAL DATA PRIVATE • Turn off file and printer sharing on your Internet account. • Install a personal firewall. • Sign up for e-mail filtering through your Internet access provider or use an anti-spam program. • Do not reply to spam for any reason. • Surf the Web anonymously with a program through an anonymous Web site.
  • 6. SPYWARE AND ADWARE • Spyware • Spyware is a program placed on a computer without the user’s knowledge that securely collects information about the user. • Some vendors or employers use spyware to collect information about program usage or employees. Internet advertising firms often collect information about user’s Web browsing habits by hiding spyware in adware.
  • 7. SPYWARE AND ADWARE • Adware • Adware is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail messages or other Internet services. • To remove spyware and adware, obtain a spyware and adware remover that can detect spyware and adware. Some operating systems and Web browsers include spyware removers.
  • 8. SPAM • Spam is an unsolicited message or newsgroup posting sent to multiple recipients or newsgroups at once. • spam is an Internet junk mail. • The content of spams range from selling a product service, to promoting a business opportunity, to advertising offensive material. • One study indicates more than 92% of e-mail is spam.
  • 9. SPAM • Some spam reduction techniques: • Use some e-mail programs that have built-pin settings that allow users to delete spams automatically. • Users can also sign up for e-mail filtering from their Internet access provider. • E-mail filtering is a service that blocks e-mail messages from designated sources. • Anti-spam programs are programs that attempt to remove spams before it reaches to the user’s inbox. • One disadvantage of e-mail filtering and anti-spam programs is that sometimes they remove valid messages.
  • 10. PHISHING, PHARMING & CLICKJACKING • Phishing • Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information. • Some phishing e-mail message ask you to reply with your information; others direct you to a phony Web site, or pop-up window that looks like a Web site that collects the information. • And If you receive an e-mail that looks legitimate and requests you to update any of your private information, the FTC recommends you visit the Web site directly to determine the validity of the request. Never click a link in a e-mail message, instead retype the Web address in you browser.
  • 11. PHISHING, PHARMING & CLICKJACKING • phishing filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites. Some Web browsers include phishing filters. • • Pharming • Pharming is a scam similar to phishing, where a perpetrator attempts to obtain your personal an financial information, except they do so via spoofing. • That is, when you type a Web address on your browser, you are redirected to a phony Web site that looks legitimate and then requests your confidential information.
  • 12. PHISHING, PHARMING & CLICKJACKING • Clickjacking • Clickjacking is another similar scam, with clickjacking, an object that can be clicked on a Web site such as button, images or link that contains malicious program. • When users click the disguised object, they may be redirected to a phony Web site that requests personal information, or a virus may download to their computer.
  • 13. SOCIAL ENGINEERING • Social Engineering • Social engineering, as related to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. • Some social engineers trick their victims into revealing confidential information such as user names and passwords on the telephone, or on the Internet.
  • 14. SOCIAL ENGINEERING • Techniques they use include pretending to be an administrator or other authoritative figure, feigning an emergency situation or impersonation an acquaintance. • Social engineers also obtain information from users who do not destroy or conceal information properly. • These perpetrator sift through company dumpsters, watch or film people dialing telephone numbers or using TAM’s and snoop around computers looking for openly displayed confidential information.
  • 15. PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS CONCERNING PRIVACY) DATE LAW PURPOSE 2006 Telephone Records and Privacy Protection Act Makes it illegal to use fraudulent means to obtain someone’s telephone records. 2003 CAN-SPAM Act Gives law enforcement the right to impose penalties on people using the Internet to distribute spam. 2002 Sarbanes-Oxley Act Requires corporate officers, auditors and attorneys of publicly traded companies to follow strict financial report guidelines. 2001 Children’s Internet Protection Act (CIPA) Protects minors from inappropriate content when accessing the Internet in schools and libraries. 2001 Provide Appropriate tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act Give law enforcement the right to monitor people’s activities including Web and e-mail habits.
  • 16. PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS CONCERNING PRIVACY) DATE LAW PURPOSE 1999 Gramm-Lech-Bliley Act (GLBA) or Financial Modernization Act Protects consumers from disclosure o their personal financial information and requires institutions to alert consumers of information disclosure policies. 1998 Digital Millennium Copyright Act (DMCA) Makes it illegal to circumvent anti-piracy schemes on commercial software; outlaws sales devices that copy software illegally. 1998 Children’s Online Privacy Protection Act (COPPA) Requires Web sites protect personal information of children under 13 years old. 1997 No Electronic Theft (NET) Act Closes a narrow loophole in the law that allowed people to give away copyrighted material such as software on the Internet without legal permission. 1996 Health Insurance Portability and Accountability Act (HIPAA) Protects individuals against the wrongful disclosure of their health information.
  • 17. PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS CONCERNING PRIVACY) DATE LAW PURPOSE 1996 National Information Infrastructure Protection Act Penalizes theft of information across state lines, threats against networks and computer system trespassing. 1994 Computer Abuse Amendments Act Amends 1984 act of outlaw transmission of harmful computer code such as viruses. 1992 Cable Act Extends the privacy of the Cable Communications Policy Act of 1984 to include cellular and other wireless devices. 1991 Telephone Consumer Protection Act Restricts activities of telemarkets. 1988 Computer Matching and Privacy Act Regulates the use of government data to determine the eligibility of individuals for federal benefits.
  • 18. PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS CONCERNING PRIVACY) DATE LAW PURPOSE 1988 Video Privacy Protection Act Forbids retailers from releasing or selling video- rental records without customer consent or a court order. 1986 Electronics Communications Privacy Act (ECPA) Provides the same right of privacy protection for the postal delivery service and telephone companies to the new forms of electronic communications such as voice mail, e-mail and cell phone. 1984 Cable Communications Policy Act Regulates disclosure of cable television subscriber records. 1984 Computer Fraud and Abuse Act Outlaws unauthorized access of federal government computers.
  • 19. PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS CONCERNING PRIVACY) DATE LAW PURPOSE 1978 Right to Financial Privacy Act Strictly outlines the procedures federal agencies must follow when looking a customer records in banks. 1974 Privacy Act Forbids federal agencies from allowing information to be used for a reason other than that for which it was collected. 1974 Family Educational Rights and Privacy Act Gives students and parents access to school records and limits disclosure of unauthorized parties. 1970 Fair Credit Reporting Act Prohibits credit reporting agencies from releasing credit information to unauthorized people and allows consumers to review their own credit records.
  • 20. PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS CONCERNING PRIVACY) • Common points of the laws listed include the following: • Information collected and stored about individuals should be limited what is necessary to carry out the function of the business or government agency collecting the data. • Once collected, provisions should be made to restrict access o the data to those employees within the organization who need access to it to perform their job duties.
  • 21. PRIVACY LAWS (SUMMARY OF MAJOR US GOV’T LAWS CONCERNING PRIVACY) • Personal information should be released outside the organization collecting the data only when the person has agreed to its disclosure. • When the information is collected about individual, the individual should know that the data is being collected and have the opportunity to determine the accuracy of the data.
  • 22. EMPLOYEE MONITORING • Employee monitoring involves the use of computers to observe, record and review an employee’s use of a computer, including communications such as e-mails, keyboard activity (used to measure productivity) and Web site visited. • Some employers use programs that easily allow them to observe their employees. Further, it is legal for the employers to use these programs.
  • 23. CONTENT FILTERING • Content Filtering is the process of restricting access to certain material on the Web. • This is due to the issues all around in Internet concerning objectionable materials such as racist literature, violence and obscene pictures that some believed that these have to be banned and some believed that these material should be filtered, that is, restricted. • Content filtering opponents argue that banning nay materials violates constitutional guarantees of free speech and personal rights.
  • 24. CONTENT FILTERING • Web Filtering software is a program that restricts access to specified Web sites. • Some also filters sites that use specific words. Others allow you to filter e-mail messages, chat rooms and programs. • Many Internet security programs include a firewall, antivirus program and filtering capabilities combined.
  • 25. COMPUTER USAGE @ WORK • National and Local Security • Since 2001, the federal and local governments, businesses and individuals have been implementing aggressive new security measures because of the increased terrorist activity. As a result, computers now assist these sectors in maintaining and monitoring security. • Advanced computer visions enable computers to monitor indoor and outdoor areas that might be high in criminal activity. One good example of this is the installation of cameras in the problematic areas.
  • 26. COMPUTER USAGE @ WORK • Computers also use facial recognition to identify individuals who do not belong in a particular area. For example, one theme park in Florida, USA often takes a pictures of individuals they escort out of and ban from the park so that when the cameras installed in the most strategic areas of the park found a match image of the faces coming out of their cars and walks towards the park from the banned people, the computer alerts an officer and then investigates the situation. • Computers also help the government in banning a person who are not authorized to go out of the country by restraining him/her from his/her flight.
  • 27. COMPANIES ON THE CUTTING EDGE • MCAFEE Intrusion Prevention Products Developer • Founded by John McAfee in Santa Clara, California on 1987. • McAfee protects more than 60 million consumers and more than 100 million mobile devices. • The McAfee Initiative to Fight Cybercrime is a global effort to thwart security threats and criminal activity. • In 2009, McAfee launched a new online backup capacity that allows consumers to back up and encrypt their important files such as documents, photos, music and e- mail messages.
  • 28. COMPANIES ON THE CUTTING EDGE • SYMANTEC Computer Security Solutions Leader • Was founded in 1982 and has offices in more than 40 countries. Its primary manufacturing facility is in Dublin, Ireland. • Created and developed a new security model that created the latest versions of Norton AntiVirus and Norton Internet Security. • In 2009, Symantec released the latest version of it Norton Internet Security Software. A rating service tested level of protection provided by 10 different security products ,and gave Norton Internet Security the only perfect score.
  • 29. TECHNOLOGY TRAILBLAZERS • RICHARD STALLMAN Software Freedom Advocate • an advocate of free software and campaigned against software patents and copyright laws. • Developed the concept of Copyleft, which gives each person who has purchased a software product the ability to copy, adapt and distribute the program as long as the new software has the same lack of restrictions. • Began the GNU/Linux Project in 1983 as an effort to develop and use the concept of copyleft.
  • 30. TECHNOLOGY TRAILBLAZERS • RICHARD STALLMAN Software Freedom Advocate • Also started the Free Software Foundation in 1985 to promote free software for the GNU Project. The Free Software Directory Catalogs more than 5,300 packages that run on the Linux and GNU operating system.
  • 31. TECHNOLOGY TRAILBLAZERS • GENE SPAFFORD Computer Security Expert • Known as Spaf. • Recognized as one of the foremost experts in the computer security, intelligence, cybercrime and software engineering fields. • Deconstructed and analyzed the 1988 Morris Worm, considered the first computer worm distributed on the Internet. His work led to the conviction of the Cornell University student Robert Morris, the developer of the Morris Worm.
  • 32. TECHNOLOGY TRAILBLAZERS • GENE SPAFFORD Computer Security Expert • For 30 years, he has advised major corporations including Microsoft, Intel and Unisys. The US Air Force, the Federal Bureau of Investigation. And two (2) US Presidents. • Noted for several firsts in the computer security field i.e., he defined the terms, software forensics and firewall, wrote the first English-Language book on the topics of viruses and malwares.
  • 33. TECHNOLOGY TRAILBLAZERS • GENE SPAFFORD Computer Security Expert • Founded the world’s first multidisciplinary academic security awareness group: the Center for Education and Research in Information Assurance and Security (CERIAS).