SlideShare a Scribd company logo
1 of 12
Download to read offline
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 1 / 12 File: lec12chap11f04.doc
General Items:
• Tests?
• Lab?
• Need to come to class
• Have a quiz / no books / use notes
• Challenge / 80 /
• Talk to me!
Reading Materials:
•
Miscellaneous:
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 2 / 12 File: lec12chap11f04.doc
The Internet
• Wide open to everyone with no central authority
• Carries many important information (private and proprietary)
• Potential risks:
- Interceptions
- Attacking sources
Security and Privacy
- What are they and why do we need them?
- What are the security risks and safeguards:
o Hardware
o Software
o Cybercrime – Online or Internet based illegal acts
o Access to unauthorized information
Computer Security Risks
-Defined as any action or event that can cause loss or damage to HW, SW,
Data, Information, or processing ability
- Examples of computer security risks:
o Malicious-logic programs – programs that act without the user’s
knowledge
- Computer virus, worm, Trojan horse
o Access Control
o Theft: HW, SW, Information, Data, etc.
Computer Viruses and other malicious-logic programs
- A piece of code (software) that affects normal computer operation
What are the most common things to be stolen in
our society?
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 3 / 12 File: lec12chap11f04.doc
o Could be harmless and just for fun! – altering the normal operation
of the computer
o Damaging the operating system (boot code)
o Damaging other existing programs
- Examples:
o Some are only a particular malicious logic
- Worms: Blaster, Sobig
o Some are all three types:
- Melissa
- Activation methods:
o Opening infected files, running an infected file, starting the
computer with an infected floppy
o Some viruses are harmless or even cute!
o There are more than 80,000 known viruses (last 20 years)
o A list of viruses are available on web pages: http://www.cert.org
Three basic virus types:
- Boot sector virus: executes when a software boots up
o Don’t use floppies to boot up your system!
- File virus: Attached to a program file and it is activated when the program
is run
- Macro virus: Uses a macro language of an application (spread sheet)
- They can be activated immediately or after some times
Why would anyone want to spend time to write a
computer virus???
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 4 / 12 File: lec12chap11f04.doc
Malicious-logic program types
- Virus: A hidden program that spreads itself throughout the computer or
from one system to another
o Damages files, system software, operating system
- Worm: Copies itself repeatedly in memory or hard drive and eventually
fills it; such as Code Red
- Trojan horse: Hides inside a legitimate program
o Does not replicate itself
o Often attached to email files
- Typical impacts include
o Abnormal display
o Loss of memory
o File corruptions
o Altering system property
Ways to protect computers against viruses:
- Use virus detector programs:
o Norton AntiVirus
o McAfee VirusScan
- Keep these programs up-to-date
- Basic operations:
o Detecting viruses based on their heading, file size, creation date
o They remove or quarantine the infected files
- Some viruses are not detectable:
o Stealth Virus (no change in file size)
o Polymorphic Virus (changes its program code!)
- Detecting virus hoax! – Chain letters!
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 5 / 12 File: lec12chap11f04.doc
Unauthorized access (computer risks)
- Use of computer or network without permission
o Hacker? Cracker?
o Steal information or they simply leave a message! I was here!
- Preventing unauthorized access:
o Access control: security measure to control who can access the
system
o A two-phase process:
Identification: Valid user
Authentication: verifies you are who you say you are!
There are four methods:
o
o Password: 6 characters; how many combinations? (2 Billions)
How long does it take you to figure it out? (700 years!)
o Possessed objects: Pin number, Card (ATM card), external devices
o Biometric devices: Authenticates person’s identity by verifying
personal characteristics
fingerprint scanner
• TruePrint Technology – looking at live-tissues (more
accurate fingerprinting scheme – Offered by Authen
Tech
Access Control
User name
/Password
Processed
Object
Biometric Call back
systems
Identification Authentication
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 6 / 12 File: lec12chap11f04.doc
• Brain Fingerprinting! –picking your brain for what you
now or can remember!
hand geometry system
voice recognition
face recognition
Iris recognition system (tiny blood vessels in your eyes)
o Callback system
Other computer security risks:
- Hardware theft: stealing computer equipments
o How can you protect your laptop? Any idea?
- Software theft:
o Software piracy: unauthorized and illegal duplication
o Many require license for operating the software
o $11 billion loss each year! -> Jail time and hefty fines!
- Information theft:
o Stealing personal identifications and information
o One of the most common things to be stolen!
o Means of protection:
Encryption techniques
o Encryption (scrambling) : process of converting readable data into
unrecognizable data
Need to know how to decrypt
Clipper chip – tamper-resistance personal computer
processor (except for the government!)
• encryption mechanism
• Yet, the custody of the private key!
o Allowing intercepting private communications by
government organizations
Is there a full proof computer security system?
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 7 / 12 File: lec12chap11f04.doc
Freedom Privacy and Security tool (leaves no ID!- no way
of tracking)
o There are two basic types of encryptions:
Private key encryption: Both the sender and the receiver
have the secret code to decrypt the data. The most popular
key encryption is the data encryption standard (DES)
Public key encryption: Uses public and private key
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 8 / 12 File: lec12chap11f04.doc
Computer safeguards:
- System failure protection: prolonged malfunction of a computer resulting
in loss of data, information, hardware damage, etc.
o Electrical disturbances in a single or network of computers
o Includes:
Noise: unwanted signal disturbing the normal operation. Not a
risk to the hardware.
Undervoltage: When voltage level drops (blackout – complete
power failure)
Overvoltage: Excessive power increase (spike – momentary
overvoltage) - Use surge protector.
- System backup: duplicating files.
o Backup media can be Zip disks, CD-RW, DVD-RW
o Three basic types:
Full: complete backup
Differential: Copying only files which have changed since the
last full backup
Incremental: Copying the most recent files which have
changed
- Disaster recovery plan: A written plan describing how to restore
computer operations in case of emergency failure. Contains four major
components:
o Emergency plan: describes immediate actions after the disaster
o Backup plan: How the computer uses backup files
o Recovery plan: Actions taken to restore full information processing
operation
o Test plan: simulating various levels of emergency cases
- Developing computer security plan: A written document summarizing all
computer safeguards to protect company’s information assets
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 9 / 12 File: lec12chap11f04.doc
Internet and network security
- Creating higher degree of security risks
- Some basic problems with the Internet: No central administrator,
everyone can have access to the information on the Internet
- So what are these security risks?
o Denial of service attacks: a user is denied access to network
services (Web page)
o Securing Internet transactions
Using public and private keys;
Encryptions – Secure site use security protocols: HTTPS
o Firewalls: Security system consisting or hardware or software that
prevents unauthorized access to the network
o Firewalls can be implemented in different ways:
Using a Proxy server: a server controlling all communications
Personal firewall: a software program detecting unauthorized
access to a personal computer on the network
o Audit trails
Uses a log to know who has been attempting to access
o Intrusion detection
Check the strange behavior of incoming messages and notify
the administrator
o Securing email messages: we can secure email using encryption
programs
Pretty Good Privacy (PGP) – download for free:
http://www.pgpi.org/
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 10 / 12 File: lec12chap11f04.doc
Information privacy
- Refers to the right of individuals and companies to deny or restrict the
collection and use of information about them – data privacy
- Similar technologies are used for web-casting and advertising:
o Cookies: A small file that the web server store on your computer
You can avoid it by changing your computer security level
Delete the ones you don’t want: search for COOKIES!
Remember some of the files are hidden: Open a folder ->
Tools -> Folder Options -> Viewing -> Hidden files
o Spam: Unsolicited e-mail message
Use email filtering http://www.cloudmark.com
o Spyware: collects information on your PC without your
knowledge.
It communicates these information with an outside source
Examples: Adware or Web bug (browsing habits!)
A software that is free may contain one of these utilities
- Privacy laws: Laws regarding storing and disclosure of personal data
o There is a long list of ACTs passed by the congress
Video Privacy Protection Act (forbids retailer from revealing
or selling video-rental without the consumer consent or court
order
Cable Communications Policy Act (regulating the disclosure
of TV subscriber record)
Then came the PATRIOT ACT – The law enforcement have
the right to monitor people’s activities
- Keyboard tracking
- Tracking your cell phones, emails, web activities
- Book records
o What is the problem?
We still don’t know what to do with the telemarketers
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 11 / 12 File: lec12chap11f04.doc
Cookies and Spam are considered as freedom of expression
What to do in libraries: Add web filter software or not?
- Rating system – specific users with passwords cannot
access certain materials
- Simply block everyone!
Stop companies from selling your private information to
others
o Monitoring Employees
73 percent of companies search and/or read employee files,
emails, voice mail, web connections, etc.
Computer Vision Lab in Florida is developing a visual
tracking device to follow employees around the office:
- “You can tell if someone is just drinking coffee all the
time and not working,"
Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004
F.Farahmand 12 / 12 File: lec12chap11f04.doc
Computers and heals risks
• Repetitive Strain Injury – Injury or disorder of the muscles, nerves,
joints, and tendons
o Largest job-related injury in the United States
o Examples:
Tendonitis: inflammation of a tendon due to repeated motion
or stress on the tendon
Carpal Tunnel Syndrome: Inflammation of nerves connected
to the forearm to the pals of the wrist
Computer vision syndrome: Having sore, tired, burning,
itching eyes
Computer addiction! Don’t chat too much!
• Green Computing:
o Energy Star: Guide lines for reducing the electricity and
environmental waste while using computers
Recycling problem: 500 million computers are estimated to be
obsolete by 2007!
We MUST reduce wasting resources!

More Related Content

Viewers also liked

cert coop pract feb 2016
cert coop pract feb 2016cert coop pract feb 2016
cert coop pract feb 2016John Patch
 
Linda Frenza letter of recommendation
Linda Frenza letter of  recommendationLinda Frenza letter of  recommendation
Linda Frenza letter of recommendationToni Litke
 
Summer Dreamers 'How To..' 2014
Summer Dreamers 'How To..' 2014Summer Dreamers 'How To..' 2014
Summer Dreamers 'How To..' 2014Benjamin Dames
 
Modalidades de la educación
Modalidades de la educaciónModalidades de la educación
Modalidades de la educaciónCitlalli Becerril
 
Manejo de word (temario)
Manejo de word (temario)Manejo de word (temario)
Manejo de word (temario)Elvis shagñay
 
4.1 receiving intake reports
4.1 receiving intake reports4.1 receiving intake reports
4.1 receiving intake reportsscreaminc
 
3.11 termination of parental rights (tpr)
3.11 termination of parental rights (tpr)3.11 termination of parental rights (tpr)
3.11 termination of parental rights (tpr)screaminc
 
الوسائل السلمية لتسوية المنازعات الدولية
الوسائل السلمية لتسوية المنازعات الدوليةالوسائل السلمية لتسوية المنازعات الدولية
الوسائل السلمية لتسوية المنازعات الدوليةDr-Suzan Ghonim
 

Viewers also liked (11)

cert coop pract feb 2016
cert coop pract feb 2016cert coop pract feb 2016
cert coop pract feb 2016
 
Linda Frenza letter of recommendation
Linda Frenza letter of  recommendationLinda Frenza letter of  recommendation
Linda Frenza letter of recommendation
 
Summer Dreamers 'How To..' 2014
Summer Dreamers 'How To..' 2014Summer Dreamers 'How To..' 2014
Summer Dreamers 'How To..' 2014
 
Law Review Note
Law Review NoteLaw Review Note
Law Review Note
 
Modalidades de la educación
Modalidades de la educaciónModalidades de la educación
Modalidades de la educación
 
Manejo de word (temario)
Manejo de word (temario)Manejo de word (temario)
Manejo de word (temario)
 
4.1 receiving intake reports
4.1 receiving intake reports4.1 receiving intake reports
4.1 receiving intake reports
 
React 2 trial
React 2 trialReact 2 trial
React 2 trial
 
3.11 termination of parental rights (tpr)
3.11 termination of parental rights (tpr)3.11 termination of parental rights (tpr)
3.11 termination of parental rights (tpr)
 
Spinal shock
Spinal shockSpinal shock
Spinal shock
 
الوسائل السلمية لتسوية المنازعات الدولية
الوسائل السلمية لتسوية المنازعات الدوليةالوسائل السلمية لتسوية المنازعات الدولية
الوسائل السلمية لتسوية المنازعات الدولية
 

Similar to Lec12chap11f04

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crimeangbeelee
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Michelle K Webster: Malware - Cryptolocker Research Final
Michelle K Webster:  Malware - Cryptolocker Research FinalMichelle K Webster:  Malware - Cryptolocker Research Final
Michelle K Webster: Malware - Cryptolocker Research FinalM.K. Webster
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Cyber attacks 101
Cyber attacks 101Cyber attacks 101
Cyber attacks 101Rafel Ivgi
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 

Similar to Lec12chap11f04 (20)

Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Notacd02
Notacd02Notacd02
Notacd02
 
Michelle K Webster: Malware - Cryptolocker Research Final
Michelle K Webster:  Malware - Cryptolocker Research FinalMichelle K Webster:  Malware - Cryptolocker Research Final
Michelle K Webster: Malware - Cryptolocker Research Final
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Cyber attacks 101
Cyber attacks 101Cyber attacks 101
Cyber attacks 101
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from screaminc

07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...screaminc
 
Certori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedCertori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedscreaminc
 
Georgia court improvement project (cip)
Georgia court improvement project (cip)Georgia court improvement project (cip)
Georgia court improvement project (cip)screaminc
 
Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)screaminc
 
Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)screaminc
 
Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)screaminc
 
Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14screaminc
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-twoscreaminc
 
Appealpowerpoint by darice goode
Appealpowerpoint   by darice goodeAppealpowerpoint   by darice goode
Appealpowerpoint by darice goodescreaminc
 
Juvenile code revised ---hb 242
Juvenile code revised ---hb 242Juvenile code revised ---hb 242
Juvenile code revised ---hb 242screaminc
 
Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5screaminc
 
Appealpowerpoint
AppealpowerpointAppealpowerpoint
Appealpowerpointscreaminc
 
Uniform juvenile court rules 01 22-13
Uniform juvenile court rules   01 22-13Uniform juvenile court rules   01 22-13
Uniform juvenile court rules 01 22-13screaminc
 
March 2015 appeal--s14a1703
March 2015 appeal--s14a1703March 2015 appeal--s14a1703
March 2015 appeal--s14a1703screaminc
 
Deprivation rules 2014
Deprivation rules 2014Deprivation rules 2014
Deprivation rules 2014screaminc
 
How to file motion for new trial 07142015
How to file motion for new trial 07142015How to file motion for new trial 07142015
How to file motion for new trial 07142015screaminc
 
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101screaminc
 
Np v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestNp v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestscreaminc
 
Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5screaminc
 
Cps 36 open records request
Cps 36 open records requestCps 36 open records request
Cps 36 open records requestscreaminc
 

More from screaminc (20)

07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...07052015 when the empirical base crumbles- the myth that open dependency proc...
07052015 when the empirical base crumbles- the myth that open dependency proc...
 
Certori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitionedCertori of lower court example of format bring rissler petitioned
Certori of lower court example of format bring rissler petitioned
 
Georgia court improvement project (cip)
Georgia court improvement project (cip)Georgia court improvement project (cip)
Georgia court improvement project (cip)
 
Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)Juvenile justice delinquency prevention and treatment programs rfp (3)
Juvenile justice delinquency prevention and treatment programs rfp (3)
 
Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)Civil discovery (section 9 11-37)
Civil discovery (section 9 11-37)
 
Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)Amended+motion+for+new+trial+(pdf)
Amended+motion+for+new+trial+(pdf)
 
Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14Motion for new trial -clu 12-19_14_no_51_14
Motion for new trial -clu 12-19_14_no_51_14
 
Amicus brief-draft-two
Amicus brief-draft-twoAmicus brief-draft-two
Amicus brief-draft-two
 
Appealpowerpoint by darice goode
Appealpowerpoint   by darice goodeAppealpowerpoint   by darice goode
Appealpowerpoint by darice goode
 
Juvenile code revised ---hb 242
Juvenile code revised ---hb 242Juvenile code revised ---hb 242
Juvenile code revised ---hb 242
 
Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5Extending foster care_policy_toolkit_5
Extending foster care_policy_toolkit_5
 
Appealpowerpoint
AppealpowerpointAppealpowerpoint
Appealpowerpoint
 
Uniform juvenile court rules 01 22-13
Uniform juvenile court rules   01 22-13Uniform juvenile court rules   01 22-13
Uniform juvenile court rules 01 22-13
 
March 2015 appeal--s14a1703
March 2015 appeal--s14a1703March 2015 appeal--s14a1703
March 2015 appeal--s14a1703
 
Deprivation rules 2014
Deprivation rules 2014Deprivation rules 2014
Deprivation rules 2014
 
How to file motion for new trial 07142015
How to file motion for new trial 07142015How to file motion for new trial 07142015
How to file motion for new trial 07142015
 
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
Narcissistic personality disorder and the dsm–v --miller widigercampbell20101
 
Np v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interestNp v state_of_georgia_usa_statement_of_interest
Np v state_of_georgia_usa_statement_of_interest
 
Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5Changes from dsm iv-tr to dsm-5
Changes from dsm iv-tr to dsm-5
 
Cps 36 open records request
Cps 36 open records requestCps 36 open records request
Cps 36 open records request
 

Recently uploaded

NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...Amil baba
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Pooja Nehwal
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...tanu pandey
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...Pooja Nehwal
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Naicy mandal
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...Pooja Nehwal
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证wpkuukw
 
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7shivanni mehta
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...amitlee9823
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 

Recently uploaded (20)

NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Hauz Quazi  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Hauz Quazi (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Th...
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
Escorts Service Daryaganj - 9899900591 College Girls & Models 24/7
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Ashok Nagar  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Ashok Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 

Lec12chap11f04

  • 1. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 1 / 12 File: lec12chap11f04.doc General Items: • Tests? • Lab? • Need to come to class • Have a quiz / no books / use notes • Challenge / 80 / • Talk to me! Reading Materials: • Miscellaneous:
  • 2. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 2 / 12 File: lec12chap11f04.doc The Internet • Wide open to everyone with no central authority • Carries many important information (private and proprietary) • Potential risks: - Interceptions - Attacking sources Security and Privacy - What are they and why do we need them? - What are the security risks and safeguards: o Hardware o Software o Cybercrime – Online or Internet based illegal acts o Access to unauthorized information Computer Security Risks -Defined as any action or event that can cause loss or damage to HW, SW, Data, Information, or processing ability - Examples of computer security risks: o Malicious-logic programs – programs that act without the user’s knowledge - Computer virus, worm, Trojan horse o Access Control o Theft: HW, SW, Information, Data, etc. Computer Viruses and other malicious-logic programs - A piece of code (software) that affects normal computer operation What are the most common things to be stolen in our society?
  • 3. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 3 / 12 File: lec12chap11f04.doc o Could be harmless and just for fun! – altering the normal operation of the computer o Damaging the operating system (boot code) o Damaging other existing programs - Examples: o Some are only a particular malicious logic - Worms: Blaster, Sobig o Some are all three types: - Melissa - Activation methods: o Opening infected files, running an infected file, starting the computer with an infected floppy o Some viruses are harmless or even cute! o There are more than 80,000 known viruses (last 20 years) o A list of viruses are available on web pages: http://www.cert.org Three basic virus types: - Boot sector virus: executes when a software boots up o Don’t use floppies to boot up your system! - File virus: Attached to a program file and it is activated when the program is run - Macro virus: Uses a macro language of an application (spread sheet) - They can be activated immediately or after some times Why would anyone want to spend time to write a computer virus???
  • 4. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 4 / 12 File: lec12chap11f04.doc Malicious-logic program types - Virus: A hidden program that spreads itself throughout the computer or from one system to another o Damages files, system software, operating system - Worm: Copies itself repeatedly in memory or hard drive and eventually fills it; such as Code Red - Trojan horse: Hides inside a legitimate program o Does not replicate itself o Often attached to email files - Typical impacts include o Abnormal display o Loss of memory o File corruptions o Altering system property Ways to protect computers against viruses: - Use virus detector programs: o Norton AntiVirus o McAfee VirusScan - Keep these programs up-to-date - Basic operations: o Detecting viruses based on their heading, file size, creation date o They remove or quarantine the infected files - Some viruses are not detectable: o Stealth Virus (no change in file size) o Polymorphic Virus (changes its program code!) - Detecting virus hoax! – Chain letters!
  • 5. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 5 / 12 File: lec12chap11f04.doc Unauthorized access (computer risks) - Use of computer or network without permission o Hacker? Cracker? o Steal information or they simply leave a message! I was here! - Preventing unauthorized access: o Access control: security measure to control who can access the system o A two-phase process: Identification: Valid user Authentication: verifies you are who you say you are! There are four methods: o o Password: 6 characters; how many combinations? (2 Billions) How long does it take you to figure it out? (700 years!) o Possessed objects: Pin number, Card (ATM card), external devices o Biometric devices: Authenticates person’s identity by verifying personal characteristics fingerprint scanner • TruePrint Technology – looking at live-tissues (more accurate fingerprinting scheme – Offered by Authen Tech Access Control User name /Password Processed Object Biometric Call back systems Identification Authentication
  • 6. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 6 / 12 File: lec12chap11f04.doc • Brain Fingerprinting! –picking your brain for what you now or can remember! hand geometry system voice recognition face recognition Iris recognition system (tiny blood vessels in your eyes) o Callback system Other computer security risks: - Hardware theft: stealing computer equipments o How can you protect your laptop? Any idea? - Software theft: o Software piracy: unauthorized and illegal duplication o Many require license for operating the software o $11 billion loss each year! -> Jail time and hefty fines! - Information theft: o Stealing personal identifications and information o One of the most common things to be stolen! o Means of protection: Encryption techniques o Encryption (scrambling) : process of converting readable data into unrecognizable data Need to know how to decrypt Clipper chip – tamper-resistance personal computer processor (except for the government!) • encryption mechanism • Yet, the custody of the private key! o Allowing intercepting private communications by government organizations Is there a full proof computer security system?
  • 7. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 7 / 12 File: lec12chap11f04.doc Freedom Privacy and Security tool (leaves no ID!- no way of tracking) o There are two basic types of encryptions: Private key encryption: Both the sender and the receiver have the secret code to decrypt the data. The most popular key encryption is the data encryption standard (DES) Public key encryption: Uses public and private key
  • 8. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 8 / 12 File: lec12chap11f04.doc Computer safeguards: - System failure protection: prolonged malfunction of a computer resulting in loss of data, information, hardware damage, etc. o Electrical disturbances in a single or network of computers o Includes: Noise: unwanted signal disturbing the normal operation. Not a risk to the hardware. Undervoltage: When voltage level drops (blackout – complete power failure) Overvoltage: Excessive power increase (spike – momentary overvoltage) - Use surge protector. - System backup: duplicating files. o Backup media can be Zip disks, CD-RW, DVD-RW o Three basic types: Full: complete backup Differential: Copying only files which have changed since the last full backup Incremental: Copying the most recent files which have changed - Disaster recovery plan: A written plan describing how to restore computer operations in case of emergency failure. Contains four major components: o Emergency plan: describes immediate actions after the disaster o Backup plan: How the computer uses backup files o Recovery plan: Actions taken to restore full information processing operation o Test plan: simulating various levels of emergency cases - Developing computer security plan: A written document summarizing all computer safeguards to protect company’s information assets
  • 9. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 9 / 12 File: lec12chap11f04.doc Internet and network security - Creating higher degree of security risks - Some basic problems with the Internet: No central administrator, everyone can have access to the information on the Internet - So what are these security risks? o Denial of service attacks: a user is denied access to network services (Web page) o Securing Internet transactions Using public and private keys; Encryptions – Secure site use security protocols: HTTPS o Firewalls: Security system consisting or hardware or software that prevents unauthorized access to the network o Firewalls can be implemented in different ways: Using a Proxy server: a server controlling all communications Personal firewall: a software program detecting unauthorized access to a personal computer on the network o Audit trails Uses a log to know who has been attempting to access o Intrusion detection Check the strange behavior of incoming messages and notify the administrator o Securing email messages: we can secure email using encryption programs Pretty Good Privacy (PGP) – download for free: http://www.pgpi.org/
  • 10. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 10 / 12 File: lec12chap11f04.doc Information privacy - Refers to the right of individuals and companies to deny or restrict the collection and use of information about them – data privacy - Similar technologies are used for web-casting and advertising: o Cookies: A small file that the web server store on your computer You can avoid it by changing your computer security level Delete the ones you don’t want: search for COOKIES! Remember some of the files are hidden: Open a folder -> Tools -> Folder Options -> Viewing -> Hidden files o Spam: Unsolicited e-mail message Use email filtering http://www.cloudmark.com o Spyware: collects information on your PC without your knowledge. It communicates these information with an outside source Examples: Adware or Web bug (browsing habits!) A software that is free may contain one of these utilities - Privacy laws: Laws regarding storing and disclosure of personal data o There is a long list of ACTs passed by the congress Video Privacy Protection Act (forbids retailer from revealing or selling video-rental without the consumer consent or court order Cable Communications Policy Act (regulating the disclosure of TV subscriber record) Then came the PATRIOT ACT – The law enforcement have the right to monitor people’s activities - Keyboard tracking - Tracking your cell phones, emails, web activities - Book records o What is the problem? We still don’t know what to do with the telemarketers
  • 11. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 11 / 12 File: lec12chap11f04.doc Cookies and Spam are considered as freedom of expression What to do in libraries: Add web filter software or not? - Rating system – specific users with passwords cannot access certain materials - Simply block everyone! Stop companies from selling your private information to others o Monitoring Employees 73 percent of companies search and/or read employee files, emails, voice mail, web connections, etc. Computer Vision Lab in Florida is developing a visual tracking device to follow employees around the office: - “You can tell if someone is just drinking coffee all the time and not working,"
  • 12. Lecture 16 / Chapter 12 COSC1300/ITSC 1401/BCIS 1405 11/8/2004 F.Farahmand 12 / 12 File: lec12chap11f04.doc Computers and heals risks • Repetitive Strain Injury – Injury or disorder of the muscles, nerves, joints, and tendons o Largest job-related injury in the United States o Examples: Tendonitis: inflammation of a tendon due to repeated motion or stress on the tendon Carpal Tunnel Syndrome: Inflammation of nerves connected to the forearm to the pals of the wrist Computer vision syndrome: Having sore, tired, burning, itching eyes Computer addiction! Don’t chat too much! • Green Computing: o Energy Star: Guide lines for reducing the electricity and environmental waste while using computers Recycling problem: 500 million computers are estimated to be obsolete by 2007! We MUST reduce wasting resources!