SlideShare a Scribd company logo
COMPUTER SECURITY AND
SAFETY, ETHICS, AND
PRIVACY
PART II
INFORMATION PRIVACY
• Information Privacy refers to the right of individuals and
companies to deny or restrict the collection and use of
information about them.
• Some companies and individuals collect and use information
without your authorization.
INFORMATION PRIVACY
ELECTRONIC PROFILES
• When you fill out a form (magazine subscription, product
warranty registration, etc.) the merchant enters your data into a
database.
• Merchants then sell the contents of their databases to national
marketing firms and Internet advertising firms.
• Direct marketing supports say that using information in this
way lowers overall selling costs, thus product prices.
• Critics contend that the information reveals more about an
individual than anyone has a right to know.
COOKIES
A cookie is a small text file that a Web server stores on your
computer and can contain data about you, such as your user
name and viewing preferences. ◦ Personalized websites ◦
Remember login information ◦ Online shopping uses a session
cookie to keep track of the shopping cart for a limited time. ◦
How often users visit a site ◦ Targeted advertisements
SPAM
• Spam is an unsolicited e-mail message or newsgroup posting
sent to many recipients or newsgroups at once.
• It is Internet junk mail that ranges from selling a product,
promoting a business, and advertising offensive material.
• Spim is spam sent over an instant message.
• Spit is spam sent over VoIP.
SPAM
• Spam can be reduced using: ◦ E-mail filtering: a service that
blocks e-mail messages from designated sources and collects
them for viewing at a later time, if desired. ◦ Anti-spam
program: a program that attempts to remove spam before it
reaches your inbox.
• Disadvantage: Sometimes they remove valid e-mails.
PHISHING
• Phishing is a scam in which a perpetrator sends an official looking e-mail
message that attempts to obtain your personal and financial information.
• A phishing filter is a program that warns or blocks you from potentially
fraudulent or suspicious Web sites.
• Pharming is a scam, similar to phishing, where a perpetrator attempts to
obtain your personal financial information via spoofing.
• Clickjacking is another similar scam where a link on a website contains a
malicious program.
• ◦ Ex. Getting redirected to a phony Web site.
SPYWARE AND ADWARE
• Spyware is a program placed on a computer without the user’s
knowledge that secretly collects information about the user.
• Adware is a program that displays an online advertisement in a
banner or pop-up window on Web pages.
• A Web bug is hidden on Web pages or in email message in the
form of graphical images, which link to a cookie stored on the
hard disk
PRIVACY LAWS
• Information collected and stored should be limited to what is
necessary.
• Provisions should be made to restrict access to the data to
those employees within the organization.
• Personal information should be release outside the
organization only when the person agrees to its disclosure.
• Individuals should know that the data is being collected and
have opportunity to determine the accuracy
PRIVACY LAW
• One law with an apparent legal loophole is the 1970 Fair Credit
Reporting Act which limits the rights of others viewing a credit
report to only those with a legitimate business need.
• ◦ The problem is ‘legitimate business need’ is not defined,
causing anyone to claim a legitimate business need to gain
access to your credit report.
SOCIAL ENGINEERING
• Social engineering is defined as gaining unauthorized access
or obtaining confidential information by taking advantage of
the trusting human nature of some victims and the naivety of
others.
• Social engineers trick their victims into revealing confidential
information, such as usernames and passwords, under false
pretenses.
• Social engineers also obtain information from those who do not
destroy or conceal information properly.
EMPLOYEE MONITORING
• Employee monitoring involves the use of computers to observe,
record, and review an employee’s use of a computer, including
communications such as e-mail messages, keyboard activity,
and Web sites visited. ◦ It is legal for employers to use these
programs.
• One survey discovered that more than 73% of companies search
and/or read employee files, voice mail, e-mail, and Web
communication.
CONTENT FILTERING
• Content filtering is the process of restricting access to certain
material on the web.
• Many businesses use content filtering to limit employees’ Web
access.
• One approach is through a rating system from the Internet
Content Rating Association (ICRA), which is similar to those
used for movies and videos.
CONTENT FILTERING
• Major Web sites use the rating system from the ICRA.
• ◦ If a Web site goes beyond the rating limits set in the browser,
a user cannot access the site.
• Web filtering software is a program that restricts access to
specified Web sites.
• ◦ Some also filter sites that use specific words, and others
allow you to filter e-mail messages, chat rooms, and programs.

More Related Content

Similar to Computer Security and Safety, Ethics, and.pptx

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Data security
Data securityData security
Data security
Hitesh Kumar
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Phishing
PhishingPhishing
Phishing
Ajit Yadav
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
samina khan
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
Sogolytics
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dumindu Pahalawatta
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
Delmer Gerald Calderon
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
Sonia Kaul Takoo
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
annwhyjay
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
AnkushKumarSingh12
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 

Similar to Computer Security and Safety, Ethics, and.pptx (20)

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Data security
Data securityData security
Data security
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Phishing
PhishingPhishing
Phishing
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Computer Security and Safety, Ethics, and.pptx

  • 1. COMPUTER SECURITY AND SAFETY, ETHICS, AND PRIVACY PART II
  • 2. INFORMATION PRIVACY • Information Privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. • Some companies and individuals collect and use information without your authorization.
  • 4. ELECTRONIC PROFILES • When you fill out a form (magazine subscription, product warranty registration, etc.) the merchant enters your data into a database. • Merchants then sell the contents of their databases to national marketing firms and Internet advertising firms. • Direct marketing supports say that using information in this way lowers overall selling costs, thus product prices. • Critics contend that the information reveals more about an individual than anyone has a right to know.
  • 5. COOKIES A cookie is a small text file that a Web server stores on your computer and can contain data about you, such as your user name and viewing preferences. ◦ Personalized websites ◦ Remember login information ◦ Online shopping uses a session cookie to keep track of the shopping cart for a limited time. ◦ How often users visit a site ◦ Targeted advertisements
  • 6. SPAM • Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. • It is Internet junk mail that ranges from selling a product, promoting a business, and advertising offensive material. • Spim is spam sent over an instant message. • Spit is spam sent over VoIP.
  • 7. SPAM • Spam can be reduced using: ◦ E-mail filtering: a service that blocks e-mail messages from designated sources and collects them for viewing at a later time, if desired. ◦ Anti-spam program: a program that attempts to remove spam before it reaches your inbox. • Disadvantage: Sometimes they remove valid e-mails.
  • 8. PHISHING • Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information. • A phishing filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites. • Pharming is a scam, similar to phishing, where a perpetrator attempts to obtain your personal financial information via spoofing. • Clickjacking is another similar scam where a link on a website contains a malicious program. • ◦ Ex. Getting redirected to a phony Web site.
  • 9. SPYWARE AND ADWARE • Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user. • Adware is a program that displays an online advertisement in a banner or pop-up window on Web pages. • A Web bug is hidden on Web pages or in email message in the form of graphical images, which link to a cookie stored on the hard disk
  • 10. PRIVACY LAWS • Information collected and stored should be limited to what is necessary. • Provisions should be made to restrict access to the data to those employees within the organization. • Personal information should be release outside the organization only when the person agrees to its disclosure. • Individuals should know that the data is being collected and have opportunity to determine the accuracy
  • 11. PRIVACY LAW • One law with an apparent legal loophole is the 1970 Fair Credit Reporting Act which limits the rights of others viewing a credit report to only those with a legitimate business need. • ◦ The problem is ‘legitimate business need’ is not defined, causing anyone to claim a legitimate business need to gain access to your credit report.
  • 12. SOCIAL ENGINEERING • Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. • Social engineers trick their victims into revealing confidential information, such as usernames and passwords, under false pretenses. • Social engineers also obtain information from those who do not destroy or conceal information properly.
  • 13. EMPLOYEE MONITORING • Employee monitoring involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboard activity, and Web sites visited. ◦ It is legal for employers to use these programs. • One survey discovered that more than 73% of companies search and/or read employee files, voice mail, e-mail, and Web communication.
  • 14. CONTENT FILTERING • Content filtering is the process of restricting access to certain material on the web. • Many businesses use content filtering to limit employees’ Web access. • One approach is through a rating system from the Internet Content Rating Association (ICRA), which is similar to those used for movies and videos.
  • 15. CONTENT FILTERING • Major Web sites use the rating system from the ICRA. • ◦ If a Web site goes beyond the rating limits set in the browser, a user cannot access the site. • Web filtering software is a program that restricts access to specified Web sites. • ◦ Some also filter sites that use specific words, and others allow you to filter e-mail messages, chat rooms, and programs.