SlideShare a Scribd company logo
1 of 18
Download to read offline
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not
authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Computing
Essentials 2014
Privacy, Security,
and Ethics
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Competencies (Page 1 of 3)
▪Identify the most significant concerns for
effective implementation of computer
technology.
▪Discuss the primary privacy issues of accuracy,
property, and access.
▪Describe the impact of large databases, private
networks, the Internet, and the Web on privacy.
▪Discuss online identity and major laws on
privacy.
2
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Competencies (Page 2 of 3)
▪Discuss cybercrimes including creation of
malicious programs such as viruses, worms,
Trojan horse, and zombies as well as denial of
service attacks, Internet scams, social
networking risks, cyberbullying, rogue Wi-Fi
hotspots, theft, and data manipulation.
▪Detail ways to protect computer security
including restricting access, encrypting data,
anticipating disasters, and preventing data
loss.
3
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Competencies (Page 3 of 3)
▪Discuss computer ethics including
copyright law, software piracy, digital rights
management , the Digital Millennium
Copyright Act, as well as plagiarism and
ways to identify plagiarism.
4
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction
▪The ubiquitous use of computers and
technology prompts some very important
questions about the use of personal data
and our right to privacy.
▪This chapter covers issues
related to the impact of
technology on people and
how to protect ourselves
on the Web.
5
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
People
▪ Privacy – What are the threats to personal privacy
and how can we protect ourselves?
▪ Security – How can access to sensitive information
be controlled and how can we secure hardware and
software?
▪ Ethics – How do the actions of individual users and
companies affect society?
6
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Privacy
▪Privacy – concerns the collection and use
of data about individuals
▪Three primary privacy issues:
▪Accuracy
▪Property
▪Access
7
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Large Databases (Page 1 of 2)
▪ Large organizations
compile information
about us.
▪ Federal government
has over 2,000
databases
▪ Telephone companies
▪ Reverse directory
lists of calls we
make
▪ Supermarkets
▪ What we buy and
when
8
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Large Databases (Page 2 of 2)
▪ Information resellers or information brokers
▪ Collect and sell personal data
▪ Electronic profiles easily created
▪ Personal information is a marketable commodity,
which raises many issues:
▪ Collecting public, but personally identifying
information (e.g., Google’s Street View)
▪ Spreading information without personal
consent, leading to identity theft
▪ Spreading inaccurate information
▪ Mistaken identity
▪ Freedom of Information Act
9
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Private Networks
▪Employers can monitor e-mail legally
▪75 percent of all businesses search
employees’ electronic mail and
computer files using snoopware
▪A proposed law could
prohibit this type of
electronic monitoring
or at least require the
employer to notify
the employee first
10
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Viewing and Blocking Cookies
▪Cookies
▪Small pieces of information
that are deposited on your
hard disk from web sites you
have visited
▪ First-party cookies
▪ Third-party cookies
11
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Online Identity
▪The information that people voluntarily post
about themselves online
▪Archiving and search features of the Web
make it available indefinitely
▪Major Laws on Privacy
▪Gramm-Leach-Bliley Act
▪Health Insurance Portability and
Accountability Act (HIPAA)
▪Family Educational Rights and Privacy Act
(FERPA)
12
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Security
▪Cybercrime or computer crime is any
offense that involves a computer and a
network
▪Hackers
▪Gain unauthorized access
13
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Computer Crime (Page 1 of 3)
▪Malicious Programs - Malware
▪Viruses
▪Worms
▪Trojan horse
▪Zombies
▪Denial of Service
▪(DoS) attack
14
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Computer Crime (Page 2 of 3)
▪Internet scams
▪Phishing
15
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Computer Crime (Page 3 of 3)
▪Social networking risks
▪Cyber-bullying
▪Rogue Wi-Fi hotspots
▪Theft
▪Data manipulation
▪Computer Fraud
and Abuse Act
16
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ethics
▪Standards of moral conduct
▪Copyright
▪Gives content creators the right to control
the use and distribution of their work
▪Paintings, books, music, films, video games
▪Software piracy
▪Unauthorized copying and distribution
▪Digital Millennium Copyright Act
▪Digital rights management (DRM)
▪Plagiarism
19
Computing Essentials 2014
Privacy, Security and Ethics
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
24
End of Module

More Related Content

Similar to Module#7 Privacy Security and Ethics.pdf

ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxAliffDarfriz
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Lecture 8- information technology slides
Lecture 8- information technology slidesLecture 8- information technology slides
Lecture 8- information technology slidesAiman Niazi
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
ELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptx
ELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptxELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptx
ELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptxramkesavan9
 
Digital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptxDigital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptxkhalifaAlMarzooqi3
 
Mc g h g&l chap006
Mc g h g&l chap006Mc g h g&l chap006
Mc g h g&l chap006kpatric
 
© 2014 by McGraw-Hill Education. This is proprietary material .docx
© 2014 by McGraw-Hill Education. This is proprietary material .docx© 2014 by McGraw-Hill Education. This is proprietary material .docx
© 2014 by McGraw-Hill Education. This is proprietary material .docxgerardkortney
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Micro ch01-ten principles of economics 6e(2012)
Micro ch01-ten principles of economics 6e(2012)Micro ch01-ten principles of economics 6e(2012)
Micro ch01-ten principles of economics 6e(2012)YusufMuhammad76
 
Marketing 410 chapter 2
Marketing 410 chapter 2Marketing 410 chapter 2
Marketing 410 chapter 2ZnoubAlQ
 
BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10Janice Robinson
 

Similar to Module#7 Privacy Security and Ethics.pdf (20)

ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptx
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
Elet5e ch03
Elet5e ch03Elet5e ch03
Elet5e ch03
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Lecture 8- information technology slides
Lecture 8- information technology slidesLecture 8- information technology slides
Lecture 8- information technology slides
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
ELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptx
ELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptxELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptx
ELECTRONIC CHANNELS OF DISTRIBUTION -ROSENBERG.pptx
 
Digital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptxDigital Forensics_Lecture.pptx
Digital Forensics_Lecture.pptx
 
Mc g h g&l chap006
Mc g h g&l chap006Mc g h g&l chap006
Mc g h g&l chap006
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Whitman_Ch11.pptx
Whitman_Ch11.pptxWhitman_Ch11.pptx
Whitman_Ch11.pptx
 
Chapter 01.ppt
Chapter 01.pptChapter 01.ppt
Chapter 01.ppt
 
19BE_Lecture_6.pdf
19BE_Lecture_6.pdf19BE_Lecture_6.pdf
19BE_Lecture_6.pdf
 
© 2014 by McGraw-Hill Education. This is proprietary material .docx
© 2014 by McGraw-Hill Education. This is proprietary material .docx© 2014 by McGraw-Hill Education. This is proprietary material .docx
© 2014 by McGraw-Hill Education. This is proprietary material .docx
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Micro ch01-ten principles of economics 6e(2012)
Micro ch01-ten principles of economics 6e(2012)Micro ch01-ten principles of economics 6e(2012)
Micro ch01-ten principles of economics 6e(2012)
 
Marketing 410 chapter 2
Marketing 410 chapter 2Marketing 410 chapter 2
Marketing 410 chapter 2
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
 
BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10BSAD 372 SPRING 2017 CH 10
BSAD 372 SPRING 2017 CH 10
 
Lecture 5.pptx
Lecture 5.pptxLecture 5.pptx
Lecture 5.pptx
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Module#7 Privacy Security and Ethics.pdf

  • 1. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computing Essentials 2014 Privacy, Security, and Ethics
  • 2. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Competencies (Page 1 of 3) ▪Identify the most significant concerns for effective implementation of computer technology. ▪Discuss the primary privacy issues of accuracy, property, and access. ▪Describe the impact of large databases, private networks, the Internet, and the Web on privacy. ▪Discuss online identity and major laws on privacy. 2
  • 3. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Competencies (Page 2 of 3) ▪Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan horse, and zombies as well as denial of service attacks, Internet scams, social networking risks, cyberbullying, rogue Wi-Fi hotspots, theft, and data manipulation. ▪Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss. 3
  • 4. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Competencies (Page 3 of 3) ▪Discuss computer ethics including copyright law, software piracy, digital rights management , the Digital Millennium Copyright Act, as well as plagiarism and ways to identify plagiarism. 4
  • 5. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Introduction ▪The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy. ▪This chapter covers issues related to the impact of technology on people and how to protect ourselves on the Web. 5
  • 6. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. People ▪ Privacy – What are the threats to personal privacy and how can we protect ourselves? ▪ Security – How can access to sensitive information be controlled and how can we secure hardware and software? ▪ Ethics – How do the actions of individual users and companies affect society? 6
  • 7. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Privacy ▪Privacy – concerns the collection and use of data about individuals ▪Three primary privacy issues: ▪Accuracy ▪Property ▪Access 7
  • 8. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Large Databases (Page 1 of 2) ▪ Large organizations compile information about us. ▪ Federal government has over 2,000 databases ▪ Telephone companies ▪ Reverse directory lists of calls we make ▪ Supermarkets ▪ What we buy and when 8
  • 9. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Large Databases (Page 2 of 2) ▪ Information resellers or information brokers ▪ Collect and sell personal data ▪ Electronic profiles easily created ▪ Personal information is a marketable commodity, which raises many issues: ▪ Collecting public, but personally identifying information (e.g., Google’s Street View) ▪ Spreading information without personal consent, leading to identity theft ▪ Spreading inaccurate information ▪ Mistaken identity ▪ Freedom of Information Act 9
  • 10. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Private Networks ▪Employers can monitor e-mail legally ▪75 percent of all businesses search employees’ electronic mail and computer files using snoopware ▪A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first 10
  • 11. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Viewing and Blocking Cookies ▪Cookies ▪Small pieces of information that are deposited on your hard disk from web sites you have visited ▪ First-party cookies ▪ Third-party cookies 11
  • 12. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Online Identity ▪The information that people voluntarily post about themselves online ▪Archiving and search features of the Web make it available indefinitely ▪Major Laws on Privacy ▪Gramm-Leach-Bliley Act ▪Health Insurance Portability and Accountability Act (HIPAA) ▪Family Educational Rights and Privacy Act (FERPA) 12
  • 13. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Security ▪Cybercrime or computer crime is any offense that involves a computer and a network ▪Hackers ▪Gain unauthorized access 13
  • 14. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computer Crime (Page 1 of 3) ▪Malicious Programs - Malware ▪Viruses ▪Worms ▪Trojan horse ▪Zombies ▪Denial of Service ▪(DoS) attack 14
  • 15. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computer Crime (Page 2 of 3) ▪Internet scams ▪Phishing 15
  • 16. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Computer Crime (Page 3 of 3) ▪Social networking risks ▪Cyber-bullying ▪Rogue Wi-Fi hotspots ▪Theft ▪Data manipulation ▪Computer Fraud and Abuse Act 16
  • 17. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. Ethics ▪Standards of moral conduct ▪Copyright ▪Gives content creators the right to control the use and distribution of their work ▪Paintings, books, music, films, video games ▪Software piracy ▪Unauthorized copying and distribution ▪Digital Millennium Copyright Act ▪Digital rights management (DRM) ▪Plagiarism 19
  • 18. Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part. 24 End of Module