SlideShare a Scribd company logo
Understanding Computers: Today and Tomorrow, 13th Edition
Chapter 15:
Computer Security and
Privacy
Understanding Computers: Today and Tomorrow, 13th Edition
2
Learning Objectives
1. Explain why all computer users should be concerned
about computer security.
2. List some risks associated with hardware loss, damage,
and system failure, and understand ways to safeguard a
computer against these risks.
3. Define software piracy and digital counterfeiting and
explain how they may be prevented.
4. Explain what information privacy is and why computer
users should be concerned about it.
Understanding Computers: Today and Tomorrow, 13th Edition
3
Learning Objectives
5. Describe some privacy concerns regarding databases,
electronic profiling, spam, and telemarketing, and
identify ways individuals can protect their privacy.
6. Discuss several types of electronic surveillance and
monitoring and list ways individuals can protect their
privacy.
7. Discuss the status of security and privacy legislation.
Understanding Computers: Today and Tomorrow, 13th Edition
4
Overview
• This chapter covers:
– Hardware loss, hardware damage, and system
failure, and the safeguards that can help reduce the
risk of a problem occurring due to these concerns
– Software piracy and digital counterfeiting and steps
that are being taken to prevent these computer
crimes
– Possible risks for personal privacy violations due to
databases, marketing activities, electronic
surveillance, and monitoring, and precautions that can
be taken to safeguard one’s privacy
– Legislation related to computer security and privacy
Understanding Computers: Today and Tomorrow, 13th Edition
5
Why Be Concerned About Computer Security?
• There are a number of security concerns related to
computers that users should be aware of, including:
– Having a computer or other device stolen
– Losing important data
– Losing contact lists
– Buying pirated or counterfeited products
Understanding Computers: Today and Tomorrow, 13th Edition
6
Hardware Loss, Damage, and System Failure
• Hardware loss: Can occur when a personal computer,
USB flash drive, mobile device, or other piece of
hardware is stolen, lost, or damaged
– Hardware theft: When hardware is stolen from an
individual or an organization
• Often stolen from homes, businesses, cars,
airports, hotels, etc.
• Often occurs for the value of the hardware, but
increasingly for the information that might be
contained on the hardware
– C level attacks are growing
Understanding Computers: Today and Tomorrow, 13th Edition
7
Hardware Loss, Damage, and System Failure
• Hardware damage: Can be accidental or intentional
• System failure: The complete malfunction of a computer
system
– Can be due to a hardware problem, software
problem, or computer virus
– Can be due to a natural disaster or planned attack
Understanding Computers: Today and Tomorrow, 13th Edition
8
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
• Use door and computer equipment locks
– Cable locks
– Security slots
– Cable anchors
– Laptop alarm
software
– Lock up USB
flash drives,
external hard
drives, and
other media
Understanding Computers: Today and Tomorrow, 13th Edition
9
• Use encryption to protect
data
– Increasingly used with
USB flash drives,
portable computers,
external hard drives, etc.
– Full disk encryption
(FDE): Everything on the
storage medium is
encrypted
– Self-encrypting hard
drive: A hard drive using
FDE
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Understanding Computers: Today and Tomorrow, 13th Edition
10
• Computer tracking software: Used to find a computer or
other device after it is lost or stolen
– Sends out identifying data via the Internet
– Law enforcement can use this data to recover the
device
– Stealth tracking software: The sending of data is
transparent to the user
– Kill switch: Technology that causes the device to self-
destruct
• Other precautions:
– Asset tags, tamper evident labels, etc.
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Understanding Computers: Today and Tomorrow, 13th Edition
11
• Additional precautions for mobile users
– Most important is to use
common sense
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Understanding Computers: Today and Tomorrow, 13th Edition
12
• Proper hardware care
– Don’t abuse hardware
– Use protective cases
– Ruggedized devices
available
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Understanding Computers: Today and Tomorrow, 13th Edition
13
– Surge suppressors:
Protect hardware from
damage due to electrical
fluctuations
– Uninterruptible power
supplies (UPSs):
Provide continuous
power to a computer
system for a period of
time after the power
goes off
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Understanding Computers: Today and Tomorrow, 13th Edition
14
– Also:
• Watch dust, moisture,
static, heat, etc.
• Avoid head crash
• Stop USB devices
before removing
• Use screen protectors,
jewel cases, etc.
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Understanding Computers: Today and Tomorrow, 13th Edition
15
• Backup and disaster recovery plans:
– Both businesses and individuals should use
appropriate backup procedures
– Backup media needs to be secured
• Data storage companies store backup media at
secure remote locations
• Online backup is another possibility
– Continuous data protection (CDP): Enables data
backups to be made on a continual basis
– Disaster-recovery plan: Describes the steps a
company will take following the occurrence of a
disaster
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Understanding Computers: Today and Tomorrow, 13th Edition
16
Quick Quiz
1. Which of the following would not likely be a reason for
stealing a notebook computer?
a. For the data contained on the computer
b. To use in a denial of service (DoS) attack
c. For the value of the hardware
2. True or False: It is only important to use a surge
suppressor during bad weather, when a lightning strike
may occur.
3. A copy of a file that is created in case the original is
damaged is called a(n) _____________.
Answers:
1) b; 2) False; 3) backup
Understanding Computers: Today and Tomorrow, 13th Edition
17
Software Piracy and Digital Counterfeiting
• Software piracy: Unauthorized copying of a computer
program
– Occurs when:
• Individuals make illegal copies of software to give
to friends
• Businesses or individuals install software on more
than the number of computers allowed according
to the end-user license agreement (EULA)
• Sellers install unlicensed copies on computers sold
to consumers
• Large-scale operations in which programs and
packaging are illegally duplicated and sold as
supposedly legitimate products
Understanding Computers: Today and Tomorrow, 13th Edition
18
Software Piracy and Digital Counterfeiting
• Digital counterfeiting: The
use of computers or other
types of digital equipment to
make illegal copies
documents
– Currency, checks,
collectibles and other
items
– Often scanned and
printed or color-copied
Understanding Computers: Today and Tomorrow, 13th Edition
19
Protection Against Software Piracy and
Digital Counterfeiting
• Software antipiracy tools
– Educating businesses and consumers
– Registration code or product key
– Checking validity of a software installation before
upgrades or other resources related to the program
can be used
– Watching online auction sites/lawsuits
– Incorporating code into applications to inform the
vendor when pirated copies are being used, or is in
violation of the license
Understanding Computers: Today and Tomorrow, 13th Edition
Protection Against Software Piracy and
Digital Counterfeiting
20
Understanding Computers: Today and Tomorrow, 13th Edition
21
Protection Against Software Piracy and
Digital Counterfeiting
• Digital counterfeiting prevention
– New currency designs
• Microprinting, watermarks, security thread, etc.
• Special paper is used with U.S. currency
– Identifying technology included in digital imaging
hardware
– Digital watermarks: Subtle alteration to a digital item
that is not noticeable but that can be retrieved to
identify the owner of the item
– Also can use:
• RFID tags and other hard-to-reproduce content
Understanding Computers: Today and Tomorrow, 13th Edition
22
Protection Against Software Piracy and
Digital Counterfeiting
Understanding Computers: Today and Tomorrow, 13th Edition
23
Quick Quiz
1. Using a computer to make illegal copies of currency to
circulate as real currency is a form of _____________.
a. software piracy
b. computer sabotage
c. digital counterfeiting
2. True or False: Software piracy is rarely performed today.
3. Printed text or an image on a CD case or box that
changes its appearance when viewed from different
angles to prove the item is authentic is called a(n)
_____________.
Answers:
1) c; 2) False; 3) hologram
Understanding Computers: Today and Tomorrow, 13th Edition
24
Why Be Concerned About
Information Privacy?
• Privacy: State of being concealed or free from
unauthorized intrusion
• Information privacy: Rights of individuals and companies
to control how information about them is collected and
used
• Computers add additional privacy challenges
– Many data breaches recently due to lost or stolen
hardware, carelessness with documents containing
sensitive data, etc.
• Businesses need to be concerned with the
expense, damage to reputation, and possible
lawsuits
– Spam, electronic surveillance, electronic monitoring
Understanding Computers: Today and Tomorrow, 13th Edition
25
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
• Marketing database: Collection of data about people,
used for marketing purposes
– Data obtained through online and offline purchases,
public information, etc.
– Used in conjunction with Web activities
• Social activity and searches performed
• Government database: Collection of data about people,
collected and maintained by the government
– Tax information, Social Security earnings, personal
health records, marriage and divorce information
– Some information is confidential, other is public
Understanding Computers: Today and Tomorrow, 13th Edition
26
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
Understanding Computers: Today and Tomorrow, 13th Edition
27
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
• Electronic profiling
– Using electronic means to collect a variety of in-depth
information about an individual
Understanding Computers: Today and Tomorrow, 13th Edition
28
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
• Privacy policy: Discloses how information you provide
will be used
– Included on many Web sites
– Dictates how supplied information may be used, but
can be changed and often without notice
Understanding Computers: Today and Tomorrow, 13th Edition
29
Spam and Other Marketing Activities
• Spam: Unsolicited, bulk e-mail sent over the Internet
– Often involves health-related products, counterfeit
products, fraudulent business opportunities,
pornography, etc.
– Marketing e-mails from companies a person has
done business with
– Appearing via instant messaging (spim)
– Also delivered via mobile phones, social networking
sites
– Spam legislation enacted some regulations
regarding spam
Understanding Computers: Today and Tomorrow, 13th Edition
Spam and Other Marketing Activities
30
Understanding Computers: Today and Tomorrow, 13th Edition
31
Protecting the Privacy of
Personal Information
• Safeguard your e-mail address
– Use a throw-away e-mail
address (an extra e-mail
address that you can use
for activities that might
result in spam)
• Get a second e-mail
address from your ISP
or from Hotmail,
Yahoo! Mail, or Gmail
• Can stop using it
and get a new one
when needed
Understanding Computers: Today and Tomorrow, 13th Edition
32
Protecting the Privacy of
Personal Information
• Be cautious of revealing personal information
– Read a Web site’s privacy policy
– Avoid putting too many personal details on your Web
site
– Be wary of sites offering prizes in exchange for
personal information
– Consider using privacy software, such as anonymous
surfing
– Supply only the required information in registration
forms
– Delete your browsing history and e-mail settings
when using a public computer
Understanding Computers: Today and Tomorrow, 13th Edition
Protecting the Privacy of
Personal Information
33
Understanding Computers: Today and Tomorrow, 13th Edition
34
Protecting the Privacy of
Personal Information
• Use an e-mail filter to automatically route possible spam
into a special folder to deal with later
Understanding Computers: Today and Tomorrow, 13th Edition
35
Protecting the Privacy of
Personal Information
• Can opt out from marketing activities
– Some privacy groups want individuals to have to opt
in to activities instead
• Web servers holding sensitive data should be secured
– Only enter personal information on Web sites using
secure servers
– Automatic encryption systems for e-mail can help
sensitive data from accidentally being revealed
Understanding Computers: Today and Tomorrow, 13th Edition
36
Protecting the Privacy of
Personal Information
• Properly dispose of hardware
and outdated data
– Wipe (not just delete) data on
hard drives before
disposing of a computer or
hard drive
– Storage media containing
sensitive data should be
shredded
– Businesses should have a
media sanitation/data
destruction policy
Understanding Computers: Today and Tomorrow, 13th Edition
37
Online Video
“Google Search Privacy: Personalized Search”
(click below to start video)
Reminder: The complete set of online videos and video podcasts are available at:
www.cengage.com/computerconcepts/np/uc13
Courtesy of Google Inc.
Understanding Computers: Today and Tomorrow, 13th Edition
38
Electronic Surveillance and Monitoring
• Computer monitoring software: Records an individual’s
computer usage either by capturing images of the
screen, recording the actual keystrokes used, or creating
a summary of Web sites visited
– Can be used in homes by adults to monitor computer
usage of children or spouse
– Can be used in businesses to monitor employee
computer usage
– Keystroke-logging programs: Used to capture
keystrokes
• Can be used by hacker to capture usernames,
passwords, and other sensitive information entered
into a computer via the keyboard
Understanding Computers: Today and Tomorrow, 13th Edition
39
Computer Monitoring Software
Understanding Computers: Today and Tomorrow, 13th Edition
40
Electronic Surveillance and Monitoring
• Video surveillance: The use of video cameras to monitor
activities of individuals
– Used to monitor employees
– Used in public locations for crime-prevention
purposes
• Stores and other businesses, Public streets
• Subways, airports, etc.
– Can be used with face recognition software
• Identify terrorists and other known criminals
– Privacy issues also involved with the use of camera
phones
Understanding Computers: Today and Tomorrow, 13th Edition
41
Video Surveillance
Understanding Computers: Today and Tomorrow, 13th Edition
42
Electronic Surveillance and Monitoring
• Employee monitoring: Observing or recording employees’
actions while they are on the job
– Can monitor computer usage,
phone calls, e-mail, etc.
– Can monitor physical location
• Video cameras
• GPS capabilities built into cars
or mobile phones
• Proximity cards
– Can also be used to access
a facility, computer, etc.
– Businesses should notify employees of monitoring
Understanding Computers: Today and Tomorrow, 13th Edition
43
Electronic Surveillance and Monitoring
• Presence technology: Enables one computing device to
locate and identify the current status of another device
on the same network
– Instant messaging, mobile phones, etc.
– Can be used to locate co-workers
or by customers
– May also be used for marketing
activities in the future
– Potential privacy violations
Understanding Computers: Today and Tomorrow, 13th Edition
44
Protecting Personal and
Workspace Privacy
• Can use antispyware software to detect and remove
some types of illegal computer monitoring and spyware
software
• Employers have a responsibility to keep employee and
customer information private and secured
• Employees should be familiar with their company’s
employee policy and avoid
personal activities at work
Understanding Computers: Today and Tomorrow, 13th Edition
45
Computer Security and
Privacy Legislation
• Difficult for legal system to keep pace with technology
• Difficult to balance freedom of speech with privacy
Understanding Computers: Today and Tomorrow, 13th Edition
46
Computer Security and
Privacy Legislation
Understanding Computers: Today and Tomorrow, 13th Edition
47
Quick Quiz
1. A document that discloses how your personal information
will be used is called a(n) _____________.
a. privacy policy
b. opt out
c. throw-away e-mail address
2. True or False: The problem of protecting personal privacy
and keeping personal information private did not exist
before computers and the Internet.
3. The ability of one computing device on a network to
identity the status of another device on that network is
known as _____________.
Answers:
1) a; 2) False; 3) presence technology
Understanding Computers: Today and Tomorrow, 13th Edition
48
Summary
• Why Be Concerned About Computer Security
• Hardware Loss, Hardware Damage, and System Failure
• Software Piracy and Digital Counterfeiting
• Why Be Concerned About Information Privacy
• Databases, Electronic Profiling, Spam, and Other
Marketing Activities
• Electronic Surveillance and Monitoring
• Computer Security and Privacy Legislation

More Related Content

What's hot

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
yaminohime
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
Chap11
Chap11Chap11
Chap11
nitin_009
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Haa'Meem Mohiyuddin
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
zenbrowski
 
Sir mumtaz kolai lectures
Sir mumtaz kolai lecturesSir mumtaz kolai lectures
Sir mumtaz kolai lectures
Mudasirbaloch
 
Application of computer in Hospitality
Application of computer in HospitalityApplication of computer in Hospitality
Application of computer in Hospitality
Priya Roy
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
Pratik Gupta
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
gracepm28
 
Computer Application
Computer ApplicationComputer Application
Computer Application
Zahirrudin Idris
 

What's hot (20)

Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
Uc14 chap07
Uc14 chap07Uc14 chap07
Uc14 chap07
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
 
Uc14 chap06
Uc14 chap06Uc14 chap06
Uc14 chap06
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
 
Sir mumtaz kolai lectures
Sir mumtaz kolai lecturesSir mumtaz kolai lectures
Sir mumtaz kolai lectures
 
Application of computer in Hospitality
Application of computer in HospitalityApplication of computer in Hospitality
Application of computer in Hospitality
 
Week 12
Week 12Week 12
Week 12
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
Uc14 chap12
Uc14 chap12Uc14 chap12
Uc14 chap12
 
Computer Application
Computer ApplicationComputer Application
Computer Application
 

Viewers also liked

Uc13.chapter.10
Uc13.chapter.10Uc13.chapter.10
Uc13.chapter.10
Irfan Ali Memon
 
Uc13.chapter.05
Uc13.chapter.05Uc13.chapter.05
Uc13.chapter.05
Irfan Ali Memon
 
Uc13.chapter.07
Uc13.chapter.07Uc13.chapter.07
Uc13.chapter.07
Irfan Ali Memon
 
Week6 final
Week6 finalWeek6 final
Week6 final
Irfan Ali Memon
 
Lecture2 fundamentalsof ict
Lecture2 fundamentalsof ictLecture2 fundamentalsof ict
Lecture2 fundamentalsof ict
Irfan Ali Memon
 
Week3 v2 (1)
Week3 v2 (1)Week3 v2 (1)
Week3 v2 (1)
Irfan Ali Memon
 
Uc13.chapter.13
Uc13.chapter.13Uc13.chapter.13
Uc13.chapter.13
Irfan Ali Memon
 
Le marketing du restaurateur
Le marketing du restaurateurLe marketing du restaurateur
Le marketing du restaurateur
Jean-Paul Bermejo
 

Viewers also liked (9)

Uc13.chapter.10
Uc13.chapter.10Uc13.chapter.10
Uc13.chapter.10
 
Uc13.chapter.05
Uc13.chapter.05Uc13.chapter.05
Uc13.chapter.05
 
Uc13.chapter.07
Uc13.chapter.07Uc13.chapter.07
Uc13.chapter.07
 
Week6 final
Week6 finalWeek6 final
Week6 final
 
Lecture2 fundamentalsof ict
Lecture2 fundamentalsof ictLecture2 fundamentalsof ict
Lecture2 fundamentalsof ict
 
Week3 v2 (1)
Week3 v2 (1)Week3 v2 (1)
Week3 v2 (1)
 
Nasscom nov 11
Nasscom nov 11Nasscom nov 11
Nasscom nov 11
 
Uc13.chapter.13
Uc13.chapter.13Uc13.chapter.13
Uc13.chapter.13
 
Le marketing du restaurateur
Le marketing du restaurateurLe marketing du restaurateur
Le marketing du restaurateur
 

Similar to Uc13.chapter.15

Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15ayahye
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
yaminohime
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09ayahye
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Network and Internet Security.pptx specifications
Network and Internet Security.pptx specificationsNetwork and Internet Security.pptx specifications
Network and Internet Security.pptx specifications
abdul12rehaman
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
Theresa Ann Rollins-Fanning
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
Nune SrinivasRao
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
Fizaril Amzari Omar
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
dilahkmpk
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
rizwanshafique4321
 
Uc13.chapter.16
Uc13.chapter.16Uc13.chapter.16
Uc13.chapter.16
Irfan Ali Memon
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to rememberIszamli Jailani
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
SecureDocs
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
PaulRomanoBenavidesR
 

Similar to Uc13.chapter.15 (20)

Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Network security
Network securityNetwork security
Network security
 
Network and Internet Security.pptx specifications
Network and Internet Security.pptx specificationsNetwork and Internet Security.pptx specifications
Network and Internet Security.pptx specifications
 
Computer security
Computer securityComputer security
Computer security
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Uc13.chapter.16
Uc13.chapter.16Uc13.chapter.16
Uc13.chapter.16
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
 

More from Irfan Ali Memon

MaMarksheet
MaMarksheetMaMarksheet
MaMarksheet
Irfan Ali Memon
 
IT Ait ict quiz_two
IT Ait ict quiz_twoIT Ait ict quiz_two
IT Ait ict quiz_two
Irfan Ali Memon
 
Week14 final
Week14 finalWeek14 final
Week14 final
Irfan Ali Memon
 
Week13 final
Week13 finalWeek13 final
Week13 final
Irfan Ali Memon
 
Week12 final
Week12 finalWeek12 final
Week12 final
Irfan Ali Memon
 
Week11 final
Week11 finalWeek11 final
Week11 final
Irfan Ali Memon
 
Week10 final
Week10 finalWeek10 final
Week10 final
Irfan Ali Memon
 
Week9 final
Week9 finalWeek9 final
Week9 final
Irfan Ali Memon
 
Week8 final
Week8 finalWeek8 final
Week8 final
Irfan Ali Memon
 
Week7 final
Week7 finalWeek7 final
Week7 final
Irfan Ali Memon
 
Uc13.chapter.14
Uc13.chapter.14Uc13.chapter.14
Uc13.chapter.14
Irfan Ali Memon
 
Uc13.chapter.12
Uc13.chapter.12Uc13.chapter.12
Uc13.chapter.12
Irfan Ali Memon
 
Uc13.chapter.11
Uc13.chapter.11Uc13.chapter.11
Uc13.chapter.11
Irfan Ali Memon
 
Uc13.chapter.08
Uc13.chapter.08Uc13.chapter.08
Uc13.chapter.08
Irfan Ali Memon
 
Uc13.chapter.06
Uc13.chapter.06Uc13.chapter.06
Uc13.chapter.06
Irfan Ali Memon
 
Uc13.chapter.04
Uc13.chapter.04Uc13.chapter.04
Uc13.chapter.04
Irfan Ali Memon
 
Uc13.chapter.03
Uc13.chapter.03Uc13.chapter.03
Uc13.chapter.03
Irfan Ali Memon
 
Uc13.chapter.02
Uc13.chapter.02Uc13.chapter.02
Uc13.chapter.02
Irfan Ali Memon
 
Uc13.chapter.01
Uc13.chapter.01Uc13.chapter.01
Uc13.chapter.01
Irfan Ali Memon
 
Ait ict quiz_one
Ait ict quiz_oneAit ict quiz_one
Ait ict quiz_one
Irfan Ali Memon
 

More from Irfan Ali Memon (20)

MaMarksheet
MaMarksheetMaMarksheet
MaMarksheet
 
IT Ait ict quiz_two
IT Ait ict quiz_twoIT Ait ict quiz_two
IT Ait ict quiz_two
 
Week14 final
Week14 finalWeek14 final
Week14 final
 
Week13 final
Week13 finalWeek13 final
Week13 final
 
Week12 final
Week12 finalWeek12 final
Week12 final
 
Week11 final
Week11 finalWeek11 final
Week11 final
 
Week10 final
Week10 finalWeek10 final
Week10 final
 
Week9 final
Week9 finalWeek9 final
Week9 final
 
Week8 final
Week8 finalWeek8 final
Week8 final
 
Week7 final
Week7 finalWeek7 final
Week7 final
 
Uc13.chapter.14
Uc13.chapter.14Uc13.chapter.14
Uc13.chapter.14
 
Uc13.chapter.12
Uc13.chapter.12Uc13.chapter.12
Uc13.chapter.12
 
Uc13.chapter.11
Uc13.chapter.11Uc13.chapter.11
Uc13.chapter.11
 
Uc13.chapter.08
Uc13.chapter.08Uc13.chapter.08
Uc13.chapter.08
 
Uc13.chapter.06
Uc13.chapter.06Uc13.chapter.06
Uc13.chapter.06
 
Uc13.chapter.04
Uc13.chapter.04Uc13.chapter.04
Uc13.chapter.04
 
Uc13.chapter.03
Uc13.chapter.03Uc13.chapter.03
Uc13.chapter.03
 
Uc13.chapter.02
Uc13.chapter.02Uc13.chapter.02
Uc13.chapter.02
 
Uc13.chapter.01
Uc13.chapter.01Uc13.chapter.01
Uc13.chapter.01
 
Ait ict quiz_one
Ait ict quiz_oneAit ict quiz_one
Ait ict quiz_one
 

Recently uploaded

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 

Recently uploaded (20)

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 

Uc13.chapter.15

  • 1. Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15: Computer Security and Privacy
  • 2. Understanding Computers: Today and Tomorrow, 13th Edition 2 Learning Objectives 1. Explain why all computer users should be concerned about computer security. 2. List some risks associated with hardware loss, damage, and system failure, and understand ways to safeguard a computer against these risks. 3. Define software piracy and digital counterfeiting and explain how they may be prevented. 4. Explain what information privacy is and why computer users should be concerned about it.
  • 3. Understanding Computers: Today and Tomorrow, 13th Edition 3 Learning Objectives 5. Describe some privacy concerns regarding databases, electronic profiling, spam, and telemarketing, and identify ways individuals can protect their privacy. 6. Discuss several types of electronic surveillance and monitoring and list ways individuals can protect their privacy. 7. Discuss the status of security and privacy legislation.
  • 4. Understanding Computers: Today and Tomorrow, 13th Edition 4 Overview • This chapter covers: – Hardware loss, hardware damage, and system failure, and the safeguards that can help reduce the risk of a problem occurring due to these concerns – Software piracy and digital counterfeiting and steps that are being taken to prevent these computer crimes – Possible risks for personal privacy violations due to databases, marketing activities, electronic surveillance, and monitoring, and precautions that can be taken to safeguard one’s privacy – Legislation related to computer security and privacy
  • 5. Understanding Computers: Today and Tomorrow, 13th Edition 5 Why Be Concerned About Computer Security? • There are a number of security concerns related to computers that users should be aware of, including: – Having a computer or other device stolen – Losing important data – Losing contact lists – Buying pirated or counterfeited products
  • 6. Understanding Computers: Today and Tomorrow, 13th Edition 6 Hardware Loss, Damage, and System Failure • Hardware loss: Can occur when a personal computer, USB flash drive, mobile device, or other piece of hardware is stolen, lost, or damaged – Hardware theft: When hardware is stolen from an individual or an organization • Often stolen from homes, businesses, cars, airports, hotels, etc. • Often occurs for the value of the hardware, but increasingly for the information that might be contained on the hardware – C level attacks are growing
  • 7. Understanding Computers: Today and Tomorrow, 13th Edition 7 Hardware Loss, Damage, and System Failure • Hardware damage: Can be accidental or intentional • System failure: The complete malfunction of a computer system – Can be due to a hardware problem, software problem, or computer virus – Can be due to a natural disaster or planned attack
  • 8. Understanding Computers: Today and Tomorrow, 13th Edition 8 Protecting Against Hardware Loss, Hardware Damage, and System Failure • Use door and computer equipment locks – Cable locks – Security slots – Cable anchors – Laptop alarm software – Lock up USB flash drives, external hard drives, and other media
  • 9. Understanding Computers: Today and Tomorrow, 13th Edition 9 • Use encryption to protect data – Increasingly used with USB flash drives, portable computers, external hard drives, etc. – Full disk encryption (FDE): Everything on the storage medium is encrypted – Self-encrypting hard drive: A hard drive using FDE Protecting Against Hardware Loss, Hardware Damage, and System Failure
  • 10. Understanding Computers: Today and Tomorrow, 13th Edition 10 • Computer tracking software: Used to find a computer or other device after it is lost or stolen – Sends out identifying data via the Internet – Law enforcement can use this data to recover the device – Stealth tracking software: The sending of data is transparent to the user – Kill switch: Technology that causes the device to self- destruct • Other precautions: – Asset tags, tamper evident labels, etc. Protecting Against Hardware Loss, Hardware Damage, and System Failure
  • 11. Understanding Computers: Today and Tomorrow, 13th Edition 11 • Additional precautions for mobile users – Most important is to use common sense Protecting Against Hardware Loss, Hardware Damage, and System Failure
  • 12. Understanding Computers: Today and Tomorrow, 13th Edition 12 • Proper hardware care – Don’t abuse hardware – Use protective cases – Ruggedized devices available Protecting Against Hardware Loss, Hardware Damage, and System Failure
  • 13. Understanding Computers: Today and Tomorrow, 13th Edition 13 – Surge suppressors: Protect hardware from damage due to electrical fluctuations – Uninterruptible power supplies (UPSs): Provide continuous power to a computer system for a period of time after the power goes off Protecting Against Hardware Loss, Hardware Damage, and System Failure
  • 14. Understanding Computers: Today and Tomorrow, 13th Edition 14 – Also: • Watch dust, moisture, static, heat, etc. • Avoid head crash • Stop USB devices before removing • Use screen protectors, jewel cases, etc. Protecting Against Hardware Loss, Hardware Damage, and System Failure
  • 15. Understanding Computers: Today and Tomorrow, 13th Edition 15 • Backup and disaster recovery plans: – Both businesses and individuals should use appropriate backup procedures – Backup media needs to be secured • Data storage companies store backup media at secure remote locations • Online backup is another possibility – Continuous data protection (CDP): Enables data backups to be made on a continual basis – Disaster-recovery plan: Describes the steps a company will take following the occurrence of a disaster Protecting Against Hardware Loss, Hardware Damage, and System Failure
  • 16. Understanding Computers: Today and Tomorrow, 13th Edition 16 Quick Quiz 1. Which of the following would not likely be a reason for stealing a notebook computer? a. For the data contained on the computer b. To use in a denial of service (DoS) attack c. For the value of the hardware 2. True or False: It is only important to use a surge suppressor during bad weather, when a lightning strike may occur. 3. A copy of a file that is created in case the original is damaged is called a(n) _____________. Answers: 1) b; 2) False; 3) backup
  • 17. Understanding Computers: Today and Tomorrow, 13th Edition 17 Software Piracy and Digital Counterfeiting • Software piracy: Unauthorized copying of a computer program – Occurs when: • Individuals make illegal copies of software to give to friends • Businesses or individuals install software on more than the number of computers allowed according to the end-user license agreement (EULA) • Sellers install unlicensed copies on computers sold to consumers • Large-scale operations in which programs and packaging are illegally duplicated and sold as supposedly legitimate products
  • 18. Understanding Computers: Today and Tomorrow, 13th Edition 18 Software Piracy and Digital Counterfeiting • Digital counterfeiting: The use of computers or other types of digital equipment to make illegal copies documents – Currency, checks, collectibles and other items – Often scanned and printed or color-copied
  • 19. Understanding Computers: Today and Tomorrow, 13th Edition 19 Protection Against Software Piracy and Digital Counterfeiting • Software antipiracy tools – Educating businesses and consumers – Registration code or product key – Checking validity of a software installation before upgrades or other resources related to the program can be used – Watching online auction sites/lawsuits – Incorporating code into applications to inform the vendor when pirated copies are being used, or is in violation of the license
  • 20. Understanding Computers: Today and Tomorrow, 13th Edition Protection Against Software Piracy and Digital Counterfeiting 20
  • 21. Understanding Computers: Today and Tomorrow, 13th Edition 21 Protection Against Software Piracy and Digital Counterfeiting • Digital counterfeiting prevention – New currency designs • Microprinting, watermarks, security thread, etc. • Special paper is used with U.S. currency – Identifying technology included in digital imaging hardware – Digital watermarks: Subtle alteration to a digital item that is not noticeable but that can be retrieved to identify the owner of the item – Also can use: • RFID tags and other hard-to-reproduce content
  • 22. Understanding Computers: Today and Tomorrow, 13th Edition 22 Protection Against Software Piracy and Digital Counterfeiting
  • 23. Understanding Computers: Today and Tomorrow, 13th Edition 23 Quick Quiz 1. Using a computer to make illegal copies of currency to circulate as real currency is a form of _____________. a. software piracy b. computer sabotage c. digital counterfeiting 2. True or False: Software piracy is rarely performed today. 3. Printed text or an image on a CD case or box that changes its appearance when viewed from different angles to prove the item is authentic is called a(n) _____________. Answers: 1) c; 2) False; 3) hologram
  • 24. Understanding Computers: Today and Tomorrow, 13th Edition 24 Why Be Concerned About Information Privacy? • Privacy: State of being concealed or free from unauthorized intrusion • Information privacy: Rights of individuals and companies to control how information about them is collected and used • Computers add additional privacy challenges – Many data breaches recently due to lost or stolen hardware, carelessness with documents containing sensitive data, etc. • Businesses need to be concerned with the expense, damage to reputation, and possible lawsuits – Spam, electronic surveillance, electronic monitoring
  • 25. Understanding Computers: Today and Tomorrow, 13th Edition 25 Databases, Electronic Profiling, Spam, and Other Marketing Activities • Marketing database: Collection of data about people, used for marketing purposes – Data obtained through online and offline purchases, public information, etc. – Used in conjunction with Web activities • Social activity and searches performed • Government database: Collection of data about people, collected and maintained by the government – Tax information, Social Security earnings, personal health records, marriage and divorce information – Some information is confidential, other is public
  • 26. Understanding Computers: Today and Tomorrow, 13th Edition 26 Databases, Electronic Profiling, Spam, and Other Marketing Activities
  • 27. Understanding Computers: Today and Tomorrow, 13th Edition 27 Databases, Electronic Profiling, Spam, and Other Marketing Activities • Electronic profiling – Using electronic means to collect a variety of in-depth information about an individual
  • 28. Understanding Computers: Today and Tomorrow, 13th Edition 28 Databases, Electronic Profiling, Spam, and Other Marketing Activities • Privacy policy: Discloses how information you provide will be used – Included on many Web sites – Dictates how supplied information may be used, but can be changed and often without notice
  • 29. Understanding Computers: Today and Tomorrow, 13th Edition 29 Spam and Other Marketing Activities • Spam: Unsolicited, bulk e-mail sent over the Internet – Often involves health-related products, counterfeit products, fraudulent business opportunities, pornography, etc. – Marketing e-mails from companies a person has done business with – Appearing via instant messaging (spim) – Also delivered via mobile phones, social networking sites – Spam legislation enacted some regulations regarding spam
  • 30. Understanding Computers: Today and Tomorrow, 13th Edition Spam and Other Marketing Activities 30
  • 31. Understanding Computers: Today and Tomorrow, 13th Edition 31 Protecting the Privacy of Personal Information • Safeguard your e-mail address – Use a throw-away e-mail address (an extra e-mail address that you can use for activities that might result in spam) • Get a second e-mail address from your ISP or from Hotmail, Yahoo! Mail, or Gmail • Can stop using it and get a new one when needed
  • 32. Understanding Computers: Today and Tomorrow, 13th Edition 32 Protecting the Privacy of Personal Information • Be cautious of revealing personal information – Read a Web site’s privacy policy – Avoid putting too many personal details on your Web site – Be wary of sites offering prizes in exchange for personal information – Consider using privacy software, such as anonymous surfing – Supply only the required information in registration forms – Delete your browsing history and e-mail settings when using a public computer
  • 33. Understanding Computers: Today and Tomorrow, 13th Edition Protecting the Privacy of Personal Information 33
  • 34. Understanding Computers: Today and Tomorrow, 13th Edition 34 Protecting the Privacy of Personal Information • Use an e-mail filter to automatically route possible spam into a special folder to deal with later
  • 35. Understanding Computers: Today and Tomorrow, 13th Edition 35 Protecting the Privacy of Personal Information • Can opt out from marketing activities – Some privacy groups want individuals to have to opt in to activities instead • Web servers holding sensitive data should be secured – Only enter personal information on Web sites using secure servers – Automatic encryption systems for e-mail can help sensitive data from accidentally being revealed
  • 36. Understanding Computers: Today and Tomorrow, 13th Edition 36 Protecting the Privacy of Personal Information • Properly dispose of hardware and outdated data – Wipe (not just delete) data on hard drives before disposing of a computer or hard drive – Storage media containing sensitive data should be shredded – Businesses should have a media sanitation/data destruction policy
  • 37. Understanding Computers: Today and Tomorrow, 13th Edition 37 Online Video “Google Search Privacy: Personalized Search” (click below to start video) Reminder: The complete set of online videos and video podcasts are available at: www.cengage.com/computerconcepts/np/uc13 Courtesy of Google Inc.
  • 38. Understanding Computers: Today and Tomorrow, 13th Edition 38 Electronic Surveillance and Monitoring • Computer monitoring software: Records an individual’s computer usage either by capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites visited – Can be used in homes by adults to monitor computer usage of children or spouse – Can be used in businesses to monitor employee computer usage – Keystroke-logging programs: Used to capture keystrokes • Can be used by hacker to capture usernames, passwords, and other sensitive information entered into a computer via the keyboard
  • 39. Understanding Computers: Today and Tomorrow, 13th Edition 39 Computer Monitoring Software
  • 40. Understanding Computers: Today and Tomorrow, 13th Edition 40 Electronic Surveillance and Monitoring • Video surveillance: The use of video cameras to monitor activities of individuals – Used to monitor employees – Used in public locations for crime-prevention purposes • Stores and other businesses, Public streets • Subways, airports, etc. – Can be used with face recognition software • Identify terrorists and other known criminals – Privacy issues also involved with the use of camera phones
  • 41. Understanding Computers: Today and Tomorrow, 13th Edition 41 Video Surveillance
  • 42. Understanding Computers: Today and Tomorrow, 13th Edition 42 Electronic Surveillance and Monitoring • Employee monitoring: Observing or recording employees’ actions while they are on the job – Can monitor computer usage, phone calls, e-mail, etc. – Can monitor physical location • Video cameras • GPS capabilities built into cars or mobile phones • Proximity cards – Can also be used to access a facility, computer, etc. – Businesses should notify employees of monitoring
  • 43. Understanding Computers: Today and Tomorrow, 13th Edition 43 Electronic Surveillance and Monitoring • Presence technology: Enables one computing device to locate and identify the current status of another device on the same network – Instant messaging, mobile phones, etc. – Can be used to locate co-workers or by customers – May also be used for marketing activities in the future – Potential privacy violations
  • 44. Understanding Computers: Today and Tomorrow, 13th Edition 44 Protecting Personal and Workspace Privacy • Can use antispyware software to detect and remove some types of illegal computer monitoring and spyware software • Employers have a responsibility to keep employee and customer information private and secured • Employees should be familiar with their company’s employee policy and avoid personal activities at work
  • 45. Understanding Computers: Today and Tomorrow, 13th Edition 45 Computer Security and Privacy Legislation • Difficult for legal system to keep pace with technology • Difficult to balance freedom of speech with privacy
  • 46. Understanding Computers: Today and Tomorrow, 13th Edition 46 Computer Security and Privacy Legislation
  • 47. Understanding Computers: Today and Tomorrow, 13th Edition 47 Quick Quiz 1. A document that discloses how your personal information will be used is called a(n) _____________. a. privacy policy b. opt out c. throw-away e-mail address 2. True or False: The problem of protecting personal privacy and keeping personal information private did not exist before computers and the Internet. 3. The ability of one computing device on a network to identity the status of another device on that network is known as _____________. Answers: 1) a; 2) False; 3) presence technology
  • 48. Understanding Computers: Today and Tomorrow, 13th Edition 48 Summary • Why Be Concerned About Computer Security • Hardware Loss, Hardware Damage, and System Failure • Software Piracy and Digital Counterfeiting • Why Be Concerned About Information Privacy • Databases, Electronic Profiling, Spam, and Other Marketing Activities • Electronic Surveillance and Monitoring • Computer Security and Privacy Legislation