SlideShare a Scribd company logo
1 of 57
Chapter 15:

Computer Security
and Privacy
Learning Objectives
1. Explain why all computer users should be concerned about
computer security.
2. List some risks associated with hardware loss, hardware
damage, and system failure, and understand ways to
safeguard a computer against these risks.
3. Define software piracy and digital counterfeiting and explain
how they may be prevented.
4. Explain what information privacy is and why computer users
should be concerned about it.

Understanding Computers: Today and Tomorrow, 14th Edition

2
2
Learning Objectives
5. Describe some privacy concerns regarding
databases, electronic profiling, spam, and telemarketing, and
identify ways individuals can protect their privacy.
6. Discuss several types of electronic surveillance and
monitoring and list ways individuals can protect their privacy.
7. Discuss the status of computer security and privacy
legislation.

Understanding Computers: Today and Tomorrow, 14th Edition

3
Overview
• This chapter covers:
– Hardware loss, hardware damage, and system failure, and
the safeguards that can help reduce the risk of a problem
occurring due to these concerns
– Software piracy and digital counterfeiting and steps that
are being taken to prevent these computer crimes
– Possible risks for personal privacy and precautions that can
be taken to safeguard one’s privacy
– Legislation related to computer security and privacy

Understanding Computers: Today and Tomorrow, 14th Edition

4
4
Why Be Concerned About Computer
Security?
• There are a number of security concerns related to computers
that users should be concerned about, including:
– Having a computer or other device stolen

– Losing important data
– Losing contact lists
– Buying pirated or counterfeited products

Understanding Computers: Today and Tomorrow, 14th Edition

5
Hardware Loss, Hardware
Damage, and System Failure
• Hardware Loss
– Can occur when a personal computer, USB flash drive,
mobile device, or other piece of hardware is stolen, lost,
damaged, or experiences a system failure
– Hardware Theft
• Most common type of hardware loss
• Occurs when hardware is stolen from an individual or
an organization
• Often stolen from homes, businesses, cars, airports,
hotels, and luggage or packages lost by airlines or
shipping companies
Understanding Computers: Today and Tomorrow, 14th Edition

6
Hardware Loss, Hardware
Damage, and System Failure
• Often occurs for the value of the hardware, but
increasingly for the information that might be
contained on the hardware
– C-level attacks, those targeting CEOs and CIOs, are
growing
• Hardware Damage
– Can occur from power
fluctuations, heat, dust, static, electricity, water, and abuse
– Can be accidental or intentional

Understanding Computers: Today and Tomorrow, 14th Edition

7
Hardware Loss, Hardware
Damage, and System Failure
• System Failure and Other
Disasters
– The complete malfunction
of a computer system
• Can be due to a
hardware
problem, software
problem, or computer
virus
• Can be due to a natural
disaster or planned
attack
Understanding Computers: Today and Tomorrow, 14th Edition

8
Hardware Loss, Hardware
Damage, and System Failure
• Protecting Against Hardware Loss, Hardware Damage, and
System Failure
– Door and Computer Equipment Locks
• Cable locks
• Security slots
• Cable anchors
• Laptop alarm
software
• Lock up USB
flash drives,
external hard
drives, and
other media
Understanding Computers: Today and Tomorrow, 14th Edition

9
Hardware Loss, Hardware
Damage, and System Failure
– Encryption and Self-Encrypting Hard Drives
• Use encryption to protect data
• Increasingly used with USB flash drives, portable
computers, external hard drives, etc.
• Full Disk Encryption (FDE)
– Everything on the storage
medium is encrypted
• Self-Encrypting Hard Drive
– A hard drive using FDE
– Used most often with
portable computers
Understanding Computers: Today and Tomorrow, 14th Edition

10
Hardware Loss, Hardware
Damage, and System Failure
– Computer Tracking Software and Antitheft Tools
• Used to find a computer or other device after it is lost
or stolen
• Sends out identifying data via the Internet
• Law enforcement can use this data to recover the
device
• Stealth Tracking Software
– The sending of data is transparent to the user
• Kill Switch
– Technology that causes the device to self-destruct
Understanding Computers: Today and Tomorrow, 14th Edition

11
Hardware Loss, Hardware
Damage, and System Failure
• Asset Tags
– Identify the owner
– Designed to be permanently attached
• Tamper Evident Labels
– Change their appearance if someone tries to
remove them
– Additional Precautions for Mobile Users
• Mobile Device Management
– Used by businesses to manage mobile devices used
by employees
Understanding Computers: Today and Tomorrow, 14th Edition

12
Hardware Loss, Hardware
Damage, and System Failure
• Mobile Tracking Software
– Usually part of MDM software
– Locks down or wipes a lost or stolen phone
– Displays a message with instructions for returning
the device
– Displays the current location of the device
• Wireless Tether System
– Ties phone to a key fob in order to sound an alarm
and lock the phone if further away than the
specified allowable distance

Understanding Computers: Today and Tomorrow, 14th Edition

13
Hardware Loss, Hardware
Damage, and System Failure
• Other Precautions
– Use common sense
and do not leave
personal computers
and mobile devices
unattended

Understanding Computers: Today and Tomorrow, 14th Edition

14
Hardware Loss, Hardware
Damage, and System Failure
– Proper Hardware Care
• Do not harm hardware physically
• Use protective cases
• Ruggedized devices are available
– Designed to withstand much more physical abuse
than conventional computers

Understanding Computers: Today and Tomorrow, 14th Edition

15
Hardware Loss, Hardware
Damage, and System Failure

Understanding Computers: Today and Tomorrow, 14th Edition

16
Hardware Loss, Hardware Damage,
and System Failure
• Use surge suppressors
– Protect hardware from damage due to electrical
fluctuations
• Use uninterruptible power supplies (UPSs)
– Provide continuous power to a computer system
for a period of time after the power goes off
• Avoid exposing devices to dust, moisture, static, and
heat
• Avoid a head crash
• Stop USB devices before removing
• Use screen protectors, jewel cases, etc.
Understanding Computers: Today and Tomorrow, 14th Edition

17
Hardware Loss, Hardware
Damage, and System Failure

Understanding Computers: Today and Tomorrow, 14th Edition

18
Hardware Loss, Hardware
Damage, and System Failure
– Backups and Disaster Recovery Plans
• Both businesses and individuals should use appropriate
backup procedures
• Backup media needs to be secured
– Data storage companies store backup media at
secure remote locations
– Online backup is another possibility
• Continuous data protection (CDP)
– Enables data backups to be made on a continual
basis
• Disaster-recovery plan
– Describes the steps a company will take following
the occurrence of a disaster
Understanding Computers: Today and Tomorrow, 14th Edition

19
Quick Quiz
1. Which of the following would not likely be a reason for stealing a
notebook computer?
a. For the data contained on the computer
b. To use in a denial of service (DoS) attack
c. For the value of the hardware
2. True or False: It is only important to use a surge suppressor during
bad weather, when a lightning strike may occur.
3. A copy of a file that is created in case the original is damaged is
called a(n) _____________.
Answers:
1) b; 2) False; 3) backup

Understanding Computers: Today and Tomorrow, 14th Edition

20
Software Piracy and Digital
Counterfeiting
• Software Piracy
– Unauthorized copying of a computer program occurs
when:
• Individuals make illegal copies of software to give to
friends
• Businesses or individuals install software on more than
the number of computers allowed according to the
end-user license agreement (EULA)
• Sellers install unlicensed copies on computers sold to
consumers
• Large-scale operations in which programs and
packaging are illegally duplicated and sold as
supposedly legitimate products
Understanding Computers: Today and Tomorrow, 14th Edition

21
Software Piracy and Digital
Counterfeiting

Understanding Computers: Today and Tomorrow, 14th Edition

22
Software Piracy and Digital
Counterfeiting
• Digital Counterfeiting
– The use of computers or other types of digital equipment
to make illegal copies of documents
• Currency, checks, collectibles and other items
• Often scanned and printed or color-copied
– Illegal in the United States

Understanding Computers: Today and Tomorrow, 14th Edition

23
Software Piracy and Digital
Counterfeiting
• Protecting Against Software Piracy and Digital Counterfeiting
– Software Antipiracy Tools
• Educating businesses and consumers
• Requiring a unique registration code or product key
• Checking validity of a software installation before
upgrades or other resources related to the program can
be used
• Watching online auction sites/lawsuits and requesting
removal of suspicious items
• Incorporating code into applications to inform the
vendor when pirated copies are being used, or are in
violation of the license
Understanding Computers: Today and Tomorrow, 14th Edition

24
Software Piracy and Digital
Counterfeiting

Understanding Computers: Today and Tomorrow, 14th Edition

25
Software Piracy and Digital
Counterfeiting
– Digital Counterfeiting Prevention
• New currency designs released every seven to ten years
by the U.S. Treasury Department
– Microprinting, watermarks, a security thread, and
special paper are used
• Identifying technology included in digital imaging
hardware
• Digital Watermarks and RFID tags can also be used to
deter counterfeiting checks and ID cards
– Digital watermark
» Subtle alteration to a digital item that is not
noticeable but that can be retrieved to identify
the owner of the item
Understanding Computers: Today and Tomorrow, 14th Edition

26
Software Piracy and Digital
Counterfeiting

Understanding Computers: Today and Tomorrow, 14th Edition

27
Quick Quiz
1. Using a computer to make illegal copies of currency to circulate as
real currency is a form of _____________.
a. software piracy
b. computer sabotage
c. digital counterfeiting
2. True or False: Software piracy is rarely performed today.
3. Printed text or an image on a CD case or box that changes its
appearance when viewed from different angles to prove the item is
authentic is called a(n) _____________.
Answers:
1) c; 2) False; 3) hologram

Understanding Computers: Today and Tomorrow, 14th Edition

28
Why Be Concerned About
Information Privacy?
• Privacy
– State of being concealed or free from unauthorized intrusion
• Information Privacy
– Rights of individuals and companies to control how information
about them is collected and used
• Computers add additional privacy challenges
– Cookies and spyware are possible privacy risks
– Many data breaches recently due to lost or stolen
hardware, carelessness with documents containing sensitive
data, etc.
• Businesses need to be concerned with the expense, damage
to reputation, and possible lawsuits
– Spam, electronic surveillance, electronic monitoring present
additional privacy concerns
Understanding Computers: Today and Tomorrow, 14th Edition

29
Databases, Electronic Profiling,
Spam, and other Marketing Activities
• Databases and Electronic Profiling
– Unless data stored in databases is sufficiently
protected, security breaches can occur
– Marketing databases , government databases, and
educational databases are at higher risk for personal
privacy violations
• Marketing Databases
– Collection of marketing and demographic data
about people and used for marketing purposes
– Data obtained through online and offline
purchases, public information, etc.
Understanding Computers: Today and Tomorrow, 14th Edition

30
Databases, Electronic
Profiling, Spam, and other Marketing
Activities
– Data is also gathered from Web and social media
activities
» Facebook, MySpace, Google+, and location
services such as Foursquare
• Government Databases
– Collection of data about people, collected and
maintained by the government
– Some information is confidential, other is public
» Tax information, and Social Security earnings are
private
» Birth records, marriage and divorce information
are public
Understanding Computers: Today and Tomorrow, 14th Edition

31
Databases, Electronic
Profiling, Spam, and other Marketing
Activities
– Real ID Act of 2005
» Mandates the development of a national ID
system that links driver’s license databases
across the country
– Much information about an individual is available
for free on the Internet

Understanding Computers: Today and Tomorrow, 14th Edition

32
Databases, Electronic
Profiling, Spam, and other Marketing
Activities

Understanding Computers: Today and Tomorrow, 14th Edition

33
Databases, Electronic
Profiling, Spam, and other Marketing
Activities
– Electronic Profiling
• Using electronic means to collect a variety of in-depth
information about an individual
• Designed to provide specific information which is then
sold to companies to be used for marketing purposes

Understanding Computers: Today and Tomorrow, 14th Edition

34
Databases, Electronic Profiling, Spam,
and other Marketing Activities
– Privacy Policy
• Discloses how information you provide will be used
• Included on many Web sites
• Dictates how supplied information may be used, but
can be changed and often without notice

Understanding Computers: Today and Tomorrow, 14th Edition

35
Databases, Electronic
Profiling, Spam, and other Marketing
Activities
• Spam and Other Marketing Activities
– Unsolicited, bulk e-mail sent over the Internet
– Often involves health-related products, counterfeit
products, fraudulent business
opportunities, pornography, etc.
– Marketing e-mails from companies a person has done
business with
– Appearing via instant messaging (spim)
– Also delivered via mobile phones, social networking sites
– CAN-SPAM Act of 2003 enacted some requirements and
penalties for commercial e-mailers
Understanding Computers: Today and Tomorrow, 14th Edition

36
Databases, Electronic
Profiling, Spam, and other Marketing
Activities

Understanding Computers: Today and Tomorrow, 14th Edition

37
Databases, Electronic
Profiling, Spam, and other Marketing
Activities
• Protecting the Privacy of Personal
Information
– Safeguard Your E-mail Address
• Use one private e-mail
address for trusted sources
likes friends, family, and
colleagues
• Use a disposable e-mail
address for online
shopping, message
boards, product
registration, etc.
Understanding Computers: Today and Tomorrow, 14th Edition

38
Databases, Electronic Profiling, Spam,
and other Marketing Activities
– Be Cautious of Revealing Personal Information
• Read a Web site’s privacy policy
• Avoid putting too many personal details on your Web
site
• Use a throw-away email address when signing up for
free trials or other services than may result in spam
• Consider using privacy software, such as Anonymizer
Universal or Privacy Guardian to hide personal
information while browsing the Web
• Supply only the required information in registration
forms
• Delete your browsing history and e-mail settings when
using a public computer; use private browsing
Understanding Computers: Today and Tomorrow, 14th Edition

39
Databases, Electronic Profiling, Spam,
and other Marketing Activities

Understanding Computers: Today and Tomorrow, 14th Edition

40
Databases, Electronic
Profiling, Spam, and other Marketing
Activities
– Use Filters and Opt Out
• Use an e-mail filter to automatically sort e-mail
messages and route possible spam into a special folder
to deal with later
– E-mail filters used to catch spam are called spam
filters
• Opt Out
– Request to be removed from marketing activities or
that personal information not be shared with other
companies
– Some privacy groups want individuals to have to opt
in to activities instead
Understanding Computers: Today and Tomorrow, 14th Edition

41
Databases, Electronic
Profiling, Spam, and other Marketing
Activities

Understanding Computers: Today and Tomorrow, 14th Edition

42
Databases, Electronic Profiling, Spam,
and other Marketing Activities
– Secure Servers and Otherwise Protect Personal
Information
• Only enter personal information on Web sites using
secure servers
• Automatic encryption systems for e-mail can help
sensitive data from accidentally being revealed
• Chief Privacy Officer (CPO)
– Ensures that the private data stored by businesses
in adequately protected

Understanding Computers: Today and Tomorrow, 14th Edition

43
Databases, Electronic
Profiling, Spam, and other Marketing
Activities
– Properly Dispose of Hardware
Containing Data
• Wipe (not just delete) data on
hard drives before
disposing of a computer or hard
drive
• Storage media containing
sensitive data should be
shredded
• Businesses should have a media
sanitation/data destruction
policy
Understanding Computers: Today and Tomorrow, 14th Edition

44
Electronic Surveillance and
Monitoring
• Computer Monitoring Software
– Records an individual’s computer usage either by capturing
images of the screen, recording the actual keystrokes
used, or creating a summary of Web sites visited
– Can be used in homes by adults to monitor computer usage
of children or spouse
– Can be used in businesses to monitor employee computer
usage
– Keystroke-logging programs
• Used to capture keystrokes
• Can be used by hacker to capture
usernames, passwords, and other sensitive information
entered into a computer via the keyboard
Understanding Computers: Today and Tomorrow, 14th Edition

45
Electronic Surveillance and
Monitoring

Understanding Computers: Today and Tomorrow, 14th Edition

46
Electronic Surveillance and
Monitoring
• Video Surveillance
– The use of video cameras to monitor activities of
individuals
– Used to monitor employees
– Used in public locations for crime-prevention purposes
• Stores and other businesses, public streets, subways,
airports, etc.
– Can be used with face recognition software
• Identify terrorists and other known criminals
– Privacy advocates object to the use of video surveillance
and face recognition technology in public places
– Privacy concerns also exist regarding digital cameras
capabilities in mobile phones
Understanding Computers: Today and Tomorrow, 14th Edition

47
Electronic Surveillance and
Monitoring

Understanding Computers: Today and Tomorrow, 14th Edition

48
Electronic Surveillance and
Monitoring
• Employee Monitoring
– Observing or recording employees’ actions while they are on
the job; legal and quite common
– Can monitor computer usage,
phone calls, e-mail, etc.
– Can monitor physical location
• Video cameras
• GPS capabilities built into cars
or mobile phones
• Proximity cards
– Can also be used to access
a facility, computer, etc.
– Businesses should notify employees of monitoring
Understanding Computers: Today and Tomorrow, 14th Edition

49
Electronic Surveillance and
Monitoring
• Presence Technology
– Enables one computing device on a network to locate and
identify the current status of another device on the same
network
– Can tell if a someone is using
his/her computer or mobile phone
– Can locate co-workers
– May also be used for marketing
activities in the future
– Potential privacy concerns

Understanding Computers: Today and Tomorrow, 14th Edition

50
Electronic Surveillance and
Monitoring
• Protecting Personal and Workspace Privacy
– Can use antispyware software to detect and remove some
types of illegal computer monitoring and spyware software

Understanding Computers: Today and Tomorrow, 14th Edition

51
Electronic Surveillance and
Monitoring
– The Employer’s Responsibilities
• Keep company, employee, and customer information
private and secure
– Ensure employee activities are not being monitored
by a hacker or other unauthorized individual
• Have an employee policy that informs employees about
company’s monitoring activities

– The Employees’ Responsibilities
• Read the company’s employee policy
• Avoid personal activities at work
Understanding Computers: Today and Tomorrow, 14th Edition

52
Computer Security and Privacy
Legislation
• A variety of laws have been passed since the 1970s due to the
high level of concern about computer security and personal
privacy
– Several pieces of legislation have been introduced but not
yet passed
• Do Not Track Me Online Act
• Do Not Track Kids Act of 2011
• Best Practices Act
• Difficult for legal system to keep pace with technology
changes
• Difficult to balance freedom of speech with right to
privacy
Understanding Computers: Today and Tomorrow, 14th Edition

53
Computer Security and Privacy
Legislation

Understanding Computers: Today and Tomorrow, 14th Edition

54
Computer Security and Privacy
Legislation

Understanding Computers: Today and Tomorrow, 14th Edition

55
Quick Quiz
1. A document that discloses how your personal information will be
used is called a(n) _____________.
a. privacy policy
b. opt out
c. throw-away e-mail address
2. True or False: The problem of protecting personal privacy and
keeping personal information private did not exist before
computers and the Internet.
3. The ability of one computing device on a network to identity the
status of another device on that network is known as
_____________.
Answers:
1) a; 2) False; 3) presence technology
Understanding Computers: Today and Tomorrow, 14th Edition

56
Summary
•
•
•
•
•

Why Be Concerned About Computer Security?
Hardware Loss, Hardware Damage, and System Failure
Software Piracy and Digital Counterfeiting
Why Be Concerned About Information Privacy?
Databases, Electronic Profiling, Spam, and Other Marketing
Activities
• Electronic Surveillance and Monitoring
• Computer Security and Privacy Legislation

Understanding Computers: Today and Tomorrow, 14th Edition

57

More Related Content

What's hot

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...yaminohime
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...yaminohime
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...yaminohime
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...yaminohime
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...yaminohime
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - Storage
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - StorageUnderstanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - Storage
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - Storageyaminohime
 
PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018Fizaril Amzari Omar
 
Information Technology
Information TechnologyInformation Technology
Information Technologyhari_2u1986
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologiesLeslynBonachita1
 

What's hot (19)

Uc14 chap05
Uc14 chap05Uc14 chap05
Uc14 chap05
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 1 - Introdu...
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 4 - Input a...
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 11 - E-Comm...
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 12 - Inform...
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - Storage
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - StorageUnderstanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - Storage
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 3 - Storage
 
Uc14 chap02
Uc14 chap02Uc14 chap02
Uc14 chap02
 
Uc14 chap10
Uc14 chap10Uc14 chap10
Uc14 chap10
 
Uc14 chap04
Uc14 chap04Uc14 chap04
Uc14 chap04
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01
 
Uc14 chap14
Uc14 chap14Uc14 chap14
Uc14 chap14
 
PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018PST SC015 Chapter 1 Intro. to IT 2017/2018
PST SC015 Chapter 1 Intro. to IT 2017/2018
 
Uc14 chap13
Uc14 chap13Uc14 chap13
Uc14 chap13
 
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
 
Uc13.chapter.01
Uc13.chapter.01Uc13.chapter.01
Uc13.chapter.01
 

Viewers also liked

The Road Not Taken by Robert Frost
The Road Not Taken by Robert FrostThe Road Not Taken by Robert Frost
The Road Not Taken by Robert Frostyaminohime
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...yaminohime
 
New Media and Wine
New Media and WineNew Media and Wine
New Media and WineVinTank
 
ITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIkratesng
 
An Introduction to Digital Audio
An Introduction to Digital AudioAn Introduction to Digital Audio
An Introduction to Digital AudioVilina Hutter
 
Digital Audio Workstations - Lesson 1 Assignment
Digital Audio Workstations - Lesson 1 AssignmentDigital Audio Workstations - Lesson 1 Assignment
Digital Audio Workstations - Lesson 1 AssignmentArtur Shamsutdinov
 
Sa Aking mga Kabata ni Jose Rizal
Sa Aking mga Kabata ni Jose RizalSa Aking mga Kabata ni Jose Rizal
Sa Aking mga Kabata ni Jose Rizalyaminohime
 
Library Research for Introduction to Digital Photography
Library Research for Introduction to Digital PhotographyLibrary Research for Introduction to Digital Photography
Library Research for Introduction to Digital PhotographyJenna Rinalducci
 
Career Opportunities in Information Technology
Career Opportunities in Information TechnologyCareer Opportunities in Information Technology
Career Opportunities in Information TechnologyJillian Faltyn
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...yaminohime
 
Introduction to digital photography
Introduction to digital photographyIntroduction to digital photography
Introduction to digital photographyusjcb
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide webhaider ali
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systemscpashke
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 

Viewers also liked (18)

Uc14 chap03
Uc14 chap03Uc14 chap03
Uc14 chap03
 
Chapter 8 E-Mail
Chapter 8 E-MailChapter 8 E-Mail
Chapter 8 E-Mail
 
The Road Not Taken by Robert Frost
The Road Not Taken by Robert FrostThe Road Not Taken by Robert Frost
The Road Not Taken by Robert Frost
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 6 - Applica...
 
New Media and Wine
New Media and WineNew Media and Wine
New Media and Wine
 
ITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio II
 
An Introduction to Digital Audio
An Introduction to Digital AudioAn Introduction to Digital Audio
An Introduction to Digital Audio
 
Digital Audio Workstations - Lesson 1 Assignment
Digital Audio Workstations - Lesson 1 AssignmentDigital Audio Workstations - Lesson 1 Assignment
Digital Audio Workstations - Lesson 1 Assignment
 
Sa Aking mga Kabata ni Jose Rizal
Sa Aking mga Kabata ni Jose RizalSa Aking mga Kabata ni Jose Rizal
Sa Aking mga Kabata ni Jose Rizal
 
Library Research for Introduction to Digital Photography
Library Research for Introduction to Digital PhotographyLibrary Research for Introduction to Digital Photography
Library Research for Introduction to Digital Photography
 
Career Opportunities in Information Technology
Career Opportunities in Information TechnologyCareer Opportunities in Information Technology
Career Opportunities in Information Technology
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Computer operating systems
Computer operating systemsComputer operating systems
Computer operating systems
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...
 
Introduction to digital photography
Introduction to digital photographyIntroduction to digital photography
Introduction to digital photography
 
Chapter 2 the internet and world wide web
Chapter 2   the internet and world wide webChapter 2   the internet and world wide web
Chapter 2 the internet and world wide web
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systems
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 

Similar to Uc14 chap15

Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09ayahye
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qRamy Eltarras
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy cscHisyam Rosly
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Cleophas Rwemera
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfShahidMehmood285010
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 

Similar to Uc14 chap15 (20)

Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Ch14
Ch14Ch14
Ch14
 
Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01Ch14 091120101906-phpapp01
Ch14 091120101906-phpapp01
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdf
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Uc14 chap15

  • 2. Learning Objectives 1. Explain why all computer users should be concerned about computer security. 2. List some risks associated with hardware loss, hardware damage, and system failure, and understand ways to safeguard a computer against these risks. 3. Define software piracy and digital counterfeiting and explain how they may be prevented. 4. Explain what information privacy is and why computer users should be concerned about it. Understanding Computers: Today and Tomorrow, 14th Edition 2 2
  • 3. Learning Objectives 5. Describe some privacy concerns regarding databases, electronic profiling, spam, and telemarketing, and identify ways individuals can protect their privacy. 6. Discuss several types of electronic surveillance and monitoring and list ways individuals can protect their privacy. 7. Discuss the status of computer security and privacy legislation. Understanding Computers: Today and Tomorrow, 14th Edition 3
  • 4. Overview • This chapter covers: – Hardware loss, hardware damage, and system failure, and the safeguards that can help reduce the risk of a problem occurring due to these concerns – Software piracy and digital counterfeiting and steps that are being taken to prevent these computer crimes – Possible risks for personal privacy and precautions that can be taken to safeguard one’s privacy – Legislation related to computer security and privacy Understanding Computers: Today and Tomorrow, 14th Edition 4 4
  • 5. Why Be Concerned About Computer Security? • There are a number of security concerns related to computers that users should be concerned about, including: – Having a computer or other device stolen – Losing important data – Losing contact lists – Buying pirated or counterfeited products Understanding Computers: Today and Tomorrow, 14th Edition 5
  • 6. Hardware Loss, Hardware Damage, and System Failure • Hardware Loss – Can occur when a personal computer, USB flash drive, mobile device, or other piece of hardware is stolen, lost, damaged, or experiences a system failure – Hardware Theft • Most common type of hardware loss • Occurs when hardware is stolen from an individual or an organization • Often stolen from homes, businesses, cars, airports, hotels, and luggage or packages lost by airlines or shipping companies Understanding Computers: Today and Tomorrow, 14th Edition 6
  • 7. Hardware Loss, Hardware Damage, and System Failure • Often occurs for the value of the hardware, but increasingly for the information that might be contained on the hardware – C-level attacks, those targeting CEOs and CIOs, are growing • Hardware Damage – Can occur from power fluctuations, heat, dust, static, electricity, water, and abuse – Can be accidental or intentional Understanding Computers: Today and Tomorrow, 14th Edition 7
  • 8. Hardware Loss, Hardware Damage, and System Failure • System Failure and Other Disasters – The complete malfunction of a computer system • Can be due to a hardware problem, software problem, or computer virus • Can be due to a natural disaster or planned attack Understanding Computers: Today and Tomorrow, 14th Edition 8
  • 9. Hardware Loss, Hardware Damage, and System Failure • Protecting Against Hardware Loss, Hardware Damage, and System Failure – Door and Computer Equipment Locks • Cable locks • Security slots • Cable anchors • Laptop alarm software • Lock up USB flash drives, external hard drives, and other media Understanding Computers: Today and Tomorrow, 14th Edition 9
  • 10. Hardware Loss, Hardware Damage, and System Failure – Encryption and Self-Encrypting Hard Drives • Use encryption to protect data • Increasingly used with USB flash drives, portable computers, external hard drives, etc. • Full Disk Encryption (FDE) – Everything on the storage medium is encrypted • Self-Encrypting Hard Drive – A hard drive using FDE – Used most often with portable computers Understanding Computers: Today and Tomorrow, 14th Edition 10
  • 11. Hardware Loss, Hardware Damage, and System Failure – Computer Tracking Software and Antitheft Tools • Used to find a computer or other device after it is lost or stolen • Sends out identifying data via the Internet • Law enforcement can use this data to recover the device • Stealth Tracking Software – The sending of data is transparent to the user • Kill Switch – Technology that causes the device to self-destruct Understanding Computers: Today and Tomorrow, 14th Edition 11
  • 12. Hardware Loss, Hardware Damage, and System Failure • Asset Tags – Identify the owner – Designed to be permanently attached • Tamper Evident Labels – Change their appearance if someone tries to remove them – Additional Precautions for Mobile Users • Mobile Device Management – Used by businesses to manage mobile devices used by employees Understanding Computers: Today and Tomorrow, 14th Edition 12
  • 13. Hardware Loss, Hardware Damage, and System Failure • Mobile Tracking Software – Usually part of MDM software – Locks down or wipes a lost or stolen phone – Displays a message with instructions for returning the device – Displays the current location of the device • Wireless Tether System – Ties phone to a key fob in order to sound an alarm and lock the phone if further away than the specified allowable distance Understanding Computers: Today and Tomorrow, 14th Edition 13
  • 14. Hardware Loss, Hardware Damage, and System Failure • Other Precautions – Use common sense and do not leave personal computers and mobile devices unattended Understanding Computers: Today and Tomorrow, 14th Edition 14
  • 15. Hardware Loss, Hardware Damage, and System Failure – Proper Hardware Care • Do not harm hardware physically • Use protective cases • Ruggedized devices are available – Designed to withstand much more physical abuse than conventional computers Understanding Computers: Today and Tomorrow, 14th Edition 15
  • 16. Hardware Loss, Hardware Damage, and System Failure Understanding Computers: Today and Tomorrow, 14th Edition 16
  • 17. Hardware Loss, Hardware Damage, and System Failure • Use surge suppressors – Protect hardware from damage due to electrical fluctuations • Use uninterruptible power supplies (UPSs) – Provide continuous power to a computer system for a period of time after the power goes off • Avoid exposing devices to dust, moisture, static, and heat • Avoid a head crash • Stop USB devices before removing • Use screen protectors, jewel cases, etc. Understanding Computers: Today and Tomorrow, 14th Edition 17
  • 18. Hardware Loss, Hardware Damage, and System Failure Understanding Computers: Today and Tomorrow, 14th Edition 18
  • 19. Hardware Loss, Hardware Damage, and System Failure – Backups and Disaster Recovery Plans • Both businesses and individuals should use appropriate backup procedures • Backup media needs to be secured – Data storage companies store backup media at secure remote locations – Online backup is another possibility • Continuous data protection (CDP) – Enables data backups to be made on a continual basis • Disaster-recovery plan – Describes the steps a company will take following the occurrence of a disaster Understanding Computers: Today and Tomorrow, 14th Edition 19
  • 20. Quick Quiz 1. Which of the following would not likely be a reason for stealing a notebook computer? a. For the data contained on the computer b. To use in a denial of service (DoS) attack c. For the value of the hardware 2. True or False: It is only important to use a surge suppressor during bad weather, when a lightning strike may occur. 3. A copy of a file that is created in case the original is damaged is called a(n) _____________. Answers: 1) b; 2) False; 3) backup Understanding Computers: Today and Tomorrow, 14th Edition 20
  • 21. Software Piracy and Digital Counterfeiting • Software Piracy – Unauthorized copying of a computer program occurs when: • Individuals make illegal copies of software to give to friends • Businesses or individuals install software on more than the number of computers allowed according to the end-user license agreement (EULA) • Sellers install unlicensed copies on computers sold to consumers • Large-scale operations in which programs and packaging are illegally duplicated and sold as supposedly legitimate products Understanding Computers: Today and Tomorrow, 14th Edition 21
  • 22. Software Piracy and Digital Counterfeiting Understanding Computers: Today and Tomorrow, 14th Edition 22
  • 23. Software Piracy and Digital Counterfeiting • Digital Counterfeiting – The use of computers or other types of digital equipment to make illegal copies of documents • Currency, checks, collectibles and other items • Often scanned and printed or color-copied – Illegal in the United States Understanding Computers: Today and Tomorrow, 14th Edition 23
  • 24. Software Piracy and Digital Counterfeiting • Protecting Against Software Piracy and Digital Counterfeiting – Software Antipiracy Tools • Educating businesses and consumers • Requiring a unique registration code or product key • Checking validity of a software installation before upgrades or other resources related to the program can be used • Watching online auction sites/lawsuits and requesting removal of suspicious items • Incorporating code into applications to inform the vendor when pirated copies are being used, or are in violation of the license Understanding Computers: Today and Tomorrow, 14th Edition 24
  • 25. Software Piracy and Digital Counterfeiting Understanding Computers: Today and Tomorrow, 14th Edition 25
  • 26. Software Piracy and Digital Counterfeiting – Digital Counterfeiting Prevention • New currency designs released every seven to ten years by the U.S. Treasury Department – Microprinting, watermarks, a security thread, and special paper are used • Identifying technology included in digital imaging hardware • Digital Watermarks and RFID tags can also be used to deter counterfeiting checks and ID cards – Digital watermark » Subtle alteration to a digital item that is not noticeable but that can be retrieved to identify the owner of the item Understanding Computers: Today and Tomorrow, 14th Edition 26
  • 27. Software Piracy and Digital Counterfeiting Understanding Computers: Today and Tomorrow, 14th Edition 27
  • 28. Quick Quiz 1. Using a computer to make illegal copies of currency to circulate as real currency is a form of _____________. a. software piracy b. computer sabotage c. digital counterfeiting 2. True or False: Software piracy is rarely performed today. 3. Printed text or an image on a CD case or box that changes its appearance when viewed from different angles to prove the item is authentic is called a(n) _____________. Answers: 1) c; 2) False; 3) hologram Understanding Computers: Today and Tomorrow, 14th Edition 28
  • 29. Why Be Concerned About Information Privacy? • Privacy – State of being concealed or free from unauthorized intrusion • Information Privacy – Rights of individuals and companies to control how information about them is collected and used • Computers add additional privacy challenges – Cookies and spyware are possible privacy risks – Many data breaches recently due to lost or stolen hardware, carelessness with documents containing sensitive data, etc. • Businesses need to be concerned with the expense, damage to reputation, and possible lawsuits – Spam, electronic surveillance, electronic monitoring present additional privacy concerns Understanding Computers: Today and Tomorrow, 14th Edition 29
  • 30. Databases, Electronic Profiling, Spam, and other Marketing Activities • Databases and Electronic Profiling – Unless data stored in databases is sufficiently protected, security breaches can occur – Marketing databases , government databases, and educational databases are at higher risk for personal privacy violations • Marketing Databases – Collection of marketing and demographic data about people and used for marketing purposes – Data obtained through online and offline purchases, public information, etc. Understanding Computers: Today and Tomorrow, 14th Edition 30
  • 31. Databases, Electronic Profiling, Spam, and other Marketing Activities – Data is also gathered from Web and social media activities » Facebook, MySpace, Google+, and location services such as Foursquare • Government Databases – Collection of data about people, collected and maintained by the government – Some information is confidential, other is public » Tax information, and Social Security earnings are private » Birth records, marriage and divorce information are public Understanding Computers: Today and Tomorrow, 14th Edition 31
  • 32. Databases, Electronic Profiling, Spam, and other Marketing Activities – Real ID Act of 2005 » Mandates the development of a national ID system that links driver’s license databases across the country – Much information about an individual is available for free on the Internet Understanding Computers: Today and Tomorrow, 14th Edition 32
  • 33. Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers: Today and Tomorrow, 14th Edition 33
  • 34. Databases, Electronic Profiling, Spam, and other Marketing Activities – Electronic Profiling • Using electronic means to collect a variety of in-depth information about an individual • Designed to provide specific information which is then sold to companies to be used for marketing purposes Understanding Computers: Today and Tomorrow, 14th Edition 34
  • 35. Databases, Electronic Profiling, Spam, and other Marketing Activities – Privacy Policy • Discloses how information you provide will be used • Included on many Web sites • Dictates how supplied information may be used, but can be changed and often without notice Understanding Computers: Today and Tomorrow, 14th Edition 35
  • 36. Databases, Electronic Profiling, Spam, and other Marketing Activities • Spam and Other Marketing Activities – Unsolicited, bulk e-mail sent over the Internet – Often involves health-related products, counterfeit products, fraudulent business opportunities, pornography, etc. – Marketing e-mails from companies a person has done business with – Appearing via instant messaging (spim) – Also delivered via mobile phones, social networking sites – CAN-SPAM Act of 2003 enacted some requirements and penalties for commercial e-mailers Understanding Computers: Today and Tomorrow, 14th Edition 36
  • 37. Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers: Today and Tomorrow, 14th Edition 37
  • 38. Databases, Electronic Profiling, Spam, and other Marketing Activities • Protecting the Privacy of Personal Information – Safeguard Your E-mail Address • Use one private e-mail address for trusted sources likes friends, family, and colleagues • Use a disposable e-mail address for online shopping, message boards, product registration, etc. Understanding Computers: Today and Tomorrow, 14th Edition 38
  • 39. Databases, Electronic Profiling, Spam, and other Marketing Activities – Be Cautious of Revealing Personal Information • Read a Web site’s privacy policy • Avoid putting too many personal details on your Web site • Use a throw-away email address when signing up for free trials or other services than may result in spam • Consider using privacy software, such as Anonymizer Universal or Privacy Guardian to hide personal information while browsing the Web • Supply only the required information in registration forms • Delete your browsing history and e-mail settings when using a public computer; use private browsing Understanding Computers: Today and Tomorrow, 14th Edition 39
  • 40. Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers: Today and Tomorrow, 14th Edition 40
  • 41. Databases, Electronic Profiling, Spam, and other Marketing Activities – Use Filters and Opt Out • Use an e-mail filter to automatically sort e-mail messages and route possible spam into a special folder to deal with later – E-mail filters used to catch spam are called spam filters • Opt Out – Request to be removed from marketing activities or that personal information not be shared with other companies – Some privacy groups want individuals to have to opt in to activities instead Understanding Computers: Today and Tomorrow, 14th Edition 41
  • 42. Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers: Today and Tomorrow, 14th Edition 42
  • 43. Databases, Electronic Profiling, Spam, and other Marketing Activities – Secure Servers and Otherwise Protect Personal Information • Only enter personal information on Web sites using secure servers • Automatic encryption systems for e-mail can help sensitive data from accidentally being revealed • Chief Privacy Officer (CPO) – Ensures that the private data stored by businesses in adequately protected Understanding Computers: Today and Tomorrow, 14th Edition 43
  • 44. Databases, Electronic Profiling, Spam, and other Marketing Activities – Properly Dispose of Hardware Containing Data • Wipe (not just delete) data on hard drives before disposing of a computer or hard drive • Storage media containing sensitive data should be shredded • Businesses should have a media sanitation/data destruction policy Understanding Computers: Today and Tomorrow, 14th Edition 44
  • 45. Electronic Surveillance and Monitoring • Computer Monitoring Software – Records an individual’s computer usage either by capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites visited – Can be used in homes by adults to monitor computer usage of children or spouse – Can be used in businesses to monitor employee computer usage – Keystroke-logging programs • Used to capture keystrokes • Can be used by hacker to capture usernames, passwords, and other sensitive information entered into a computer via the keyboard Understanding Computers: Today and Tomorrow, 14th Edition 45
  • 46. Electronic Surveillance and Monitoring Understanding Computers: Today and Tomorrow, 14th Edition 46
  • 47. Electronic Surveillance and Monitoring • Video Surveillance – The use of video cameras to monitor activities of individuals – Used to monitor employees – Used in public locations for crime-prevention purposes • Stores and other businesses, public streets, subways, airports, etc. – Can be used with face recognition software • Identify terrorists and other known criminals – Privacy advocates object to the use of video surveillance and face recognition technology in public places – Privacy concerns also exist regarding digital cameras capabilities in mobile phones Understanding Computers: Today and Tomorrow, 14th Edition 47
  • 48. Electronic Surveillance and Monitoring Understanding Computers: Today and Tomorrow, 14th Edition 48
  • 49. Electronic Surveillance and Monitoring • Employee Monitoring – Observing or recording employees’ actions while they are on the job; legal and quite common – Can monitor computer usage, phone calls, e-mail, etc. – Can monitor physical location • Video cameras • GPS capabilities built into cars or mobile phones • Proximity cards – Can also be used to access a facility, computer, etc. – Businesses should notify employees of monitoring Understanding Computers: Today and Tomorrow, 14th Edition 49
  • 50. Electronic Surveillance and Monitoring • Presence Technology – Enables one computing device on a network to locate and identify the current status of another device on the same network – Can tell if a someone is using his/her computer or mobile phone – Can locate co-workers – May also be used for marketing activities in the future – Potential privacy concerns Understanding Computers: Today and Tomorrow, 14th Edition 50
  • 51. Electronic Surveillance and Monitoring • Protecting Personal and Workspace Privacy – Can use antispyware software to detect and remove some types of illegal computer monitoring and spyware software Understanding Computers: Today and Tomorrow, 14th Edition 51
  • 52. Electronic Surveillance and Monitoring – The Employer’s Responsibilities • Keep company, employee, and customer information private and secure – Ensure employee activities are not being monitored by a hacker or other unauthorized individual • Have an employee policy that informs employees about company’s monitoring activities – The Employees’ Responsibilities • Read the company’s employee policy • Avoid personal activities at work Understanding Computers: Today and Tomorrow, 14th Edition 52
  • 53. Computer Security and Privacy Legislation • A variety of laws have been passed since the 1970s due to the high level of concern about computer security and personal privacy – Several pieces of legislation have been introduced but not yet passed • Do Not Track Me Online Act • Do Not Track Kids Act of 2011 • Best Practices Act • Difficult for legal system to keep pace with technology changes • Difficult to balance freedom of speech with right to privacy Understanding Computers: Today and Tomorrow, 14th Edition 53
  • 54. Computer Security and Privacy Legislation Understanding Computers: Today and Tomorrow, 14th Edition 54
  • 55. Computer Security and Privacy Legislation Understanding Computers: Today and Tomorrow, 14th Edition 55
  • 56. Quick Quiz 1. A document that discloses how your personal information will be used is called a(n) _____________. a. privacy policy b. opt out c. throw-away e-mail address 2. True or False: The problem of protecting personal privacy and keeping personal information private did not exist before computers and the Internet. 3. The ability of one computing device on a network to identity the status of another device on that network is known as _____________. Answers: 1) a; 2) False; 3) presence technology Understanding Computers: Today and Tomorrow, 14th Edition 56
  • 57. Summary • • • • • Why Be Concerned About Computer Security? Hardware Loss, Hardware Damage, and System Failure Software Piracy and Digital Counterfeiting Why Be Concerned About Information Privacy? Databases, Electronic Profiling, Spam, and Other Marketing Activities • Electronic Surveillance and Monitoring • Computer Security and Privacy Legislation Understanding Computers: Today and Tomorrow, 14th Edition 57