This chapter covers:
- Hardware loss, hardware damage, and system failure, and the safeguards that can help reduce the risk of a problem occurring due to these concerns
- Software piracy and digital counterfeiting and steps that are being taken to prevent these computer crimes
- Possible risks for personal privacy violations due to databases, marketing activities, electronic surveillance, and monitoring, and precautions that can be taken to safeguard one’s privacy
This chapter covers:
- Security concerns stemming from the use of computer networks
- Safeguards and precautions that can be taken to reduce the risk of problems related to these security concerns
- Personal safety issues related to the Internet
- Ways to protect against personal safety issues
- Legislation related to network and Internet security
This chapter covers:
- Different types of keyboards and pointing devices
- Types of scanners, readers, and digital cameras
- Audio input devices
- Types of display devices and how they work
- Types of printers and how they work
- Audio output
This chapter covers:
- Security concerns stemming from the use of computer networks
- Safeguards and precautions that can be taken to reduce the risk of problems related to these security concerns
- Personal safety issues related to the Internet
- Ways to protect against personal safety issues
- Legislation related to network and Internet security
This chapter covers:
- Different types of keyboards and pointing devices
- Types of scanners, readers, and digital cameras
- Audio input devices
- Types of display devices and how they work
- Types of printers and how they work
- Audio output
Objectives
- Explain what e-commerce is and describe some of the advantages and disadvantages involved with implementing e-commerce.
- Identify a variety of e-commerce business models and discuss their differences.
- Discuss the types of Web sites that can be used to implement e-commerce.
- List several strategies for implementing e-commerce using the Web, including some of the decisions that need to be made, the options available for accepting payments, and the process of designing and developing an effective Web site.
- Outline some sales and marketing strategies that can be used in conjunction with an e-commerce Web site.
- Discuss some security issues related to e-commerce sites.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...yaminohime
Objectives
- Understand how data and programs are represented to a computer and be able to identify a few of the coding systems used to accomplish this.
- Explain the functions of the hardware components commonly found inside the system unit, such as the CPU, memory, buses, and expansion cards.
- Describe how new peripheral devices or other hardware can be added to a computer.
- Understand how the computer system’s CPU and memory components process program instructions and data.
- Name and evaluate several strategies that can be used today for speeding up the operations of a computer.
- List some technologies that may be used in the future computers.
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
This chapter covers:
- What computers are, how they work, and how they are used
- Computer terminology
- An overview of the history of computers
- The basic types of computers in use today
- An overview of networks and the Internet
- Societal impacts of computers
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
Objectives
- Describe what application software is, the different types of ownership rights, and the difference between installed and Web-based software.
- Detail some concepts and commands that many software programs have in common.
- Discuss word processing and explain what kinds of documents are created using this type of program.
- Explain the purpose of spreadsheet software and the kinds of documents created using this type of program.
- Identify some of the vocabulary used with database software and discuss the benefits of using this type of program.
- Describe what presentation graphics and electronic slide shows are and when they might be used.
- List some types of graphics and multimedia software consumers frequently use.
- Name other types of application software programs and discuss what functions they perform.
Objectives
- Explain what e-commerce is and describe some of the advantages and disadvantages involved with implementing e-commerce.
- Identify a variety of e-commerce business models and discuss their differences.
- Discuss the types of Web sites that can be used to implement e-commerce.
- List several strategies for implementing e-commerce using the Web, including some of the decisions that need to be made, the options available for accepting payments, and the process of designing and developing an effective Web site.
- Outline some sales and marketing strategies that can be used in conjunction with an e-commerce Web site.
- Discuss some security issues related to e-commerce sites.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...yaminohime
Objectives
- Understand how data and programs are represented to a computer and be able to identify a few of the coding systems used to accomplish this.
- Explain the functions of the hardware components commonly found inside the system unit, such as the CPU, memory, buses, and expansion cards.
- Describe how new peripheral devices or other hardware can be added to a computer.
- Understand how the computer system’s CPU and memory components process program instructions and data.
- Name and evaluate several strategies that can be used today for speeding up the operations of a computer.
- List some technologies that may be used in the future computers.
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
This chapter covers:
- What computers are, how they work, and how they are used
- Computer terminology
- An overview of the history of computers
- The basic types of computers in use today
- An overview of networks and the Internet
- Societal impacts of computers
Objectives
- Name several general properties of storage systems.
- Describe the two most common types of hard drives and what they are used for today.
- Discuss the various types of optical discs available and how they differ from each other.
- Identify some flash-memory-based storage devices and media and explain how they are used today.
- List at least three other types of storage systems.
- Summarize the storage alternatives for a typical personal computer.
Objectives
- Describe what application software is, the different types of ownership rights, and the difference between installed and Web-based software.
- Detail some concepts and commands that many software programs have in common.
- Discuss word processing and explain what kinds of documents are created using this type of program.
- Explain the purpose of spreadsheet software and the kinds of documents created using this type of program.
- Identify some of the vocabulary used with database software and discuss the benefits of using this type of program.
- Describe what presentation graphics and electronic slide shows are and when they might be used.
- List some types of graphics and multimedia software consumers frequently use.
- Name other types of application software programs and discuss what functions they perform.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...yaminohime
Objectives
- Understand the difference between system software and application software.
- Explain the different functions of an operating system and discuss some ways that operating systems can enhance processing efficiency.
- List several ways in which operating systems differ from one another.
- Name today’s most widely used operating systems for personal computers and servers.
-State several devices other than personal computers and servers that require an operating system and list one possible operating system for each type of device.
- Discuss the role of utility programs and outline several tasks these programs perform.
- Describe what the operating systems of the future might be like.
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 8 - The Int...yaminohime
This chapter covers:
The evolution of the Internet
The Internet community
Different options for connecting to the Internet
Internet searching
Common Internet applications available via the Internet
Societal issues that apply to Internet use
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
Borrow GAMA's privacy team as your CPO for the evening with a review of compliance with domestic and international privacy and security law. Get your company ready for changes in California in 2014 as well as what may be on the horizon in the privacy and security space.
This chapter covers:
- What Web-based multimedia is and how it is used today
- The advantages and disadvantages of using multimedia
- A look at basic multimedia elements
- Steps and principles in designing a multimedia site
- How a multimedia Web site is developed and the software used during this process
- A look at the future of Web-based multimedia
This chapter covers:
- How information systems are used and who uses them
- Common types of information systems
- Computer professionals who develop systems and their primary responsibilities
- The system development life cycle (SDLC)
- The major approaches to system development
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
This chapter covers:
- The most common approaches to program design and development
- The phases of the program development life cycle (PDLC)
- Tools that can be used to design and develop a program
- Good program design techniques and types of program errors
- Common programming languages
This chapter covers:
- Common networking and communications applications
- Networking concepts and terminology
- Technical issues related to networks, including general characteristics of data transmission, and types of transmission media in use today
- Explanation of the various communications protocols and networking standards
- Various types of hardware used with a computer network
Ito yung isa sa mga binasa naman nung nasa highschool. Originally Japanese siya, trinanslate sa Tagalog. Kwento siya ng dalawang bulag na naisipang mamasyal at may isang epal na sinira ang pagkakaibigan nila.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
2. Understanding Computers: Today and Tomorrow, 13th Edition
2
Overview
• This chapter covers:
– Hardware loss, hardware damage, and system
failure, and the safeguards that can help reduce the
risk of a problem occurring due to these concerns
– Software piracy and digital counterfeiting and steps
that are being taken to prevent these computer
crimes
– Possible risks for personal privacy violations due to
databases, marketing activities, electronic
surveillance, and monitoring, and precautions that can
be taken to safeguard one’s privacy
3. Understanding Computers: Today and Tomorrow, 13th Edition
3
Why Be Concerned About Computer Security?
• There are a number of security concerns related to
computers that users should be aware of, including:
– Having a computer or other device stolen
– Losing important data
– Losing contact lists
– Buying pirated or counterfeited products
4. Understanding Computers: Today and Tomorrow, 13th Edition
4
Hardware Loss, Damage, and System Failure
• Hardware loss: Can occur when a personal computer,
USB flash drive, mobile device, or other piece of
hardware is stolen, lost, or damaged
– Hardware theft: When hardware is stolen from an
individual or an organization
• Often stolen from homes, businesses, cars,
airports, hotels, etc.
• Often occurs for the value of the hardware, but
increasingly for the information that might be
contained on the hardware
5. Understanding Computers: Today and Tomorrow, 13th Edition
5
Hardware Loss, Damage, and System Failure
• Hardware damage: Can be accidental or intentional
• System failure: The complete malfunction of a computer
system
– Can be due to a hardware problem, software
problem, or computer virus
– Can be due to a natural disaster or planned attack
6. Understanding Computers: Today and Tomorrow, 13th Edition
6
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
• Use door and computer equipment locks
– Cable locks
– Security slots
– Cable anchors
– Laptop alarm
software
– Lock up USB
flash drives,
external hard
drives, and
other media
7. Understanding Computers: Today and Tomorrow, 13th Edition
7
• Use encryption to protect
data
– Increasingly used with
USB flash drives,
portable computers,
external hard drives, etc.
– Full disk encryption
(FDE): Everything on the
storage medium is
encrypted
– Self-encrypting hard
drive: A hard drive using
FDE
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
8. Understanding Computers: Today and Tomorrow, 13th Edition
8
• Computer tracking software: Used to find a computer or
other device after it is lost or stolen
– Sends out identifying data via the Internet
– Law enforcement can use this data to recover the
device
– Stealth tracking software: The sending of data is
transparent to the user
– Kill switch: Technology that causes the device to self-
destruct
• Other precautions:
– Asset tags, tamper evident labels, etc.
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
9. Understanding Computers: Today and Tomorrow, 13th Edition
9
• Additional precautions for mobile users
– Most important is to use
common sense
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
10. Understanding Computers: Today and Tomorrow, 13th Edition
10
• Proper hardware care
– Don’t abuse hardware
– Use protective cases
– Ruggedized devices
available
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
11. Understanding Computers: Today and Tomorrow, 13th Edition
11
– Surge suppressors:
Protect hardware from
damage due to electrical
fluctuations
– Uninterruptible power
supplies (UPSs):
Provide continuous
power to a computer
system for a period of
time after the power
goes off
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
12. Understanding Computers: Today and Tomorrow, 13th Edition
12
– Also:
• Watch dust, moisture,
static, heat, etc.
• Avoid head crash
• Stop USB devices
before removing
• Use screen protectors,
jewel cases, etc.
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
13. Understanding Computers: Today and Tomorrow, 13th Edition
13
• Backup and disaster recovery plans:
– Both businesses and individuals should use
appropriate backup procedures
– Backup media needs to be secured
• Data storage companies store backup media at
secure remote locations
• Online backup is another possibility
– Continuous data protection (CDP): Enables data
backups to be made on a continual basis
– Disaster-recovery plan: Describes the steps a
company will take following the occurrence of a
disaster
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
14. Understanding Computers: Today and Tomorrow, 13th Edition
14
Quick Quiz
1. Which of the following would not likely be a reason for
stealing a notebook computer?
a. For the data contained on the computer
b. To use in a denial of service (DoS) attack
c. For the value of the hardware
2. True or False: It is only important to use a surge
suppressor during bad weather, when a lightning strike
may occur.
3. A copy of a file that is created in case the original is
damaged is called a(n) _____________.
Answers:
1) b; 2) False; 3) backup
15. Understanding Computers: Today and Tomorrow, 13th Edition
15
Software Piracy and Digital Counterfeiting
• Software piracy: Unauthorized copying of a computer
program
– Occurs when:
• Individuals make illegal copies of software to give
to friends
• Businesses or individuals install software on more
than the number of computers allowed according
to the end-user license agreement (EULA)
• Sellers install unlicensed copies on computers sold
to consumers
• Large-scale operations in which programs and
packaging are illegally duplicated and sold as
supposedly legitimate products
16. Understanding Computers: Today and Tomorrow, 13th Edition
16
Software Piracy and Digital Counterfeiting
• Digital counterfeiting: The
use of computers or other
types of digital equipment to
make illegal copies
documents
– Currency, checks,
collectibles and other
items
– Often scanned and
printed or color-copied
17. Understanding Computers: Today and Tomorrow, 13th Edition
17
Protection Against Software Piracy and
Digital Counterfeiting
• Software antipiracy tools
– Educating businesses and consumers
– Registration code or product key
– Checking validity of a software installation before
upgrades or other resources related to the program
can be used
– Watching online auction sites/lawsuits
– Incorporating code into applications to inform the
vendor when pirated copies are being used, or is in
violation of the license
18. Understanding Computers: Today and Tomorrow, 13th Edition
Protection Against Software Piracy and
Digital Counterfeiting
18
19. Understanding Computers: Today and Tomorrow, 13th Edition
19
Protection Against Software Piracy and
Digital Counterfeiting
• Digital counterfeiting prevention
– New currency designs
• Microprinting, watermarks, security thread, etc.
• Special paper is used with U.S. currency
– Identifying technology included in digital imaging
hardware
– Digital watermarks: Subtle alteration to a digital item
that is not noticeable but that can be retrieved to
identify the owner of the item
– Also can use:
• RFID tags and other hard-to-reproduce content
20. Understanding Computers: Today and Tomorrow, 13th Edition
20
Protection Against Software Piracy and
Digital Counterfeiting
21. Understanding Computers: Today and Tomorrow, 13th Edition
21
Quick Quiz
1. Using a computer to make illegal copies of currency to
circulate as real currency is a form of _____________.
a. software piracy
b. computer sabotage
c. digital counterfeiting
2. True or False: Software piracy is rarely performed today.
3. Printed text or an image on a CD case or box that
changes its appearance when viewed from different
angles to prove the item is authentic is called a(n)
_____________.
Answers:
1) c; 2) False; 3) hologram
22. Understanding Computers: Today and Tomorrow, 13th Edition
22
Why Be Concerned About
Information Privacy?
• Privacy: State of being concealed or free from
unauthorized intrusion
• Information privacy: Rights of individuals and companies
to control how information about them is collected and
used
• Computers add additional privacy challenges
– Many data breaches recently due to lost or stolen
hardware, carelessness with documents containing
sensitive data, etc.
• Businesses need to be concerned with the
expense, damage to reputation, and possible
lawsuits
23. Understanding Computers: Today and Tomorrow, 13th Edition
23
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
• Marketing database: Collection of data about people,
used for marketing purposes
– Data obtained through online and offline purchases,
public information, etc.
– Used in conjunction with Web activities
• Social activity and searches performed
• Government database: Collection of data about people,
collected and maintained by the government
– Tax information, Social Security earnings, personal
health records, marriage and divorce information
– Some information is confidential, other is public
24. Understanding Computers: Today and Tomorrow, 13th Edition
24
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
25. Understanding Computers: Today and Tomorrow, 13th Edition
25
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
• Electronic profiling
– Using electronic means to collect a variety of in-depth
information about an individual
26. Understanding Computers: Today and Tomorrow, 13th Edition
26
Databases, Electronic Profiling, Spam, and
Other Marketing Activities
• Privacy policy: Discloses how information you provide
will be used
– Included on many Web sites
– Dictates how supplied information may be used, but
can be changed and often without notice
27. Understanding Computers: Today and Tomorrow, 13th Edition
27
Spam and Other Marketing Activities
• Spam: Unsolicited, bulk e-mail sent over the Internet
– Often involves health-related products, counterfeit
products, fraudulent business opportunities,
pornography, etc.
– Marketing e-mails from companies a person has
done business with
– Appearing via instant messaging (spim)
– Also delivered via mobile phones, social networking
sites
29. Understanding Computers: Today and Tomorrow, 13th Edition
29
Protecting the Privacy of
Personal Information
• Safeguard your e-mail address
– Use a throw-away e-mail
address (an extra e-mail
address that you can use
for activities that might
result in spam)
• Get a second e-mail
address from your ISP
or from Hotmail,
Yahoo! Mail, or Gmail
• Can stop using it
and get a new one
when needed
30. Understanding Computers: Today and Tomorrow, 13th Edition
30
Protecting the Privacy of
Personal Information
• Be cautious of revealing personal information
– Read a Web site’s privacy policy
– Avoid putting too many personal details on your Web
site
– Be wary of sites offering prizes in exchange for
personal information
– Consider using privacy software, such as anonymous
surfing
– Supply only the required information in registration
forms
– Delete your browsing history and e-mail settings
when using a public computer
32. Understanding Computers: Today and Tomorrow, 13th Edition
32
Protecting the Privacy of
Personal Information
• Use an e-mail filter to automatically route possible spam
into a special folder to deal with later
33. Understanding Computers: Today and Tomorrow, 13th Edition
33
Protecting the Privacy of
Personal Information
• Can opt out from marketing activities
– Some privacy groups want individuals to have to opt
in to activities instead
• Web servers holding sensitive data should be secured
– Only enter personal information on Web sites using
secure servers
– Automatic encryption systems for e-mail can help
sensitive data from accidentally being revealed
34. Understanding Computers: Today and Tomorrow, 13th Edition
34
Protecting the Privacy of
Personal Information
• Properly dispose of hardware
and outdated data
– Wipe (not just delete) data on
hard drives before
disposing of a computer or
hard drive
– Storage media containing
sensitive data should be
shredded
– Businesses should have a
media sanitation/data
destruction policy
35. Understanding Computers: Today and Tomorrow, 13th Edition
35
Online Video
“Google Search Privacy: Personalized Search”
(click below to start video)
Reminder: The complete set of online videos and video podcasts are available at:
www.cengage.com/computerconcepts/np/uc13
Courtesy of Google Inc.
36. Understanding Computers: Today and Tomorrow, 13th Edition
36
Electronic Surveillance and Monitoring
• Computer monitoring software: Records an individual’s
computer usage either by capturing images of the
screen, recording the actual keystrokes used, or creating
a summary of Web sites visited
– Can be used in homes by adults to monitor computer
usage of children or spouse
– Can be used in businesses to monitor employee
computer usage
– Keystroke-logging programs: Used to capture
keystrokes
• Can be used by hacker to capture usernames,
passwords, and other sensitive information entered
into a computer via the keyboard
38. Understanding Computers: Today and Tomorrow, 13th Edition
38
Electronic Surveillance and Monitoring
• Video surveillance: The use of video cameras to monitor
activities of individuals
– Used to monitor employees
– Used in public locations for crime-prevention
purposes
• Stores and other businesses, Public streets
• Subways, airports, etc.
– Can be used with face recognition software
• Identify terrorists and other known criminals
– Privacy issues also involved with the use of camera
phones
40. Understanding Computers: Today and Tomorrow, 13th Edition
40
Electronic Surveillance and Monitoring
• Employee monitoring: Observing or recording employees’
actions while they are on the job
– Can monitor computer usage,
phone calls, e-mail, etc.
– Can monitor physical location
• Video cameras
• GPS capabilities built into cars
or mobile phones
• Proximity cards
– Can also be used to access
a facility, computer, etc.
– Businesses should notify employees of monitoring
41. Understanding Computers: Today and Tomorrow, 13th Edition
41
Electronic Surveillance and Monitoring
• Presence technology: Enables one computing device to
locate and identify the current status of another device
on the same network
– Instant messaging, mobile phones, etc.
– Can be used to locate co-workers
or by customers
– May also be used for marketing
activities in the future
– Potential privacy violations
42. Understanding Computers: Today and Tomorrow, 13th Edition
42
Protecting Personal and
Workspace Privacy
• Can use antispyware software to detect and remove
some types of illegal computer monitoring and spyware
software
• Employers have a responsibility to keep employee and
customer information private and secured
• Employees should be familiar with their company’s
employee policy and avoid
personal activities at work
43. Understanding Computers: Today and Tomorrow, 13th Edition
43
Quick Quiz
1. A document that discloses how your personal information
will be used is called a(n) _____________.
a. privacy policy
b. opt out
c. throw-away e-mail address
2. True or False: The problem of protecting personal privacy
and keeping personal information private did not exist
before computers and the Internet.
3. The ability of one computing device on a network to
identity the status of another device on that network is
known as _____________.
Answers:
1) a; 2) False; 3) presence technology
44. Understanding Computers: Today and Tomorrow, 13th Edition
44
Summary
• Why Be Concerned About Computer Security
• Hardware Loss, Hardware Damage, and System Failure
• Software Piracy and Digital Counterfeiting
• Why Be Concerned About Information Privacy
• Databases, Electronic Profiling, Spam, and Other
Marketing Activities
• Electronic Surveillance and Monitoring
• Computer Security and Privacy Legislation