计算机专业英语课件-CE-Chap09.ppt

上传人(卖家):三亚风情 文档编号:3256987 上传时间:2022-08-13 格式:PPT 页数:23 大小:3.54MB
下载 相关 举报
计算机专业英语课件-CE-Chap09.ppt_第1页
第1页 / 共23页
计算机专业英语课件-CE-Chap09.ppt_第2页
第2页 / 共23页
计算机专业英语课件-CE-Chap09.ppt_第3页
第3页 / 共23页
计算机专业英语课件-CE-Chap09.ppt_第4页
第4页 / 共23页
计算机专业英语课件-CE-Chap09.ppt_第5页
第5页 / 共23页
点击查看更多>>
资源描述

1、Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in w

2、hole or part.2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computing Essentials 2014Pr

3、ivacy,Security,Privacy,Security,and Ethicsand EthicsChapter 9 Chapter 9 Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be cop

4、ied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Competencies(Page 1 of 3)Competencies(Page 1 of 3)Identify the most significant concerns Identify the most significant concerns for effective implementation of computer for effective implementation of computer techn

5、ology.technology.Discuss the primary privacy issues of Discuss the primary privacy issues of accuracy,property,and access.accuracy,property,and access.Describe the impact of large databases,Describe the impact of large databases,private networks,the Internet,and the private networks,the Internet,and

6、 the Web on privacy.Web on privacy.Discuss online identity and major laws Discuss online identity and major laws on privacy.on privacy.2Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for

7、 sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Competencies(Page Competencies(Page 2 2 of 3)of 3)Discuss cybercrimes including creation Discuss cybercrimes including creation of malicious programs s

8、uch as viruses,of malicious programs such as viruses,worms,Trojan horse,and zombies as worms,Trojan horse,and zombies as well as denial of service attacks,well as denial of service attacks,Internet scams,social networking Internet scams,social networking risks,risks,cyberbullyingcyberbullying,rogue

9、Wi-Fi,rogue Wi-Fi hotspots,theft,and data manipulation.hotspots,theft,and data manipulation.Detail ways to protect computer Detail ways to protect computer security including restricting access,security including restricting access,encrypting data,anticipating encrypting data,anticipating disasters,

10、and preventing data loss.disasters,and preventing data loss.3Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned

11、,duplicated,forwarded,distributed,or posted on a website,in whole or part.Competencies(Page Competencies(Page 3 3 of 3)of 3)Discuss computer ethics including Discuss computer ethics including copyright law,software piracy,copyright law,software piracy,digital rights management,the digital rights man

12、agement,the Digital Millennium Copyright Act,as Digital Millennium Copyright Act,as well as plagiarism and ways to well as plagiarism and ways to identify plagiarism.identify plagiarism.4Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material sole

13、ly for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.IntroductionIntroductionThe ubiquitous use of computers and The ubiquitous use of computers and tech

14、nology prompts some very technology prompts some very important questions about the use of important questions about the use of personal data and our right to personal data and our right to privacy.privacy.This chapter covers issuesThis chapter covers issuesrelated to the impact ofrelated to the imp

15、act oftechnology on people andtechnology on people andhow to protect ourselveshow to protect ourselveson the Web.on the Web.5Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or di

16、stribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.PeoplePeoplePrivacyPrivacy What are the threats to personal What are the threats to personal privacy and how can we protect ourselves?privacy and how can we prote

17、ct ourselves?SecuritySecurity How can access How can access to sensitive to sensitive information be controlled and how can we information be controlled and how can we secure hardware and software?secure hardware and software?EthicsEthics How do the actions of individual How do the actions of indivi

18、dual users and companies affect society?users and companies affect society?6Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be

19、 copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.PrivacyPrivacyPrivacy concerns the collection Privacy concerns the collection and use of data about individualsand use of data about individualsThree primary privacy issues:Three primary privacy issues:AccuracyP

20、ropertyAccess7Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on

21、a website,in whole or part.Large Large Databases(Page 1 of 2)Databases(Page 1 of 2)Large organizations Large organizations compile information compile information about us.about us.Federal Federal government government has over has over 2,000 2,000 databasesdatabases Telephone companiesTelephone com

22、panies Reverse directory lists of calls we make SupermarketsSupermarkets What we buy and when8Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This d

23、ocument may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Large Large Databases(Page 2 of 2)Databases(Page 2 of 2)Information resellers or information Information resellers or information brokersbrokers Collect and sell personal data Electronic profil

24、es easily created Personal Personal information is a marketable information is a marketable commodity,which raises many issues:commodity,which raises many issues:Collecting public,but personally identifying information(e.g.,Googles Street View)Spreading information without personal consent,leading t

25、o identity theft Spreading inaccurate information Mistaken identity Freedom of Information Act 9Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This

26、 document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Private NetworksPrivate NetworksEmployers can monitor e-mail legallyEmployers can monitor e-mail legally75 percent of all businesses search employees electronic mail and computer files using

27、snoopwareA proposed law could prohibit this type of electronic monitoring or at least require theemployer to notify the employee first10Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for

28、 sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Viewing and Blocking Viewing and Blocking CookiesCookiesCookies Cookies Small pieces of information that are deposited on your hard disk from web sites

29、 you have visitedFirst-party cookiesThird-party cookies11Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,dup

30、licated,forwarded,distributed,or posted on a website,in whole or part.Online IdentityOnline IdentityThe information that people The information that people voluntarily post about themselves voluntarily post about themselves onlineonlineArchiving and search features of the Archiving and search featur

31、es of the Web make it available indefinitelyWeb make it available indefinitelyMajor Laws on PrivacyMajor Laws on PrivacyGramm-Leach-Bliley ActHealth Insurance Portability and Accountability Act(HIPAA)Family Educational Rights and Privacy Act(FERPA)12Computing Essentials 2014Privacy,Security and Ethi

32、cs 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.SecuritySecurityCybercrime or compute

33、r crime is any Cybercrime or computer crime is any offense that involves a computer and offense that involves a computer and a networka networkHackersHackersGain unauthorized access13Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely f

34、or authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computer Crime(Page 1 of 3)Computer Crime(Page 1 of 3)Malicious Programs-Malicious Programs-MalwareMalwa

35、reVirusesWormsTrojan horseZombiesDenial of Service Denial of Service(DoS)attack14Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may n

36、ot be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computer Crime(Page 2 of 3)Computer Crime(Page 2 of 3)Internet scamsInternet scamsPhishing15Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solel

37、y for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computer Crime(Page 3 of Computer Crime(Page 3 of 3 3)Social networking Social networking risksrisksC

38、yber-bullyingCyber-bullyingRogue Wi-Fi Rogue Wi-Fi hotspotshotspotsTheft Theft Data manipulation Data manipulation Computer Fraud and Abuse Act16Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not autho

39、rized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Making IT Work for You Security SuitesMaking IT Work for You Security SuitesSecurity Suites Security Suites are software are software packages

40、 that packages that include various include various utilities that utilities that help protect help protect your computer your computer from cybercrime.from cybercrime.17Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized

41、 instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Making IT Work for You Cloud-Based BackupMaking IT Work for You Cloud-Based BackupCloud-based Cloud-based backup serv

42、ices backup services such as such as Carbonite Carbonite provide cloud-provide cloud-based backup based backup services.services.18Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale

43、 or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.EthicsEthics Standards of moral conductStandards of moral conduct CopyrightCopyright Gives content creators the right to control the use and distribution of

44、 their work Paintings,books,music,films,video games Software piracySoftware piracy Unauthorized copying and distribution Digital Millennium Copyright Act Digital rights management(DRM)Plagiarism Plagiarism 19Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This prop

45、rietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Careers in ITCareers in ITIT Security Analysts IT Security Analysts maintain th

46、e security of maintain the security of a companys network,a companys network,systems,and data.systems,and data.Must safeguard Must safeguard information systems information systems against external threatsagainst external threatsAnnual Annual salary is usually salary is usually from$62,000 from$62,0

47、00 to to$101,000$101,000Demand for this position Demand for this position is expected to growis expected to grow20Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution

48、in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.A Look to the FutureA Look to the FutureA Webcam on Every Corner A Webcam on Every Corner Images of public places are more accessible than ever before(e.g.,Google Street Vie

49、w)“Virtual site-seeing tours”Public webcams continue to grow in popularity 21Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not b

50、e copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Open-Ended Questions(Page 1 of 3)Open-Ended Questions(Page 1 of 3)Define privacy and discuss the impact of large Define privacy and discuss the impact of large databases,private networks,the Internet,and databa

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 办公、行业 > 各类PPT课件(模板)
版权提示 | 免责声明

1,本文(计算机专业英语课件-CE-Chap09.ppt)为本站会员(三亚风情)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!


侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|