1、Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in w
2、hole or part.2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computing Essentials 2014Pr
3、ivacy,Security,Privacy,Security,and Ethicsand EthicsChapter 9 Chapter 9 Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be cop
4、ied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Competencies(Page 1 of 3)Competencies(Page 1 of 3)Identify the most significant concerns Identify the most significant concerns for effective implementation of computer for effective implementation of computer techn
5、ology.technology.Discuss the primary privacy issues of Discuss the primary privacy issues of accuracy,property,and access.accuracy,property,and access.Describe the impact of large databases,Describe the impact of large databases,private networks,the Internet,and the private networks,the Internet,and
6、 the Web on privacy.Web on privacy.Discuss online identity and major laws Discuss online identity and major laws on privacy.on privacy.2Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for
7、 sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Competencies(Page Competencies(Page 2 2 of 3)of 3)Discuss cybercrimes including creation Discuss cybercrimes including creation of malicious programs s
8、uch as viruses,of malicious programs such as viruses,worms,Trojan horse,and zombies as worms,Trojan horse,and zombies as well as denial of service attacks,well as denial of service attacks,Internet scams,social networking Internet scams,social networking risks,risks,cyberbullyingcyberbullying,rogue
9、Wi-Fi,rogue Wi-Fi hotspots,theft,and data manipulation.hotspots,theft,and data manipulation.Detail ways to protect computer Detail ways to protect computer security including restricting access,security including restricting access,encrypting data,anticipating encrypting data,anticipating disasters,
10、and preventing data loss.disasters,and preventing data loss.3Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned
11、,duplicated,forwarded,distributed,or posted on a website,in whole or part.Competencies(Page Competencies(Page 3 3 of 3)of 3)Discuss computer ethics including Discuss computer ethics including copyright law,software piracy,copyright law,software piracy,digital rights management,the digital rights man
12、agement,the Digital Millennium Copyright Act,as Digital Millennium Copyright Act,as well as plagiarism and ways to well as plagiarism and ways to identify plagiarism.identify plagiarism.4Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material sole
13、ly for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.IntroductionIntroductionThe ubiquitous use of computers and The ubiquitous use of computers and tech
14、nology prompts some very technology prompts some very important questions about the use of important questions about the use of personal data and our right to personal data and our right to privacy.privacy.This chapter covers issuesThis chapter covers issuesrelated to the impact ofrelated to the imp
15、act oftechnology on people andtechnology on people andhow to protect ourselveshow to protect ourselveson the Web.on the Web.5Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or di
16、stribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.PeoplePeoplePrivacyPrivacy What are the threats to personal What are the threats to personal privacy and how can we protect ourselves?privacy and how can we prote
17、ct ourselves?SecuritySecurity How can access How can access to sensitive to sensitive information be controlled and how can we information be controlled and how can we secure hardware and software?secure hardware and software?EthicsEthics How do the actions of individual How do the actions of indivi
18、dual users and companies affect society?users and companies affect society?6Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be
19、 copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.PrivacyPrivacyPrivacy concerns the collection Privacy concerns the collection and use of data about individualsand use of data about individualsThree primary privacy issues:Three primary privacy issues:AccuracyP
20、ropertyAccess7Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on
21、a website,in whole or part.Large Large Databases(Page 1 of 2)Databases(Page 1 of 2)Large organizations Large organizations compile information compile information about us.about us.Federal Federal government government has over has over 2,000 2,000 databasesdatabases Telephone companiesTelephone com
22、panies Reverse directory lists of calls we make SupermarketsSupermarkets What we buy and when8Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This d
23、ocument may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Large Large Databases(Page 2 of 2)Databases(Page 2 of 2)Information resellers or information Information resellers or information brokersbrokers Collect and sell personal data Electronic profil
24、es easily created Personal Personal information is a marketable information is a marketable commodity,which raises many issues:commodity,which raises many issues:Collecting public,but personally identifying information(e.g.,Googles Street View)Spreading information without personal consent,leading t
25、o identity theft Spreading inaccurate information Mistaken identity Freedom of Information Act 9Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This
26、 document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Private NetworksPrivate NetworksEmployers can monitor e-mail legallyEmployers can monitor e-mail legally75 percent of all businesses search employees electronic mail and computer files using
27、snoopwareA proposed law could prohibit this type of electronic monitoring or at least require theemployer to notify the employee first10Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for
28、 sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Viewing and Blocking Viewing and Blocking CookiesCookiesCookies Cookies Small pieces of information that are deposited on your hard disk from web sites
29、 you have visitedFirst-party cookiesThird-party cookies11Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,dup
30、licated,forwarded,distributed,or posted on a website,in whole or part.Online IdentityOnline IdentityThe information that people The information that people voluntarily post about themselves voluntarily post about themselves onlineonlineArchiving and search features of the Archiving and search featur
31、es of the Web make it available indefinitelyWeb make it available indefinitelyMajor Laws on PrivacyMajor Laws on PrivacyGramm-Leach-Bliley ActHealth Insurance Portability and Accountability Act(HIPAA)Family Educational Rights and Privacy Act(FERPA)12Computing Essentials 2014Privacy,Security and Ethi
32、cs 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.SecuritySecurityCybercrime or compute
33、r crime is any Cybercrime or computer crime is any offense that involves a computer and offense that involves a computer and a networka networkHackersHackersGain unauthorized access13Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely f
34、or authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computer Crime(Page 1 of 3)Computer Crime(Page 1 of 3)Malicious Programs-Malicious Programs-MalwareMalwa
35、reVirusesWormsTrojan horseZombiesDenial of Service Denial of Service(DoS)attack14Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may n
36、ot be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computer Crime(Page 2 of 3)Computer Crime(Page 2 of 3)Internet scamsInternet scamsPhishing15Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solel
37、y for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Computer Crime(Page 3 of Computer Crime(Page 3 of 3 3)Social networking Social networking risksrisksC
38、yber-bullyingCyber-bullyingRogue Wi-Fi Rogue Wi-Fi hotspotshotspotsTheft Theft Data manipulation Data manipulation Computer Fraud and Abuse Act16Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not autho
39、rized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Making IT Work for You Security SuitesMaking IT Work for You Security SuitesSecurity Suites Security Suites are software are software packages
40、 that packages that include various include various utilities that utilities that help protect help protect your computer your computer from cybercrime.from cybercrime.17Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized
41、 instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Making IT Work for You Cloud-Based BackupMaking IT Work for You Cloud-Based BackupCloud-based Cloud-based backup serv
42、ices backup services such as such as Carbonite Carbonite provide cloud-provide cloud-based backup based backup services.services.18Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale
43、 or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.EthicsEthics Standards of moral conductStandards of moral conduct CopyrightCopyright Gives content creators the right to control the use and distribution of
44、 their work Paintings,books,music,films,video games Software piracySoftware piracy Unauthorized copying and distribution Digital Millennium Copyright Act Digital rights management(DRM)Plagiarism Plagiarism 19Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This prop
45、rietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Careers in ITCareers in ITIT Security Analysts IT Security Analysts maintain th
46、e security of maintain the security of a companys network,a companys network,systems,and data.systems,and data.Must safeguard Must safeguard information systems information systems against external threatsagainst external threatsAnnual Annual salary is usually salary is usually from$62,000 from$62,0
47、00 to to$101,000$101,000Demand for this position Demand for this position is expected to growis expected to grow20Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution
48、in any manner.This document may not be copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.A Look to the FutureA Look to the FutureA Webcam on Every Corner A Webcam on Every Corner Images of public places are more accessible than ever before(e.g.,Google Street Vie
49、w)“Virtual site-seeing tours”Public webcams continue to grow in popularity 21Computing Essentials 2014Privacy,Security and Ethics 2014 by McGraw-Hill Education.This proprietary material solely for authorized instructor use.Not authorized for sale or distribution in any manner.This document may not b
50、e copied,scanned,duplicated,forwarded,distributed,or posted on a website,in whole or part.Open-Ended Questions(Page 1 of 3)Open-Ended Questions(Page 1 of 3)Define privacy and discuss the impact of large Define privacy and discuss the impact of large databases,private networks,the Internet,and databa