Privacy, Security, and Ethics: Computing Essentials 2014

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

Privacy, Security,

and Ethics
Chapter 9
Computing
Essentials 2014

Edited/Modified by Nicole Tobias

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale for
authorized or distribution in any manner.
sale or distribution This document
in any manner. may notmay
This document be copied, scanned,
not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part. duplicated, forwarded, distributed, or posted on a website, in whole or part.
Competencies (Page 1 of 3)
 Identify the most significant concerns for
effective implementation of computer
technology.
 Discuss the primary privacy issues of accuracy,
property, and access.
 Describe the impact of large databases, private
networks, the Internet, and the Web on privacy.
 Discuss online identity and major laws on
privacy.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
2
Competencies (Page 2 of 3)
 Discuss cybercrimes including creation of
malicious programs such as viruses, worms,
Trojan horse, and zombies as well as denial of
service attacks, Internet scams, social
networking risks, cyberbullying, rogue Wi-Fi
hotspots, theft, and data manipulation.
 Detail ways to protect computer security
including restricting access, encrypting data,
anticipating disasters, and preventing data
loss.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
3
Competencies (Page 3 of 3)
 Discuss computer ethics including
copyright law, software piracy, digital rights
management , the Digital Millennium
Copyright Act, as well as plagiarism and
ways to identify plagiarism.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
4
Introduction
 The ubiquitous use of computers and
technology prompts some very important
questions about the use of personal data
and our right to privacy.
 This chapter covers issues
related to the impact of
technology on people and
how to protect ourselves
on the Web.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
5
Remember Chapter 1?
 What is in an information system?
 People
 Procedures
 Software
 Hardware
 Data
 Connectivity

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Effects of Technology
 Positive?

 Negative?

 Effective implementation of computer


technology involves maximizing its positive
effects while minimizing its negative effects.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
People
 The most significant concerns are
 Privacy
 What are the threats to personal privacy and how can
we protect ourselves?
 Security
 How can access to sensitive information be controlled
and how can we secure hardware and software?
 Ethics
 How do the actions of individual users and companies
affect society?

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
8
Privacy
 Privacy – concerns the collection and use
of data about individuals
 Three primary privacy issues:
 Accuracy
 Property
 Access

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
9
Privacy
 Accuracy
 relates to the responsibility of those who
collect data to ensure that the data is correct
 Property
 relates to who owns data and rights to
software
 Access
 relates to the responsibility of those who have
data to control who is able to use that data
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Large Databases (Page 1 of 2)
 Large organizations
compile information
about us.
 Federal government
has over 2,000
databases
 Telephone companies
 Reverse directory
lists of calls we
make
 Supermarkets
 What we buy and
when

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
11
Large Databases (Page 2 of 2)
 Information resellers or information brokers
 Collect and sell personal data
 Electronic profiles easily created
 Personal information is a marketable commodity,
which raises many issues:
 Collecting public, but personally identifying
information (e.g., Google’s Street View)
 Spreading information without personal
consent, leading to identity theft
 Spreading inaccurate information
 Mistaken identity
 Freedom of Information Act

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
12
Private Networks
 Employers can monitor e-mail legally
 75 percent of all businesses search
employees’ electronic mail and
computer files using snoopware
 A proposed law could
prohibit this type of
electronic monitoring
or at least require the
employer to notify
the employee first

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
13
The Internet and the Web
 Do you think that your emails are private?
 illusion of anonymity
 IP addresses used for tracing and
investigating computer crimes
 Browsing the Web
 History files
 Temporary Internet files

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Viewing and Blocking Cookies
 Cookies
 Small pieces of information that are
deposited on your hard disk from web sites
you have visited
 First-party cookies
 Generated by current website
 Third-party cookies
 Generated by an advertising company

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
15
Web bugs
 Invisible images or HTML code hidden
within a web page or e-mail message.
 Used to transmit information without your
knowledge back to the source of the bug.

 Example
 Mass e-mailings from spammers
 Reason for some e-mail programs
blocking emails with Images and HTML
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Spyware
 Wide range of programs
 Designed and used to secretly record and report
an individual’s activities on the Internet.
 Possible changes made to browsers to do so.
 Most invasive and dangerous type
 Computer Monitoring software
 A.k.a. keystroke loggers
 Can be legally used by companies and law
enforcement
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Online Identity
 The information that people voluntarily post about
themselves online
 Archiving and search features of the Web make it
available indefinitely
 Major Laws on Privacy
 Gramm-Leach-Bliley Act
 Protects financial information
 Health Insurance Portability and Accountability Act
(HIPAA)
 Protects medical records
 Family Educational Rights and Privacy Act (FERPA)
 Restricts disclosure of educational records

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
18
Security
 Security involves protecting individuals and
organizations from theft and danger

 Hackers
 Gain unauthorized access
 *Not all hackers are intent on malicious
actions and are not all criminals

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
19
Cybercrime
 Cybercrime or computer crime is any offense
that involves a computer and a network
 Recent estimates
 Affects 400 million people
 Costs over $400 billion dollars
(Each Year)
 Malicious programs, denial of service attacks,
Internet scams, theft and data manipulation

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Computer Crime (Page 1 of 6)
 Malicious Programs - Malware
 (1) Viruses
 (2) Worms
 (3) Trojan horse
 Zombies
 BotNets

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
21
Computer Crime (Page 2 of 6)
 Denial of Service
 (DoS) attack
 Attempts to slow down or stop a computer system
by flooding it with requests for info and data.
 Targets
 ISP and Websites
 Once attacked
 Servers are overwhelmed and unable to respond
 Effectively the website is shut down

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
22
Computer Crime (Page 3 of 6)
 Internet scams
 Scam = Fraudulent or deceptive act or
operation designed to trick individuals into
providing information or wasting time.
 Phishing

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
23
Computer Crime (Page 4 of 6)
 Social networking risks
 Open sharing of information among
individuals
 Photos, job loss, stalking

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
24
Computer Crime (Page 5 of 6)
 Cyber-bullying
 The use of the Internet, cell phones, or other
devices to send and post content intended to
hurt or embarrass another person
 Can lead to criminal prosecution
 Rogue Wi-Fi hotspots
 Imitate these free Wi-Fi networks
 Capture any and all information sent by the
user to sites including names and passwords.
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
25
Computer Crime (Page 6 of 6)
 Theft
 Steal data, computer time, equipment, and
programs.
 Can include:
 White collar crimes
 The use of a company’s computer time by an
employee to run another business
 Data manipulation
 Finding entry into someone’s computer network

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
26
Computer Fraud and Abuse Act
 Makes it a crime to view copy or damage
data using any computer across state lines
 Prohibits unauthorized use of any
government computer or a computer used
by any federally insured financial
institution.
 Up to 20 years in prison and fines up to
$100,000.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Measures to Protect Computer Security

 Some of the principle measures to ensure


computer security are:
 Restricting access,
 encrypting messages,
 anticipating disasters, and
 preventing data loss

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Restricting Access
 Security experts are constantly using ways
to protect computer systems from access
by unauthorized persons.
 Methods of doing so include:
 Posting guards
 Biometric scanning
 Assigning passwords

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Assigning passwords and tokens
 Passwords are secret words or phrases that
must be keyed into a computer system to gain
access.
 Password strength is gauged as to how easily it
can be guessed
 Dictionary attacks
 Use software to try thousands of common
words sequentially in an attempt to gain
unauthorized access to a user’s account.
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Other Security Measures
 Security suits
 Provide a collection of programs
designed to protect your privacy and
security while you are on the web.
 Firewalls
 Act as a security buffer between a
corporation’s private network and all
external networks, including the Internet.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Making IT Work for You ~ Security Suites

 Security Suites
are software
packages that
include various
utilities that help
protect your
computer from
cybercrime.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
32
Encrypting Data
 Encryption
 The process of coding information to
make it unreadable except to those who
have a special piece of information
known as an encryption key.
 Common uses:
 E-mail encryption
 File encryption
 Website encryption
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Encrypting Data
 Most common protocol for website
encryption is
 https
 HyperText Transfer Protocol Secure
 VPNs
 Wireless network encryption
 WPA2 (Wi-Fi Protected Access)

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Anticipating Disasters
 Always be prepared for disasters.
 Physical security
 Protecting the hardware form possible human and
natural disasters.
 Data security
 Protecting software and data from unauthorized
tampering or damage.
 Most organizations have a disaster recovery plan
 Describes ways to continue operation until
things can be restored to prior state.
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Preventing Data Loss
 Equipment is replaceable.
 A company’s data, may be irreplaceable.
 Redundant storage
 RAID (Chapter 7)
 Backup Batteries
 Making frequent backups
 Usually stored offsite
 Incremental backups
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Making IT Work for You ~ Cloud-Based Backup

 Cloud-based
backup services
such as Carbonite
provide cloud-
based backup
services.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
37
Ethics
 What are ethics?
 Standards of moral conduct

 Technology is moving so fast that it is difficult


for our legal system to control how computers
are used.
 Computer ethics are guidelines for the morally
acceptable use of computers in our society.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
38
Ethics
 Copyright and Digital Rights Management
 Copyrights
 Gives content creators the right to control the
use and distribution of their work
 Paintings, books, music, films, video games
 Copyright violations include making
unauthorized copies of digital media that is
copyrighted.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
39
Ethics
 Software piracy
 Unauthorized copying and distribution of
software
 Costs the software industry $30+ billion
annually
 Digital rights management (DRM)
 Technologies that control access to digital media
 Used to:
1. Control the number of devices that can access a file
2. Limit the kinds of devices that can access a file
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
40
Ethics
 Software piracy (cont.)

 Digital rights management (DRM)


 Some companies feel that they have to use this to
protect their rights.
 Some users feel they should have the right to use the
media they buy as they choose.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
41
Ethics
 Software piracy (cont.)
 Digital Millennium Copyright Act
 Makes it illegal to deactivate or otherwise disable
any antipiracy technologies.
 Copies of commercial programs cannot be legally
resold or given away
 Regardless of whether you do it or not… The law is
clear:
It is illegal to copy or download copyright-
protected music or videos from the
Internet without appropriate authorization
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
42
Ethics
 Plagiarism
 Representing some other person’s work
and/or ideas as your own without giving
credit to the original source.
 Computers have made this easier.
 They have also made it easier to recognize
and catch plagiarists.
 Example
 Turnitin
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
43
Careers in IT
 IT Security Analysts maintain
the security of a company’s
network, systems, and data.
 Must safeguard information
systems against external
threats
 Annual salary is usually from
$62,000 to $101,000
 Demand for this position is
expected to grow

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
44
A Look to the Future
 The End of Anonymity
 A Webcam on Every Corner
 Images of public places are more
accessible than ever before (e.g., Google
Street View)
 “Virtual site-seeing tours”
 Public webcams continue
to grow in popularity

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
45
Open-Ended Questions (Page 1 of 3)
 Define privacy and discuss the impact of large
databases, private networks, the Internet, and the Web.

 Define and discuss online identity and the major


privacy laws.

 Define security. Define computer crime and the impact


of malicious programs, including viruses, worms, Trojan
horses, and zombies, as well as cyberbullying, denial of
service attacks, Internet scams, social networking risks,
rogue Wi-Fi hotspots, thefts, data manipulation, and
other hazards.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
46
Open-Ended Questions (Page 2 of 2)
 Discuss ways to protect computer security
including restricting access, encrypting
data, anticipating disasters, and preventing
data loss.

 Define ethics, and describe copyright law


and plagiarism.

Privacy, Security and Ethics Computing Essentials 2014


© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
47

You might also like