Privacy, Security, and Ethics: Computing Essentials 2014
Privacy, Security, and Ethics: Computing Essentials 2014
Privacy, Security, and Ethics: Computing Essentials 2014
and Ethics
Chapter 9
Computing
Essentials 2014
Negative?
Example
Mass e-mailings from spammers
Reason for some e-mail programs
blocking emails with Images and HTML
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Spyware
Wide range of programs
Designed and used to secretly record and report
an individual’s activities on the Internet.
Possible changes made to browsers to do so.
Most invasive and dangerous type
Computer Monitoring software
A.k.a. keystroke loggers
Can be legally used by companies and law
enforcement
Privacy, Security and Ethics Computing Essentials 2014
© 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned,
duplicated, forwarded, distributed, or posted on a website, in whole or part.
Online Identity
The information that people voluntarily post about
themselves online
Archiving and search features of the Web make it
available indefinitely
Major Laws on Privacy
Gramm-Leach-Bliley Act
Protects financial information
Health Insurance Portability and Accountability Act
(HIPAA)
Protects medical records
Family Educational Rights and Privacy Act (FERPA)
Restricts disclosure of educational records
Hackers
Gain unauthorized access
*Not all hackers are intent on malicious
actions and are not all criminals
Security Suites
are software
packages that
include various
utilities that help
protect your
computer from
cybercrime.
Cloud-based
backup services
such as Carbonite
provide cloud-
based backup
services.