Open-Ended Question 3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

1.

Define privacy and discuss the impact of large databases, private


networks, the Internet, and the Web?
- Privacy provides protection for users, concerns the collection and use of data
about individuals

Large databases Private networks The Internet and the Web

- Large organizations - People are not


- Employee monitoring
compile information concerned about privacy
about us daily software when surfing the Internet
- Big Data is exploding - Employers can or when sending e-mail
and ever-growing monitor e-mail legally - When browsing the web,
- 90% of the data - A proposed law could critical information is
collected has been stored on the hard drive
collected over the last prohibit this type of
2 years electronic monitoring
or at least require the
employer to notify the
employee first

2.Define and discuss online identity and the major privacy


laws?
- Online identity is the information that people voluntarily post about
themselves online, archiving and search features of the Web make it available
indefinitely, the username identifies the user (the process of identification)
- Laws regarding privacy policy requirements for websites are generally
included in information privacy or data protection laws for a country: Gramm-
Leach-Bliley Act protects personal financial information, Health Insurance
Portability and Accountability Act (HIPAA) protects medical records, Family
Educational Rights and Privacy Act (FERPA) resists disclosure of educational
records

3. Define security ? Define computer crime and the impact of


malicious programs, including viruses, worms, Trojan
horses, and zombies, as well as denial of service attacks,
rogue Wi-Fi hotspots, data manipulation, identity theft,
Internet scams, and cyberbullying.
- Security involves protecting individuals or organizations from theft and danger
- Computer crime is alternatively referred to as cyber crime, e-crime, electronic
crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable
computer user, sometimes referred to as a hacker that illegally browses or steals
a company's or individual's private information.
- Malicious Programs or Malware are designed by crackers, computer criminals, to
damage or disrupt a computer system
- 3 most common programs:
 Viruses – migrate through networks and attach to different programs
 Worms – fills the computer with self-replicating information
 Trojan horse – programs disguised as something else
 Zombies are computers infected by a virus, worm, or Trojan Horse
- Denial of Service: (DoS) attack attempts to slow down or stop a computer system
or network by flooding it with requests for information or data
- Rogue Wi-Fi hotspots: Imitate free Wi-Fi networks and capture any and all
information sent by the users to legitimate sites including usernames and
passwords
- Data manipulation: Finding entry into someone’s computer network and leaving
a prankster’s message
- Identity Theft: Illegal assumption of someone’s identity for purpose of economic
gain
- Internet scam is any use of internet technology to defraud people. Internet
scams are carried out by cybercriminals for some type of personal gain, financial
or otherwise. Scammers use deceptive methods like phishing emails, fake
websites, and malicious software to gain access to their victims’ data, files, and
personal information.
- Cyber-bullying: Use of the Internet, cell phones, or other devices to send or post
content intended to harm

You might also like