Professional Documents
Culture Documents
9 Security, Privacy,
Ethics And
Ergonomic
Chapter 9
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Learning Objectives
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
People
Privacy – What are the threats to personal privacy and how can we
protect ourselves?
Ethics – How do the actions of individual users and companies affect
society?
Ergonomics - How do the science devoted to incorporating comfort,
efficiency, and safety into the design of items in the workplace?
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Security
Any illegal act involving the use of a computer or related devices generally is
referred to as a computer crime
A cybercrime is an online or Internet-based illegal act
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Forms of Computer Crime
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Malicious Programs - Malware
Ref: DC16 – C05
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Cyber Crime
Denial of Service
(DoS) attack attempts to slow down or stop a computer
system or network by flooding it with requests for
information or data
Rogue Wi-Fi hotspots
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Internet Scams
Cyber-bullying
Use of the Internet, cell phones, or other devices to send or post
content intended to harm
Phishing
Attempts to trick Internet users into thinking a fake but official-
looking website is legitimate
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Types of Internet Scams
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Software Theft
Software theft occurs when someone:
Intentionally
Steals software
erases
media
programs
Many manufacturers incorporate an activation process into their programs
Computing Essentials 2017
process of converting
data that is readable
by humans into
encoded characters to
prevent unauthorized
access
Page 229 13
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Information Theft
A digital signature is an encrypted code
that a person, website, or organization
attaches to an electronic message to
verify the identity of the message sender
Often used to ensure that an impostor is not
participating in an Internet transaction
A digital certificate is a notice that
Computing Essentials 2017
Page 231 14
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Hardware Theft, Vandalism, and Failure
Page 233 15
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Measures to Protect Computer Security
Principle measures to
ensure computer security
Restricting access
Encrypting data
Computing Essentials 2017
Anticipating disasters
Physical security
Data security
Disaster recovery plan
Preventing data loss
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Restricting Access
geometry Voice
verification
Uses software to try system
system
thousands of common
words sequentially in an
attempt to gain
unauthorized access to a Signature Iris recognition
user’s account verification system system
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Restricting Access
A passphrase is a private combination of words, often containing
mixed capitalization and punctuation, associated with a user name
that allows access to certain computer resources
A PIN (personal identification number), sometimes called a passcode,
is a numeric password, either assigned by a company or selected by a
user
2017
Computing Essentials 2017
A possessed object is any item that you must possess, or carry with
you, in order to gain access to a computer or computer facility
(badges, cards, keys and etc)
A biometric device authenticates a person’s identity by translating a
personal characteristic into a digital code that is compared with a
digital code in a computer or mobile device verifying a physical or
behavioral
Pages 223 - 224 characteristic 18
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Automated Security Tasks
Ways to perform and automate important security
tasks
Security Suites
Provide a collection of utility programs designed to
protect your privacy and security
Firewalls
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Encryption
Anticipating Disasters
Physical Security protects hardware
Data Security protects software and data from
unauthorized tampering or damage
Disaster Recovery Plan describes ways to continue
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Preventing Data Loss
damaged, or destroyed
To back up a file means to make a copy of it
Off-site backups are stored in a location separate
from the computer or mobile device site
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Large Databases
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Large Databases (Cont.)
Mistaken identity
Freedom of Information Act
Entitlement to look at your records held by government agencies
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Information Privacy
Computing Essentials 2017
Page 242 26
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
Figure 5-23 or posted on a website, in whole or part.
Private Networks
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
The Internet and the Web
Illusion of anonymity
People are not concerned about privacy when surfing the Internet
or when sending e-mail
When browsing the web, critical information is stored on
the hard drive in these locations:
History Files
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
History Files and Temporary Internet
Files
History Files
Include locations or addresses
of sites you have recently visited
Temporary Internet Files /
Browser Cache
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Cookies
the website
Also known as tracking cookies that keep
track of your Internet activities through 3 rd
party cookies
Refer to the accompanying graphic
displaying how to block 3rd party cookies
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy Modes
Private Browsing
Safari
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy Threats
Web bugs
Invisible images or HTML code hidden within
an e-mail message or web page
When a user opens the message information
is sent back to the source of the bug
Spyware
Wide range of programs that are designed to
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Online Identity
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Making IT Work for You ~
Cloud-Based Backup
Cloud-based
backup services
such as
Carbonite
provide cloud-
Computing Essentials 2017
based backup
services.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ethics
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ethics and Society
Page 241 36
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
Figure 5-22 or posted on a website, in whole or part.
Plagiarism
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ergonomics
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use
39
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use
Computing Essentials 2017
40
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
A Look to the Future ~
The End of Anonymity
Cyberbullying
Stalking
Damaging reputations
How do you feel?
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Open-Ended Questions (Page 1 of 3)
2. Define and discuss online identity and the major privacy laws.
Computing Essentials 2017
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Open-Ended Questions (Page 2 of 2)
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.