You are on page 1of 45

Chapter

9 Security, Privacy,

Ethics And
Ergonomic
Chapter 9

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Learning Objectives

1. Identify the most significant concerns for effective implementation of computer


technology.
2. Discuss cybercrimes including creation of malicious programs such as viruses,
worms, Trojan horse, and zombies as well as denial of service attacks, Internet
scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
3. Detail ways to protect computer security including restricting access, encrypting
data, anticipating disasters, and preventing data loss.
Computing Essentials 2017

4. Discuss the primary privacy issues of accuracy, property, and access.


5. Describe the impact of large databases, private networks, the Internet, and the
Web on privacy.
6. Discuss online identity and major laws on privacy.
7. Discuss computer ethics including copyright law, software piracy, digital rights
management, the Digital Millennium Copyright Act, as well as plagiarism and ways
to identify plagiarism.
8. Discuss the ergonomic concept and the related health concerns.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Introduction

The ubiquitous use of computers and technology


prompts some very important questions about the
use of personal data and our right to privacy.
This chapter covers issues
related to the impact of
Computing Essentials 2017

technology on people and


how to protect ourselves
on the Web.

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
People

Technology has had a very positive impact on people,


but some of the impact could be negative.
Most significant concerns:
Security – How can access to sensitive information be controlled and
how can we secure hardware and software?
Computing Essentials 2017

Privacy – What are the threats to personal privacy and how can we
protect ourselves?
Ethics – How do the actions of individual users and companies affect
society?
Ergonomics - How do the science devoted to incorporating comfort,
efficiency, and safety into the design of items in the workplace?
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Security

Involves protecting individuals or organizations from theft and danger


A digital security risk is any event or action that could cause a loss of or
damage to a computer or mobile device hardware, software, data, information,
or processing capability
Hackers
Gain unauthorized access with malicious intent
Not all hackers are illegal
Computing Essentials 2017

Any illegal act involving the use of a computer or related devices generally is
referred to as a computer crime
A cybercrime is an online or Internet-based illegal act

Cybercrime / Computer Crime


Criminal offense that involves a computer and a network
 Effects over 400 million people annually
 Costs over $400 billion each year

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Forms of Computer Crime
Computing Essentials 2017

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Malicious Programs - Malware
Ref: DC16 – C05

Malicious Programs or Malware


Designed by crackers, computer criminals, to
damage or disrupt a computer system
Consists of programs that act without a user’s
knowledge and deliberately alter the operations
of computers and mobile devices
Computer Fraud and Abuse Act makes
spreading a virus a federal offense
Computing Essentials 2017

3 most common programs


Viruses – migrate through networks and attach to
different programs
Worms – fills the computer with self-replicating
information
Trojan horse – programs disguised as something else
Zombies are computers infected by a virus, worm, or
Trojan Horse

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Cyber Crime

Denial of Service
(DoS) attack attempts to slow down or stop a computer
system or network by flooding it with requests for
information or data
Rogue Wi-Fi hotspots
Computing Essentials 2017

Imitate free Wi-Fi networks and capture any and all


information sent by the users to legitimate sites including
usernames and passwords
Data manipulation
Finding entry into someone’s computer network and leaving
a prankster’s message

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Internet Scams

A fraudulent or deceptive act or operation to trick someone


into providing personal information or spending money for
little or no return
Identity Theft
Illegal assumption of someone’s identity for purpose of economic
gain
Computing Essentials 2017

Cyber-bullying
Use of the Internet, cell phones, or other devices to send or post
content intended to harm
Phishing
Attempts to trick Internet users into thinking a fake but official-
looking website is legitimate

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Types of Internet Scams
Computing Essentials 2017

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Software Theft
Software theft occurs when someone:
Intentionally
Steals software
erases
media
programs
Many manufacturers incorporate an activation process into their programs
Computing Essentials 2017

to ensure the software is not installed on more computers than legally


licensed
During the product activation, which is conducted either online or by
Illegally registers
phone, users provide the software product’s identification number to Illegally copies
and/or activates
associate the software with the computer or mobile device on which the
software is installed
Page 228 a program a program 11
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Software Theft

A license agreement is the right to use software


Computing Essentials 2017

Pages 228 – 229 12


© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
Figure 5-13 or posted on a website, in whole or part.
Information Theft
Information theft
occurs when someone
steals personal or
confidential
information
Encryption is a
Computing Essentials 2017

process of converting
data that is readable
by humans into
encoded characters to
prevent unauthorized
access

Page 229 13
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Information Theft
A digital signature is an encrypted code
that a person, website, or organization
attaches to an electronic message to
verify the identity of the message sender
Often used to ensure that an impostor is not
participating in an Internet transaction
A digital certificate is a notice that
Computing Essentials 2017

guarantees a user or a website is


legitimate
 A website that uses encryption
techniques to secure its data is known as
a secure site

Page 231 14
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Hardware Theft, Vandalism, and Failure

Hardware theft is Hardware vandalism


is the act of defacing
the act of stealing or destroying digital
digital equipment equipment
Computing Essentials 2017

Page 233 15
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Measures to Protect Computer Security

Principle measures to
ensure computer security
Restricting access
Encrypting data
Computing Essentials 2017

Anticipating disasters
Physical security
Data security
Disaster recovery plan
Preventing data loss

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Restricting Access

Biometric scanning Fingerprint


Face
recognition
Fingerprint scanners reader
system
Iris (eye) scanners
Passwords
Hand
Dictionary attack
Computing Essentials 2017

geometry Voice
verification
Uses software to try system
system
thousands of common
words sequentially in an
attempt to gain
unauthorized access to a Signature Iris recognition
user’s account verification system system

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Restricting Access
A passphrase is a private combination of words, often containing
mixed capitalization and punctuation, associated with a user name
that allows access to certain computer resources
A PIN (personal identification number), sometimes called a passcode,
is a numeric password, either assigned by a company or selected by a
user
2017
Computing Essentials 2017

A possessed object is any item that you must possess, or carry with
you, in order to gain access to a computer or computer facility
(badges, cards, keys and etc)
A biometric device authenticates a person’s identity by translating a
personal characteristic into a digital code that is compared with a
digital code in a computer or mobile device verifying a physical or
behavioral
Pages 223 - 224 characteristic 18
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Automated Security Tasks
Ways to perform and automate important security
tasks
Security Suites
Provide a collection of utility programs designed to
protect your privacy and security
Firewalls
Computing Essentials 2017

Security buffer between a corporation’s provide network


and all external networks
Password Managers
Helps to create strong passwords

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Encryption

Coding information to make it unreadable,


except to those who have the encryption key
• E-mail encryption protects emails
• File encryption protects files
• Web site encryption uses HTTPS
protocol for protection
Computing Essentials 2017

• HTTPS – hypertext transfer protocol secured


• Virtual private networks (VPNs)
• Encrypts connects between company
networks and their remote users
• Wireless network encryption restricts
access to authorized users
• WPA2 – Wi-Fi Protected Access
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Anticipating Disasters

Anticipating Disasters
Physical Security protects hardware
Data Security protects software and data from
unauthorized tampering or damage
Disaster Recovery Plan describes ways to continue
Computing Essentials 2017

operating in the event of a disaster

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Preventing Data Loss

Preventing Data Loss


Frequent backups
CLOUD
Redundant data storage STORAGE
Store off-site in case of loss of equipment
A backup is a duplicate of a file, program, or
media that can be used if the original is lost,
Computing Essentials 2017

damaged, or destroyed
To back up a file means to make a copy of it
Off-site backups are stored in a location separate
from the computer or mobile device site

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy

Privacy – concerns the collection and use of data about


individuals or companies to deny or restrict the collection,
use, and dissemination of information about them
Huge databases store data online
Three primary privacy issues:
Accuracy – responsibility of those who collect data
Computing Essentials 2017

Must be secure and correct


Property – who owns data and who has rights to software
Access – responsibility of those who control data and use
of data

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Large Databases

Large organizations compile information about us daily

Big Data is exploding and ever-growing


90% of the data collected has been collected over the last 2 years
Data collectors include
Government agencies
Telephone companies
Computing Essentials 2017

Credit card companies


Supermarket scanners
Financial institutions
Search engines
Social networking sites
Information Resellers/Brokers
Collect and sell personal data
Create electronic profiles

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Large Databases (Cont.)

Personal information is a marketable commodity, which


raises many issues:
Collecting public, but personally identifying information (e.g.,
Google’s Street View)
Spreading information without personal consent, leading to
identity theft
Spreading inaccurate information
Computing Essentials 2017

Mistaken identity
Freedom of Information Act
 Entitlement to look at your records held by government agencies

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Information Privacy
Computing Essentials 2017

Page 242 26
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
Figure 5-23 or posted on a website, in whole or part.
Private Networks

Employee monitoring software


Employers can monitor e-mail legally
A proposed law could prohibit this type of electronic
monitoring or at least require the employer to notify
the employee first
Computing Essentials 2017

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
The Internet and the Web

Illusion of anonymity
People are not concerned about privacy when surfing the Internet
or when sending e-mail
When browsing the web, critical information is stored on
the hard drive in these locations:
History Files
Computing Essentials 2017

Temporary Internet Files


Browser cache
Cookies
Privacy Mode
Spyware

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
History Files and Temporary Internet
Files

History Files
Include locations or addresses
of sites you have recently visited
Temporary Internet Files /
Browser Cache
Computing Essentials 2017

Saved files from visited websites


Offers quick re-display when
you return to the site

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Cookies

Cookies are small data files that


are deposited on your hard disk
from web sites you have visited
First-party cookies are generated only by
websites you are visiting
Third-party cookies are generated by an
advertising company that is affiliated with
Computing Essentials 2017

the website
 Also known as tracking cookies that keep
track of your Internet activities through 3 rd
party cookies
 Refer to the accompanying graphic
displaying how to block 3rd party cookies

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy Modes

Ensures your browsing activity


is not recorded on your hard
drive
Incognito Mode
Google Chrome
Computing Essentials 2017

Private Browsing
Safari

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Privacy Threats

Web bugs
Invisible images or HTML code hidden within
an e-mail message or web page
When a user opens the message information
is sent back to the source of the bug
Spyware
Wide range of programs that are designed to
Computing Essentials 2017

secretly record and report Internet activities,


add Internet ad cookies
Computer monitoring software
Invasive and dangerous
Keystroke Loggers
Record activities and keystrokes
Anti-Spyware programs
Detect and remove privacy threats

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Online Identity

The information that people voluntarily post about


themselves online
Archiving and search features of the Web make it
available indefinitely
Major Laws on Privacy
Computing Essentials 2017

Gramm-Leach-Bliley Act protects personal financial


information
Health Insurance Portability and Accountability Act (HIPAA)
protects medical records
Family Educational Rights and Privacy Act (FERPA) resists
disclosure of educational records

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Making IT Work for You ~
Cloud-Based Backup

Cloud-based
backup services
such as
Carbonite
provide cloud-
Computing Essentials 2017

based backup
services.

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ethics

Standards of moral conduct


Computer Ethics – guidelines for the morally
acceptable use of computers
Copyright
Gives content creators the right to control the use
and distribution of their work
Computing Essentials 2017

Paintings, books, music, films, video games


Software piracy
Unauthorized copying and distribution of software
Digital rights management (DRM) controls access to
electronic media
Digital Millennium Copyright Act protects against piracy

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ethics and Society

Green computing involves reducing the electricity and


environmental waste while using computers, mobile devices,
and related technologies
Computing Essentials 2017

Page 241 36
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
Figure 5-22 or posted on a website, in whole or part.
Plagiarism

Representing some other person’s work and ideas


as your own without giving credit to the original
person’s work and ideas
Computing Essentials 2017

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Ergonomics

Ergonomics (pronounced “er-guh-nom-


ix”) is defined as the study of human
factors related to things people use.
Ergonomics is an applied science
devoted to incorporating comfort,
efficiency, and safety into the design of
Computing Essentials 2017

items in the workplace


For computer users and manufacturers
this means designing input and output
devices to increase ease of use and to
avoid health risks.

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use

The widespread use of


computers has led to health
concerns
Repetitive strain injury
(RSI)
Tendonitis
Computing Essentials 2017

Carpal tunnel syndrome (CTS)


-nerves and tendons in the hands
Back and neck pain

Computer vision syndrome


(CVS)
Eyestrain and headache

39
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use
Computing Essentials 2017

40
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Health Concerns of Computer Use

Computer addiction occurs when the computer consumes


someone’s entire social life
Symptoms of users include:

Craves Overjoyed Unable to stop


Computing Essentials 2017

computer when at the computer


time computer activity

Irritable when Neglects


Problems at
not at the family and
work or school
computer friends
41
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Careers in IT

IT Security Analysts maintain


the security of a company’s
network, systems, and data.
Bachelors or associates degree
in information systems or
computer science
Experience is usually required
Computing Essentials 2017

Must safeguard information


systems against external threats
Annual salary is usually from
$62,000 to $101,000
Demand for this position is
expected to grow

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
A Look to the Future ~
The End of Anonymity

Most forums and comment areas on websites


allow users to post messages anonymously
Some use this for abusive and threatening
comments
Online harassment
Computing Essentials 2017

Cyberbullying
Stalking
Damaging reputations
How do you feel?

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Open-Ended Questions (Page 1 of 3)

1. Define privacy and discuss the impact of large databases, private


networks, the Internet, and the Web.

2. Define and discuss online identity and the major privacy laws.
Computing Essentials 2017

3. Define security. Define computer crime and the impact of


malicious programs, including viruses, worms, Trojan horses, and
zombies, as well as denial of service attacks, rogue Wi-Fi
hotspots, data manipulation, identity theft, Internet scams, and
cyberbullying.

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.
Open-Ended Questions (Page 2 of 2)

4. Discuss ways to protect computer security


including restricting access, encrypting data,
anticipating disasters, and preventing data loss.
Computing Essentials 2017

5. Define ethics, and describe copyright law and


plagiarism.

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed,
or posted on a website, in whole or part.

You might also like