Professional Documents
Culture Documents
Chapter 5
Digital Security, Ethics, and
Privacy
Objectives Overview
See Page 212 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 2
for Detailed Objectives posted to a publicly accessible website, in whole or in part.
Objectives Overview
See Page 212 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 3
for Detailed Objectives posted to a publicly accessible website, in whole or in part.
Digital Security Risks
• A digital security risk is any event or action that could cause a loss of or
damage to a computer or mobile device hardware, software, data,
information, or processing capability
• Any illegal act involving the use of a computer or related devices generally is
referred to as a computer crime
• A cybercrime is an online or Internet-based illegal act
Page 212 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 4
posted to a publicly accessible website, in whole or in part.
Digital Security Risks
Page 213 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 5
Figure 5-1 posted to a publicly accessible website, in whole or in part.
Digital Security Risks
Unethical
Corporate spies Cyberextortionist
employees
Cyberterrorist
Page 214 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 6
posted to a publicly accessible website, in whole or in part.
Internet and Network Attacks
Page 215 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 7
Table 5-1 posted to a publicly accessible website, in whole or in part.
Internet and Network Attacks
Page 215 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 8
Figure 5-2 posted to a publicly accessible website, in whole or in part.
Internet and Network Attacks
• A botnet is a group of compromised computers or mobile devices connected to a network
– A compromised computer or device is known as a zombie
• A denial of service attack (DoS attack) disrupts computer access to an Internet service
– Distributed DoS attack (DDoS attack)
• A back door is a program or set of instructions in a program that allow users to bypass
security controls
• Spoofing is a technique intruders use to make their network or Internet transmission
appear legitimate
Pages 216 - 217 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 9
posted to a publicly accessible website, in whole or in part.
Internet and Network Attacks
Pages 219 - 220 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 10
Figure 5-4 posted to a publicly accessible website, in whole or in part.
Unauthorized Access and Use
Page 221 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 11
posted to a publicly accessible website, in whole or in part.
Unauthorized Access and Use
Page 221 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 12
Figure 5-5 posted to a publicly accessible website, in whole or in part.
Unauthorized Access and Use
Pages 222 - 223 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 13
Figure 5-6 posted to a publicly accessible website, in whole or in part.
Unauthorized Access and Use
• A passphrase is a private combination of words, often containing mixed capitalization and
punctuation, associated with a username that allows access to certain computer resources
• A PIN (personal identification number), sometimes called a passcode, is a numeric
password, either assigned by a company or selected by a user
• A possessed object is any item that you must possess, or carry with you, in order to gain
access to a computer or computer facility
• A biometric device authenticates a person’s identity by translating a personal characteristic
into a digital code that is compared with a digital code in a computer or mobile device
verifying a physical or behavioral characteristic
Pages 223 - 224 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 14
14
posted to a publicly accessible website, in whole or in part.
Unauthorized Access and Use
Face
Fingerprint
recognition
reader
system
Hand Voice
geometry verification
system system
Signature Iris
verification recognition
system system
Pages 224 – 226 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 15
Figures 5-8 – 5-11 posted to a publicly accessible website, in whole or in part.
Unauthorized Access and Use
Pages 226 – 227 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 16
Figure 5-12 posted to a publicly accessible website, in whole or in part.
Unauthorized Access and Use
Information
Insurance
security
agencies
departments
Page 227 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 17
posted to a publicly accessible website, in whole or in part.
Software Theft
Illegally registers
Illegally copies a
and/or activates
program
a program
Page 228 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 18
posted to a publicly accessible website, in whole or in part.
Software Theft
Page 228 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 19
posted to a publicly accessible website, in whole or in part.
Software Theft
Pages 228 – 229 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 20
Figure 5-13 posted to a publicly accessible website, in whole or in part.
Information Theft
Page 229 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 21
posted to a publicly accessible website, in whole or in part.
Information Theft
Page 230 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 22
Figure 5-14 posted to a publicly accessible website, in whole or in part.
Information Theft
Page 231 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 24
Figure 5-15 posted to a publicly accessible website, in whole or in part.
Hardware Theft, Vandalism, and Failure
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing digital
or destroying digital
equipment
equipment
Page 233 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 25
posted to a publicly accessible website, in whole or in part.
Hardware Theft, Vandalism, and Failure
Page 233 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 26
Figure 5-16 posted to a publicly accessible website, in whole or in part.
Backing Up – The Ultimate Safeguard
Cloud
Storage
Pages 233 - 234 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 27
posted to a publicly accessible website, in whole or in part.
Backing Up – The Ultimate Safeguard
Child
Page 234 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 28
posted to a publicly accessible website, in whole or in part.
Backing Up – The Ultimate Safeguard
Page 234 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 29
Table 5-2 posted to a publicly accessible website, in whole or in part.
Wireless Security
Pages 238 - 240 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 31
Figure 5-20 posted to a publicly accessible website, in whole or in part.
Ethics and Society
Page 240 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 32
posted to a publicly accessible website, in whole or in part.
Ethics and Society
Page 241 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 33
Figure 5-21 posted to a publicly accessible website, in whole or in part.
Ethics and Society
Page 241 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 34
Figure 5-22 posted to a publicly accessible website, in whole or in part.
Information Privacy
Page 242 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 35
posted to a publicly accessible website, in whole or in part.
Information Privacy
Page 242 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 36
Figure 5-23 posted to a publicly accessible website, in whole or in part.
Information Privacy
Pages 242 - 243 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 37
Figure 5-24 posted to a publicly accessible website, in whole or in part.
Information Privacy
• A cookie is a small text file that a web server stores on your computer
• Websites use cookies for a variety of reasons:
Track how
Target
often users visit
advertisements
a site
Pages 243 - 244 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 38
posted to a publicly accessible website, in whole or in part.
Information Privacy
Page 244 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 39
Figure 5-25 posted to a publicly accessible website, in whole or in part.
Information Privacy
Pages 244 - 245 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 40
posted to a publicly accessible website, in whole or in part.
Information Privacy
Page 245 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 41
posted to a publicly accessible website, in whole or in part.
Information Privacy
Page 245 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 42
posted to a publicly accessible website, in whole or in part.
Information Privacy
• The concern about privacy has led to the enactment of federal and
state laws regarding the storage and disclosure of personal data
– See Table 5-3 on page 246 for a listing of major U.S. government laws
concerning privacy
Page 246 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 43
posted to a publicly accessible website, in whole or in part.
Information Privacy
Page 247 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 44
posted to a publicly accessible website, in whole or in part.
Information Privacy
Pages 247 - 248 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 45
Figure 5-26 posted to a publicly accessible website, in whole or in part.
Summary
Page 249 © 2017 Cengage Learning®. May not be scanned, copied or duplicated, or 46
posted to a publicly accessible website, in whole or in part.
Discovering Computers
Enhanced Edition ©2017
Tools, Apps, Devices, and the Impact of Technology
Chapter 5
Digital Security, Ethics, and
Privacy
Chapter 5 Complete