Professional Documents
Culture Documents
Copyright 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Learning Objectives
1. Identify the most significant concerns for effective implementation of computer
2.
3.
4.
5.
6.
7.
technology.
Discuss the primary privacy issues of accuracy, property, and access.
Describe the impact of large databases, private networks, the Internet, and the
Web on privacy.
Discuss online identity and major laws on privacy.
Discuss cybercrimes including creation of malicious programs such as viruses,
worms, Trojan horse, and zombies as well as denial of service attacks, Internet
scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data
manipulation.
Detail ways to protect computer security including restricting access, encrypting
data, anticipating disasters, and preventing data loss.
Discuss computer ethics including copyright law, software piracy, digital rights
management , the Digital Millennium Copyright Act, as well as plagiarism and
ways to identify plagiarism.
9-2
Introduction
9-3
People
9-4
Privacy
Privacy concerns the collection and use of data about
individuals
Three primary privacy issues:
Accuracy
Property
Access
9-5
Large Databases
Large organizations compile
information about us daily
Big Data
Government agencies
Telephone companies
Credit card companies
Supermarket scanners
Financial institutions
Search engines
Social networking sites
Information
Resellers/Brokers
9-6
9-7
Private Networks
9-8
Illusion of anonymity
People are not concerned about privacy when surfing the Internet
or when sending e-mail
History Files
Temporary Internet Files
Computing Essentials 2015
Browser cache
Cookies
Privacy Mode
Spyware
9-9
History Files
Include locations or addresses of sites you
have recently visited
Temporary Internet Files / Browser Cache
Saved files from visited websites
Return
Viewing History Files
9-10
Cookies
Cookies
Small data files that are deposited
on your hard disk from web sites
you have visited
First-party cookies
Third-party cookies
Blocking Cookies
Return
9-11
Privacy Modes
Privacy Modes
InPrivate Browsing
Internet Explorer
Private Browsing
Computing Essentials 2015
Safari
Eliminate history
files
Return
9-12
Spyware
Designed to secretly record and report
your activities on the Internet
Web bugs
Anti-Spyware programs
9-13
Online Identity
themselves online
Archiving and search features of the Web make it
available indefinitely
Major Laws on Privacy
Gramm-Leach-Bliley Act
Health Insurance Portability and Accountability Act
(HIPAA)
Family Educational Rights and Privacy Act (FERPA)
9-14
Security
9-15
Computer Crime
Viruses
Worms
Trojan horse
Zombies
Denial of Service
(DoS) attack
9-16
Abuse Act
Identity Theft
Cyber-bullying
9-17
Phishing
9-18
9-19
Restricting Access
Biometric scanning
Fingerprint scanners
Iris (eye) scanners
Passwords
Dictionary attack
Security Suites
Firewalls
Fingerprint scanner
Return
9-20
Encrypting Data
Encryption
Coding information to make
it unreadable, except to
those who have the
encryption key
E-mail encryption
File encryption
Web site encryption
Virtual private networks (VPNs)
Wireless network encryption
WEP, WPA, and WPA2
Return
9-21
Anticipating Disasters
Anticipating Disasters
Frequent backups
Redundant data storage
Physical Security
Data Security
Disaster Recovery Plan
9-22
services such as
Carbonite provide
cloud-based backup
services.
9-23
Ethics
Ethics - Standards of moral conduct
Computer Ethics guidelines for the morally acceptable use of
computers
Copyright
Gives content creators the right to control the use and distribution of their
work
Paintings, books, music, films, video games
Software piracy
Unauthorized copying and distribution of software
Digital rights management (DRM)
Digital Millennium Copyright Act
Plagiarism
9-24
Careers in IT
9-25
messages anonymously
Some use this for abusive and threatening comments
Online harassment
Cyberbullying
Stalking
Damaging reputations
9-26
2. Define and discuss online identity and the major privacy laws.
9-27
9-28