Professional Documents
Culture Documents
Chapter 5
Digital Safety
and Security
Objectives Overview
Unethical
Corporate spies Cyberextortionist
employees
Cyberterrorist
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
Page 210 15
Discovering Computers 2014: Chapter 5
Figure 5-5
Unauthorized Access and Use
Page 213 18
Discovering Computers 2014: Chapter 5
Unauthorized Access and Use
Face
Fingerprint
recognition
reader
system
Hand Voice
geometry verification
system system
Signature Iris
verification recognition
system system
Pages 213 – 214 Discovering Computers 2014: Chapter 5 19
Figures 5-8 – 5-10
Unauthorized Access and Use
Information
Insurance
security
agencies
departments
Page 214 Discovering Computers 2014: Chapter 5 20
Software Theft
Illegally registers
Illegally copies a
and/or activates
program
a program
Page 215 Discovering Computers 2014: Chapter 5 21
Software Theft
Hardware vandalism
Hardware theft is
is the act of defacing
the act of stealing
or destroying digital
digital equipment
equipment
Cloud
Storage
Child
Page 219 31
Discovering Computers 2014: Chapter 5
Backing Up – The Ultimate Safeguard
Page 221 33
Discovering Computers 2014: Chapter 5
Figure 5-16
Ethics and Society
Page 228 39
Discovering Computers 2014: Chapter 5
Figure 5-21
Information Privacy
Track how
Target
often users
advertisements
visit a site
Page 229 Discovering Computers 2014: Chapter 5 41
Information Privacy
Page 234 50
Discovering Computers 2014: Chapter 5
Figure 5-24
Summary
Chapter 5
Digital Safety
and Security
Chapter 5 Complete