Computing ESSENTIALS CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

26
1 puting ESSENTIALS C H A P T E R 1 1 0 0 Privacy and Security omputing ESSENTIALS

Transcript of Computing ESSENTIALS CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

Page 1: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

1

computing ESSENTIALS

CH

AP

TE

R 10101010Privacy and

Security

computing ESSENTIALS

Page 2: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

2

Competencies

Negative effects

Privacy

Security

Ergonomics

Environment

computing ESSENTIALS

Page 3: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

3

Negative Effects

Effective implementation of technology Maximize positive effects Minimize negative effects

Significant concerns Privacy Security Ergonomics Environment

computing ESSENTIALS

Page 4: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

4

Privacy Laws often do not keep up with technology Ethics

Standards of moral conduct Computer ethics

Guidelines for morally acceptable computer use

• Property

• Access

• Privacy

• Accuracy

computing ESSENTIALS

Page 5: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

5

Large Databases Information on citizens and consumers

compiled daily Banks, utilities, grocery stores Hospitals, doctor’s offices Government

Social Security Number Used for ID number on forms

Information resellers Contact data is valuable

computing ESSENTIALS

Page 6: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

6

Information Without Consent

Information collected and used without the person’s knowledge Shopping habits, video rentals Medical records Banking transactions

Federal government Know Your Customer Total Information Awareness project

computing ESSENTIALS

Page 7: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

7

Inaccurate Information Inaccurate data can be circulated

Data propagation can spread mistakes to

other databases

Laws can help

Correct credit data

Freedom of Information Act

computing ESSENTIALS

Page 8: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

8

Private Networks

Employers legally monitor email

Snoopware used in 75% of

businesses

Online services right to censor content

computing ESSENTIALS

Page 9: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

9

Internet and Web

Concerns about email privacy on Web

Illusion of anonymity

Browser records pages visited

Cookies monitor

Times and pages visited

Other private information

computing ESSENTIALS

Page 10: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

10

Cookies Programs that monitor Web activity Traditional cookies

Monitor activity at one site Dormant other times

Ad network cookies Spyware programs that record all Internet

activity Web bugs

Cookie-cutter programs

computing ESSENTIALS

Page 11: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

11

Privacy Laws

Mostly cover government usage, but not private organizations

Some current laws Fair Credit Reporting Act (1970) Freedom of Information Act (1970) Right to Financial Privacy Act (1974) Computer Abuse Amendments Act (1994) No Electronic Theft (NET) Act (1997)

computing ESSENTIALS

Page 12: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

12

Code of Fair Information Practice Response to information privacy concerns Not law, but adopted by many information

collecting businesses• No secret

databases• Right of individual

access• Right of consent

• Right to correct

• Assurance of

reliability and proper

use

computing ESSENTIALS

Page 13: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

13

Security

Threats to computer systems include

Viruses

Electronic break-ins

Natural and other hazards

Terrorist activity

computing ESSENTIALS

Page 14: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

14

Computer Criminals

Employees

Outside users

“Hackers” and “crackers”

Organized crime

Terrorists

computing ESSENTIALS

Page 15: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

15

Computer Crime

Damage to computers, programs or files Viruses and worms Denial of Service attack

Theft Hardware, data, computer time Software piracy

Manipulation

computing ESSENTIALS

Page 16: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

16

Other Hazards Other hazards to computer systems besides

criminal misuse Natural hazards

Earthquake, fire, floods, hurricanes Civil strife

War, riots Technological failures

Voltage surge, brownouts Human error

Data-entry, programming errors

computing ESSENTIALS

Page 17: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

17

Security Measures Protecting information, hardware, software Principle methods

Encrypting messages Pretty Good Privacy

Restricting access Passwords, firewalls

Anticipating disasters Disaster recovery plan

Backing up data In case other measures fail

computing ESSENTIALS

Page 18: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

18

Security for Microcomputers Individuals should also implement security Some basic procedures

Avoid extreme conditionsClean and protect equipment

Avoid virusesVirus protection software

Guard computerCable locks, marking equipment

Guard programs and dataStore media securely

computing ESSENTIALS

Page 19: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

19

Ergonomics Study of human factors

related to things people use

Fitting the job to the worker

Improve productivity Health issues

Physical health Mental health

computing ESSENTIALS

Page 20: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

20

Physical Health

Sitting in awkward position for long periods

Eyestrain and headache

Back and neck pain

Repetitive strain injury (RSI)

Carpal Tunnel Syndrome

computing ESSENTIALS

Page 21: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

21

Ideal Microcomputer Work Environment

computing ESSENTIALS

Page 22: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

22

Mental Health Technology can be counterproductive

NoiseVoice input/outputPrintersCooling fans, equipment vibration

Excessive monitoringTime of customer service callsNumber of keystrokesLess is more

computing ESSENTIALS

Page 23: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

23

Ergonomic Design

Devices made with less features Simpler to use, setup Fewer buttons and lights Plug and Play

Adjustable equipment Chairs, footrests, lighting

Ergonomic devices Keyboards, mouse, glare screens

computing ESSENTIALS

Page 24: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

24

The Environment Greatest user of electricity in workplace

Energy Star program with Green PC

System Unit

Display

Manufacturing

computing ESSENTIALS

Page 25: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

25

A Look to the Future Presence Technology

Currently used with Instant Messaging software

May spread to other devicesTelevisionAutomobilePDAs, cell phones

Potential loss of privacy Abused by advertisers Abused by government

computing ESSENTIALS

Page 26: Computing ESSENTIALS     CHAPTER 1 1010 Privacy and Security computing ESSENTIALS.

26

computing ESSENTIALS