Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Privacy and Security in Computer Fundamentals I - Lecture Slides | CS 105, Study notes of Computer Science

Material Type: Notes; Class: COMPUTING FUND I; Subject: Computer Science; University: Portland State University; Term: Fall 2008;

Typology: Study notes

Pre 2010

Uploaded on 08/19/2009

koofers-user-pny
koofers-user-pny 🇺🇸

10 documents

1 / 36

Toggle sidebar

Related documents


Partial preview of the text

Download Privacy and Security in Computer Fundamentals I - Lecture Slides | CS 105 and more Study notes Computer Science in PDF only on Docsity! McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security 10-2 Competencies (Page 1 of 2) •  Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web •  Describe and control cookies, web bugs, and spyware •  Describe the security threats posed by computer criminals, computer crime, and other hazards Page 282 10-5 Information Systems Concerns for People •  Privacy – What are the threats to personal privacy and how can we protect our selves? •  Security – How can access to sensitive information be controlled and how can we secure hardware and software? •  Ergonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled? •  Environment – What can individuals and organizations do to minimize the impact of technology? Page 283 10-6 Computer Ethics •  Computer ethics provide guidelines for computer use •  Ethics: Standards of moral conduct –  What is moral and right; not what is “legal”) –  Not what is “legal”; not what others are doing •  Ethics issues include: Privacy – Collection of data about individuals Accuracy – Data should be correct & secure Property – Who owns the rights to data & software Access – Must control access and use of data •  Technology is moving faster that the legal system Page 284 10-7 Privacy •  Privacy relates to the collection and use of personal information; concerns include: •  Large databases – Private networks –  Internet/Web •  Privacy laws exist, but privacy remains primarily an ethical issue Page 284 10-10 The Illusion of Anonymity The “illusion of anonymity” is that if you are on the Internet and selective about disclosing names or other personal information, then no one knows who you are or how to find you. This is false. Many cases of people tracing other people through Internet activity. When you browse the Web your activity is monitored. When you visit a Web site your browser stores critical information onto your hard disk – usually without your permission or knowledge. Later, other (colluding) servers can access this information. Page 286 10-11 The Internet and the Web •  Illusion of anonymity – Not concerned about privacy when surfing the Internet – Not concerned about privacy when sending e- mail •  History file •  Cookies – two basic types – Traditional – Ad network or adware cookies •  Cookie-cutter programs •  Spyware •  Spy removal programs •  Financial Modernization Act Page 286 Cookies A chunk of data, stored on your computer’s disk Created and sent to your browser by some websites (e.g. Amazon.com) Saves information about you that the server wants Shopping cart contents, your preferences, VISA card number, password, address, etc. Makes it easier to deal with that website It seems like the website “knows” you. Allows websites to track you and your behavior. 10-12 Viewing and Blocking Cookies meen { General | Secuniy | Pivacy | Content | Conectons | Propane | Advanced Home page Temporary Internet Files ‘You can change which page to use fo yout heme page. Fle Edt View Favorkes Took Help ‘Addiees: [hitpeffanueds ‘dsress [ES C:\Documents and SettingTinL.cal Sttings\Tenporary Internet Fle Folder Tasks Temporary Inmet les GS share ths folder Pages you view on the Inenet ae storedin a special flder for quick ving ltt, en © boca settings Histo 1B My cecamens The Hist folder contin ks to pages youve vied fr © Seed Dooments viewed ges ‘accesso G ny network aces Dartokee passing. [FS] (Cee) Colors. Fonts. Languages. Accessibily. (oe) [treet] (Aeon) | Genet | Secuiy | Pivacy| Content | Connections | Progame | Advanced ‘Genexal | Secuy | Piveey | Content | Connection | Progame | Advanced [py cnaenitnaanteainn Te taping tet saswe [ean (tie) (ube) Cai) set tos Blocks tipaty cookies hat do ot ave a compact Tonray Inert ee chy Bey oa + Taek day cuckis that ue panayidetale Gy Seen ee eden cas pa ue cera Scipio eta ate <a cmt iy [Mogens ee Oepotamreceintinn [6 “Toor cad hn nil Wb ae ‘enter =) —slem) 10-15 10-16 Spyware Removal •  Anti-Spyware is used for: –  Finding and removing spyware –  Automating spyware removal –  Staying up to date Page 290 10-17 Ad-Aware Page 290 “Ad-Aware is an anti-malware program developed by Lavasoft that detects and removes spyware or adware on a user's computer. It detects spyware, viruses, dialers, Trojans, bots, rootkits, data miners, aggressive advertising, parasites, browser hijackers, and tracking components.” [Wikipedia] 10-20 Computer Crime Computer Crimes have tripled in the past two years •  Malicious Programs –  Viruses –  Worms –  Trojan horse •  Denial of service (DoS) •  Internet Scams •  Theft –  Hardware or software –  Data –  Computer time •  Data Manipulation –  Computer Fraud and Abuse Act Page 293 Commonly Encountered Viruses ert ele etl) Follows every outgoing e-mail with a second e-mail containing a virus Automatically attaches to outgoing e-mail Recreates itself through Microsoft Outlook; renames files Copies itself on all available network drives Deletes data on December 13th 10-21 Common Internet Scams Description Identity theft Chain letter Auction fraud Vacation prize Advance fee loans Individual(s) pose as ISPs, bank representatives, or government agencies requesting personal information. Once obtained, criminal(s) assume a person's identity for a variety of financial transactions. Classic chain letter instructing recipient to send a nominal amount of money to each of five people on a list. The recipient removes the first name on the list, adds his or her name at the bottom and mails the chain letter to five friends. Almost all chain letters are fraudulent and illegal. Merchandise is selected and payment is sent. Merchandise is never delivered. “Free” vacation has been awarded. Upon arrival at vacation destination, the accommodations are dreadful but can be upgraded for a fee. Guaranteed low rate loans available to almost anyone. After applicant provides personal loan-related information, the loan is granted subject to payment of an “insurance fee.” 10-22 Disaster & Backup Procedures •  Disaster recovery plan –  9/11, Mississippi floods, California fires, hurricanes, & the unexpected disaster –  Offsite secure data storage of backup (tapes?) •  Hot backup site •  Cold backup site •  Physical Security –  Protect the hardware •  Data Security –  Protect the data and the software 10-25 10-26 Restricting Access •  Biometric scanning –  Fingerprint scanners –  Iris (eye) scanners •  Assigning passwords •  Firewalls –  Special hardware and software –  Controls access to internal networks Page 297 10-27 Ergonomics (Page 1 of 3) Study of human factors related to things people use Page 299 10-30 Environmental Protection Page 302 Microcomputers use most of the electricity in work environment. Turn off when not IN USE Account for 5% of the electricity used Sleep Mode The EPA (Environmental Protection Agency) The Energy Star program To discourage waste in the various industries The Green PC System Unit – energy saving microprocessor, eliminates cooling fan, has sleep mode Display – flat panels, power-down monitors, screen-saver software that clears the display when not in use Manufacturing – use of fewer harmful chemicals particularly choloroflurocarbons (CFCs) in solvents and cleaning agents Environmental Protection System unit with low energy requirements and no cociing fan The Green PC 10-31 10-32 Personal Responsibility to Help Protect the Environment •  What can computer users do? •  Conserve •  Recycle •  Educate Page 303 10-35 Discussion Questions (Page 1 of 2) •  Discuss the impact of large databases, private networks, the Internet, and the web on privacy. •  Discuss the various kinds of computer criminals. •  What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals? Page 312 10-36 Discussion Questions (page 2 of 2) •  What is ergonomics? How does computer use impact mental health? Physical health? •  Describe the basic elements of the Green PC and what you can do to protect the environment. Page 312
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved