Download Privacy and Security in Computer Fundamentals I - Lecture Slides | CS 105 and more Study notes Computer Science in PDF only on Docsity! McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security 10-2 Competencies (Page 1 of 2) • Discuss the privacy issues related to the presence of large databases, private networks, the Internet, and the Web • Describe and control cookies, web bugs, and spyware • Describe the security threats posed by computer criminals, computer crime, and other hazards Page 282 10-5 Information Systems Concerns for People • Privacy – What are the threats to personal privacy and how can we protect our selves? • Security – How can access to sensitive information be controlled and how can we secure hardware and software? • Ergonomics – What are the physical and mental risks to technology and how can these risks be eliminated or controlled? • Environment – What can individuals and organizations do to minimize the impact of technology? Page 283 10-6 Computer Ethics • Computer ethics provide guidelines for computer use • Ethics: Standards of moral conduct – What is moral and right; not what is “legal”) – Not what is “legal”; not what others are doing • Ethics issues include: Privacy – Collection of data about individuals Accuracy – Data should be correct & secure Property – Who owns the rights to data & software Access – Must control access and use of data • Technology is moving faster that the legal system Page 284 10-7 Privacy • Privacy relates to the collection and use of personal information; concerns include: • Large databases – Private networks – Internet/Web • Privacy laws exist, but privacy remains primarily an ethical issue Page 284 10-10 The Illusion of Anonymity The “illusion of anonymity” is that if you are on the Internet and selective about disclosing names or other personal information, then no one knows who you are or how to find you. This is false. Many cases of people tracing other people through Internet activity. When you browse the Web your activity is monitored. When you visit a Web site your browser stores critical information onto your hard disk – usually without your permission or knowledge. Later, other (colluding) servers can access this information. Page 286 10-11 The Internet and the Web • Illusion of anonymity – Not concerned about privacy when surfing the Internet – Not concerned about privacy when sending e- mail • History file • Cookies – two basic types – Traditional – Ad network or adware cookies • Cookie-cutter programs • Spyware • Spy removal programs • Financial Modernization Act Page 286 Cookies A chunk of data, stored on your computer’s disk Created and sent to your browser by some websites (e.g. Amazon.com) Saves information about you that the server wants Shopping cart contents, your preferences, VISA card number, password, address, etc. Makes it easier to deal with that website It seems like the website “knows” you. Allows websites to track you and your behavior. 10-12 Viewing and Blocking Cookies
meen
{ General | Secuniy | Pivacy | Content | Conectons | Propane | Advanced
Home page Temporary Internet Files
‘You can change which page to use fo yout heme page. Fle Edt View Favorkes Took Help
‘Addiees: [hitpeffanueds ‘dsress [ES C:\Documents and SettingTinL.cal Sttings\Tenporary Internet Fle
Folder Tasks
Temporary Inmet les GS share ths folder
Pages you view on the Inenet ae storedin a special flder
for quick ving ltt,
en
© boca settings
Histo 1B My cecamens
The Hist folder contin ks to pages youve vied fr © Seed Dooments
viewed ges
‘accesso
G ny network aces
Dartokee passing. [FS] (Cee)
Colors. Fonts. Languages. Accessibily.
(oe) [treet] (Aeon)
| Genet | Secuiy | Pivacy| Content | Connections | Progame | Advanced ‘Genexal | Secuy | Piveey | Content | Connection | Progame | Advanced
[py cnaenitnaanteainn Te taping tet
saswe [ean
(tie) (ube) Cai) set tos
Blocks tipaty cookies hat do ot ave a compact
Tonray Inert ee chy Bey oa
+ Taek day cuckis that ue panayidetale
Gy Seen ee eden cas pa ue
cera Scipio eta ate
<a cmt
iy
[Mogens ee
Oepotamreceintinn [6 “Toor cad hn nil Wb ae
‘enter
=) —slem)
10-15
10-16 Spyware Removal • Anti-Spyware is used for: – Finding and removing spyware – Automating spyware removal – Staying up to date Page 290 10-17 Ad-Aware Page 290 “Ad-Aware is an anti-malware program developed by Lavasoft that detects and removes spyware or adware on a user's computer. It detects spyware, viruses, dialers, Trojans, bots, rootkits, data miners, aggressive advertising, parasites, browser hijackers, and tracking components.” [Wikipedia] 10-20 Computer Crime Computer Crimes have tripled in the past two years • Malicious Programs – Viruses – Worms – Trojan horse • Denial of service (DoS) • Internet Scams • Theft – Hardware or software – Data – Computer time • Data Manipulation – Computer Fraud and Abuse Act Page 293 Commonly Encountered Viruses
ert ele etl)
Follows every outgoing e-mail with a second e-mail containing a virus
Automatically attaches to outgoing e-mail
Recreates itself through Microsoft Outlook; renames files
Copies itself on all available network drives
Deletes data on December 13th
10-21
Common Internet Scams
Description
Identity theft
Chain letter
Auction fraud
Vacation prize
Advance fee loans
Individual(s) pose as ISPs, bank representatives, or government
agencies requesting personal information. Once obtained,
criminal(s) assume a person's identity for a variety of financial
transactions.
Classic chain letter instructing recipient to send a nominal
amount of money to each of five people on a list. The recipient
removes the first name on the list, adds his or her name at the
bottom and mails the chain letter to five friends. Almost all chain
letters are fraudulent and illegal.
Merchandise is selected and payment is sent. Merchandise is
never delivered.
“Free” vacation has been awarded. Upon arrival at vacation
destination, the accommodations are dreadful but can be
upgraded for a fee.
Guaranteed low rate loans available to almost anyone.
After applicant provides personal loan-related information,
the loan is granted subject to payment of an “insurance fee.”
10-22
Disaster & Backup Procedures • Disaster recovery plan – 9/11, Mississippi floods, California fires, hurricanes, & the unexpected disaster – Offsite secure data storage of backup (tapes?) • Hot backup site • Cold backup site • Physical Security – Protect the hardware • Data Security – Protect the data and the software 10-25 10-26 Restricting Access • Biometric scanning – Fingerprint scanners – Iris (eye) scanners • Assigning passwords • Firewalls – Special hardware and software – Controls access to internal networks Page 297 10-27 Ergonomics (Page 1 of 3) Study of human factors related to things people use Page 299 10-30 Environmental Protection Page 302 Microcomputers use most of the electricity in work environment. Turn off when not IN USE Account for 5% of the electricity used Sleep Mode The EPA (Environmental Protection Agency) The Energy Star program To discourage waste in the various industries The Green PC System Unit – energy saving microprocessor, eliminates cooling fan, has sleep mode Display – flat panels, power-down monitors, screen-saver software that clears the display when not in use Manufacturing – use of fewer harmful chemicals particularly choloroflurocarbons (CFCs) in solvents and cleaning agents Environmental Protection
System unit with low energy
requirements and no cociing fan
The Green PC 10-31
10-32 Personal Responsibility to Help Protect the Environment • What can computer users do? • Conserve • Recycle • Educate Page 303 10-35 Discussion Questions (Page 1 of 2) • Discuss the impact of large databases, private networks, the Internet, and the web on privacy. • Discuss the various kinds of computer criminals. • What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals? Page 312 10-36 Discussion Questions (page 2 of 2) • What is ergonomics? How does computer use impact mental health? Physical health? • Describe the basic elements of the Green PC and what you can do to protect the environment. Page 312