Chapter 10 Computers in Your Future Template

Download Report

Transcript Chapter 10 Computers in Your Future Template

Chapter
10
Module 10A
Ethics
Module 10B
Security
Module 10C
Current Issues & Controversies
Module 10D
Emerging Technologies
Chapter
10
Ethics
Module
A
10
 Avoiding
Computer-Related Legal
Problems
 Introducing Ethics
 Computer Ethics for Computer
Users
 Computer Ethics for Computer
Professionals
Avoiding Computer-Related
Legal Problems
Module

copyright infringement
A
10
Plagiarism

Software Piracy
public domain software
General Public License (GPL)
shareware
software license
archival backups
site license
Avoiding Computer-Related
Legal Problems
Module
A
10
At some colleges,
plagiarism can get
you thrown out of
school on the first
offense
Several sites make hundreds of thousands of public
domain and shareware programs available for
downloading via the Internet, including shareware.com
and Filez.
Avoiding Computer-Related
Legal Problems
Module 
A
10
The following actions are illegal
incorporating all or part of a GPL-licensed
program in a program that you sell
violating the terms of a software license
making copies of site-licensed programs for
your personal use at home
giving or selling copies of commercial
programs to others
Avoiding Computer-Related
Legal Problems
Module
A
10
 Email
use
Your email is not private! Many people have lost their
jobs after making fun of their boss in what they
thought was a private email message
Avoiding Computer-Related
Legal Problems
Module
A
10
 Adult
sites & erotica newsgroups
hostile environment
 Obscenity
 Unauthorized
hacker
computer access
Introducing Ethics
Module
A
10
Ethics is the branch of
philosophy that’s concerned
with determining what’s
right and wrong, especially
in the context of moral
dilemmas
Introducing Ethics

Module
A
10

Moral dilemmas arise in two situations
when it’s not clear which, if any, moral rule
applies
when 2 or more rules apply, and they conflict
An act is ethical if . . .
were everyone to act the same way, society as a
whole would benefit
it treats people as an end in themselves, rather
than as a means to an end
impartial observers would judge that it is fair to
all parties concerned
Thinking Through Moral
Dilemmas

Module
A
10
A practical guide:
You’d be proud to tell your mom or dad
If you were in the other person’s shoes, you’d
admit that your action was fair
If you did it at work, your company’s customers
would agree that you did the right thing . . .
You wouldn’t mind reading about your action on
the front page of your newspaper
Ethics for Computer Users

Module
A
10
Computer ethics for computer users
respecting yourself
respecting others
respecting academic integrity
Ethics for Computer
Professionals
Module
Excerpt from the Code of Ethics of the Institute for
Certification of Computing Professionals
A 
10
Essential elements relating to conduct
that identify a professional activity:
high standard of skill & knowledge
confidential relationship with people
served
public reliance upon the standards of
conduct in established practice
observance of an ethical code
Ethics for Computer
Professionals
 Safety
Module
A
10
first
 Additional ethical responsibilities
competence
responsibility
integrity
Dozens of professional associations govern
computing professionals. For links to their codes of
ethics, see the Illinois Institute of Technology’s Codes
of Ethics Online: Computing & Information Systems
page
Ethics for Computer
Professionals
Module
A
10
 Programmer
liability
 Computer ethics in business
 Whistle-blowing
For more information on the controversies
surrounding whistle-blowing, see the Whistleblowing links page put together by students at North
Carolina State University
Security
Module
B
10
 Scope
of the Problem
 Computer Intruders’ Tools and
Techniques
 Meet the Attackers
 What’s at Stake?
 Safeguarding Computer Systems
Security
Security
The scenario . . .
Module
B
10
On Christmas Day, 1995, Tsutomu Shimomura, a
computational physicist, was about to leave for a
skiing trip. But he made a most unwelcome
discovery. By means of the Internet, an intruder
broke into the computers he keeps at his beach
cottage near San Diego. Stolen were hundreds of
pages of information concerning Shimomura’s
research on cellular phone security . . .
Security
Scope of the Problem
Most unauthorized intrusions go undetected
and the attackers are never caught
Module
B
10
Kevin D. Mitnick was charged with violating
several Federal laws including computer fraud and
causing damage to computer systems
Computer Intruders’
Tools & Techniques
Module
B
10
 Tricks
for obtaining passwords:
password guessing
shoulder surfing
packet sniffers
dumpster diving
social engineering
superuser status
Computer Intruders’
Tools & Techniques
Salami shaving & data diddling
 Forgery
 Security loophole detection programs
 Computer viruses

Module
B
10
file infectors
boot sector virus
macro virus
time bombs
worm
trojan horse
Meet the Attackers
 Computer
Module
B
10
hobbyists
hackers
crackers
computer virus authors
 Disgruntled
employees
logic bomb
 Spies
corporate espionage
Meet the Attackers
 Enemies
Module
B
10
& terrorists
information warfare
network warfare
structural sabotage
information terrorism
Find the latest news about virus hoaxes at Rob
Rosenberger’s Computer Virus Myths Home Page
For more information on information warfare,
including news reports, links, and analysis, see
infowar.com
What’s at Stake
 Consumption
of
staff
time
B
10  Downtime
 Fraud and theft
Module
For security measures, users should lock their
doors and turn off their computers. In some
cases, it may be wise to secure hardware to
desks to prevent theft
What’s at Stake
Module
B
10
 Adverse
publicity
 Vandalism
 Character assassination
 Loss of privacy
 Risks to public safety
 Denial of service
Safeguarding
Computer Systems
Protecting
computers from
Module
B power-relate
10
problems

power surges &
power outages
autosave
uninterruptible
power supply
(UPS)
A UPS is battery powered device that provides power to
your computer for a limited time in a power outage
Safeguarding
Computer Systems

Controlling access
Module
callback systems
tokens
digital certificates
smartcards
biometric
authentication
B
10
Smartcards are credit-card-sized devices wit their
own internal memories
Safeguarding
Computer Systems
Module
B
10
 Firewalls
 Encryption
 Antivirus
programs or vaccines
 Data backups
full backups
incremental backups
disaster recovery plan
Current Issues and
Controversies
Module
C
10
 The
Encryption Debate
 Obscenity and Indecency
 Privacy
Current issues &
controversies
Current Issues &
Controversies
Module
The scenario . . .
C
10
Identity theft is one of the fastest-growing
crimes in the U.S. and Canada. Criminals
obtain enough information about you to open
a credit account in your name, and then max
it out -- leaving you with the bill.
Current issues &
controversies
The Encryption Debate

Module
rot-13
C
10
Encryption (coded message) basics
Problem of key interception
 Public-key encryption

public-key
For more information concerning public-key
encryption, visit the RSA Laboratories’ FrequentlyAsked Questions on Cryptography page
Current issues &
controversies
The Encryption Debate

Security issues of strong encryption
key escrow
key recovery
Module
C
10

Export restrictions
bit length

Global dimension
To get the latest news and perspectives about
cryptography issues, visit the Center for Democracy and
Technology’s Crypto Debate page
Current issues &
controversies
Obscenity & Indecency
Obscenity
Module  Indecency
C
10  Communications Decency ACT (CDA)
 Filtering software

World Wide Web Consortium (W3C)
Platform for Internet Content Selection
(PICS)

The Global Dimension
Current issues &
controversies
Obscenity & Indecency
Module
C
10
Net Nanny is one
example of filtering
software that
enables parents to
screen out Web sites
that contain
indecent or obscene
material
Current issues &
controversies
Privacy
Module
C
10
Defined by U.S. Supreme Court Justice
Louis Brandeis in 1928 as “the right to
be left alone,” privacy refers to an
individual’s ability to keep their
personal and family business away from
prying eyes
Current issues &
controversies
Privacy
Privacy rights in the U.S.
 Databases of personal information
 How is information collected?
 Is self-regulation sufficient?
 Proposed solutions

Module
C
10
Platform for Privacy Preferences (P3)

The Global Dimension
Current issues &
controversies
Protecting Your Privacy Online

Module
C
10
To safeguard your privacy . . .
Don’t use your employer’s computers for
personal email
Tell children not to divulge personal
information to strangers online
Don’t fill out site registration forms unless
you see a privacy policy statement
Web sites can collect information without your
knowledge and consent. To see an example, visit the
Center for Democracy and Technology’s CDT Privacy
Demonstration Page
Emerging Technologies
Module
D
10
 Tomorrows
Hardware: Faster,
Cheaper, Connected
 Artificial
Intelligence: Toward the
Smart Machine?
 Social
Impact of AI: Sharing the
World with Machines Who Think
Emerging
technologies
Emerging Technologies
The prediction . . .
Module
D
10
What will computers be like in the future?
It’s very easy to predict the future -- the
hard part is getting it right, and that’s
particularly true where technology is
concerned. Past predictions don’t offer
much comfort . . .
Emerging
technologies
Tomorrow’s Hardware:
Faster, Cheaper, Connected
Module
D  Moore’s
10
Law
 Metcalfe’s Law
As computers become faster,
cheaper, and more valuable,
they’ll encourage the trend
towards the digitization of all
the world’s information and
knowledge
Emerging
technologies
The Short Term
Typical personal computer: Today & 2005
Module
D
10
Component
1999
2005
RAM
64MB
1GB
Processor speed
400 million
(instructions per second)
7 billion
Circuit density (number 7.5 million
of transistors)
125 million
Hard disk capacity
(gigabytes)
8 GB
135 GB
Average Internet
connection speed (bits
per second)
56,000
1 million
Emerging
technologies
Tomorrow’s Hardware:
Faster, Cheaper, Connected
Module
D
10
 The
long term
ubiquitous (everywhere) computing
 Limits
of trend extrapolation
Emerging
technologies
Artificial Intelligence:
Toward the Smart Machine
Module
D
10
 Defining
intelligence
learn and retain the learned knowledge
reason on the basis of the knowledge
plan (develop strategies)
communicate
recognize patterns
For information on artificial intelligence, an excellent
starting point is AI on the Web.
Emerging
technologies
Artificial Intelligence:
Toward the Smart Machine
Module
D
10
AI is the field that
attempts to endow
computers with
intelligence. Although
scientists know little
about the human
brain, it's clear that
the brain is far more
complex than any
computer
Emerging
technologies
The Human Brain As a CPU
Speculative estimates
Operation
Estimated speed or capacity
Input
Fast (1 gigabit per second). The human retina can
achieve a resolution of approximately 127 million
“pixels”
Processing
Fast for pattern recognition (10 billion instructions
per second); slow for calculations (2 - 100 per
second)
Output
Slow (speech: 100 bits per second)
Storage
Very large (10 terabytes), but retrieval can be
uncertain
Module
D
10
Emerging
technologies
The Turing Test
British computer
Module
scientist Alan
D
10 Turing. According
to most
psychologists, the
Turing Test's typeand-response
method is too
simplistic.
Emerging
technologies
Artificial Intelligence
Module
D
10
 Brute
force
 AI achievements
On May 11, 1997, Big Blue
defeated Russian chess
master Garry Kasparov
Emerging
technologies
Artificial Intelligence
Module
D
10
 Natural
language
speech recognition
Major advances have been made in speech
recognition, in which computers translate spoken
speech into text
Emerging
technologies
Artificial Intelligence
 Machine
Module
D
translation
 Expert systems
knowledge representation
knowledge base
10
Intelligent agents
 Pattern recognition
 Fuzzy logic

Try machine translation yourself by visiting Babelfish,
an online Web translator created by AltaVista
Emerging
technologies
Robots
Increasingly, robots are performing tasks such
as assembly, welding, material-handling, and
material transport
Module
D
10
Like to build your own robot? Visit Mondo-Tronics
Robot Store where you’ll find nearly 300 robot kits
and accessories
Emerging
technologies
Artificial Intelligence
 Strong AI
Module
CYC
D
10
Cog
neural networks
genetic algorithms
The brain contains billions neurons. In a neural net,
thousands of computer processing units are connected
in multiple ways, just as the neurons in the brain are
connected
Emerging
technologies
Social Impact of AI: Sharing the
World with Machines Who Think
 Asimov’s Three Laws of Robotics
D
First: A robot may not injure a human being
10
...
Second: A robot must obey the orders given
it by human beings except where it may
conflict with the First Law
Third: A robot must protect its own
existence as long as such protection does not
conflict with the First or Second Law
Module