Ch 9: Privacy and Security

Download Report

Transcript Ch 9: Privacy and Security

computing
ESSENTIALS

9
Privacy and
Security
Copyright 2003 The McGraw-Hill Companies,
Inc..
1
computing

ESSENTIALS
Competencies
Negative effects
Privacy
Security
Ergonomics
Environment
Copyright 2003 The McGraw-Hill Companies,
Inc.
2
computing
ESSENTIALS

Negative Effects


Effective implementation of technology
 Maximize positive effects
 Minimize negative effects
Significant concerns
 Privacy
 Security
 Ergonomics
 Environment
Copyright 2003 The McGraw-Hill Companies,
Inc.
3
computing

ESSENTIALS
Privacy



Laws often do not keep up with technology
Ethics
 Standards of moral conduct
Computer ethics
 Guidelines for morally acceptable
computer use
• Privacy
• Property
• Accuracy
• Access
Copyright 2003 The McGraw-Hill Companies,
Inc.
4
computing
ESSENTIALS

Large Databases



Information on citizens and consumers
compiled daily
 Banks, utilities, grocery stores
 Hospitals, doctor’s offices
 Government
Social Security Number
 Used for ID number on forms
Information resellers
 Contact data is valuable
Copyright 2003 The McGraw-Hill Companies,
Inc.
5
computing
ESSENTIALS

Information Without Consent


Information collected and used without the
person’s knowledge
 Shopping habits, video rentals
 Medical records
 Banking transactions
Federal government
 Know Your Customer
 Total Information Awareness project
Copyright 2003 The McGraw-Hill Companies,
Inc.
6
computing
ESSENTIALS

Inaccurate Information

Inaccurate data can be circulated

Data propagation can spread mistakes to
other databases

Laws can help

Correct credit data

Freedom of Information Act
Copyright 2003 The McGraw-Hill Companies,
Inc.
7
computing
ESSENTIALS

Private Networks

Employers legally monitor email

Snoopware used in 75% of
businesses

Online services right to censor content
Copyright 2003 The McGraw-Hill Companies,
Inc.
8
computing
ESSENTIALS

Internet and Web

Concerns about email privacy on Web

Illusion of anonymity

Browser records pages visited

Cookies monitor

Times and pages visited

Other private information
Copyright 2003 The McGraw-Hill Companies,
Inc.
9
computing
ESSENTIALS

Cookies




Programs that monitor Web activity
Traditional cookies
 Monitor activity at one site
 Dormant other times
Ad network cookies
 Spyware programs that record all Internet
activity
 Web bugs
Cookie-cutter programs
Copyright 2003 The McGraw-Hill Companies,
Inc.
10
computing
ESSENTIALS

Privacy Laws


Mostly cover government usage, but not private
organizations
Some current laws
 Fair Credit Reporting Act (1970)
 Freedom of Information Act (1970)
 Right to Financial Privacy Act (1974)
 Computer Abuse Amendments Act (1994)
 No Electronic Theft (NET) Act (1997)
Copyright 2003 The McGraw-Hill Companies,
Inc.
11
computing
ESSENTIALS

Code of Fair Information
Practice
Response to information privacy concerns
 Not law, but adopted by many information
collecting businesses
• No secret
• Right to correct
databases
• Assurance of
• Right of individual
reliability and proper
access
use
• Right of consent

Copyright 2003 The McGraw-Hill Companies,
Inc.
12
computing
ESSENTIALS

Security

Threats to computer systems include

Viruses

Electronic break-ins

Natural and other hazards

Terrorist activity
Copyright 2003 The McGraw-Hill Companies,
Inc.
13
computing
ESSENTIALS

Computer Criminals

Employees

Outside users

“Hackers” and “crackers”

Organized crime

Terrorists
Copyright 2003 The McGraw-Hill Companies,
Inc.
14
computing
ESSENTIALS

Computer Crime



Damage to computers, programs or files

Viruses and worms

Denial of Service attack
Theft

Hardware, data, computer time

Software piracy
Manipulation
Copyright 2003 The McGraw-Hill Companies,
Inc.
15
computing
ESSENTIALS

Other Hazards





Other hazards to computer systems besides
criminal misuse
Natural hazards
 Earthquake, fire, floods, hurricanes
Civil strife
 War, riots
Technological failures
 Voltage surge, brownouts
Human error
 Data-entry, programming errors
Copyright 2003 The McGraw-Hill Companies,
Inc.
16
computing
ESSENTIALS

Security Measures


Protecting information, hardware, software
Principle methods
 Encrypting messages
 Pretty Good Privacy
 Restricting access
 Passwords, firewalls
 Anticipating disasters
 Disaster recovery plan
 Backing up data
 In case other measures fail
Copyright 2003 The McGraw-Hill Companies,
Inc.
17
computing
ESSENTIALS

Security for Microcomputers


Individuals should also implement security
Some basic procedures
 Avoid extreme conditions
 Clean and protect equipment
 Avoid viruses
 Virus protection software
 Guard computer
 Cable locks, marking equipment
 Guard programs and data
 Store media securely
Copyright 2003 The McGraw-Hill Companies,
Inc.
18
computing
ESSENTIALS

Ergonomics

Study of human
factors related to
things people use

Fitting the job to the
worker

Improve productivity

Health issues

Physical health

Mental health
Copyright 2003 The McGraw-Hill Companies,
Inc.
19
computing
ESSENTIALS

Physical Health

Sitting in awkward position for long periods

Eyestrain and headache

Back and neck pain

Repetitive strain injury (RSI)

Carpal Tunnel Syndrome
Copyright 2003 The McGraw-Hill Companies,
Inc.
20
computing
ESSENTIALS

Ideal Microcomputer Work
Environment
Copyright 2003 The McGraw-Hill Companies,
Inc.
21
computing
ESSENTIALS

Mental Health

Technology can be counterproductive
 Noise
 Voice input/output
 Printers
 Cooling fans, equipment vibration
 Excessive monitoring
 Time of customer service calls
 Number of keystrokes
 Less is more
Copyright 2003 The McGraw-Hill Companies,
Inc.
22
computing
ESSENTIALS

Ergonomic Design



Devices made with less features
 Simpler to use, setup
 Fewer buttons and lights
 Plug and Play
Adjustable equipment
 Chairs, footrests, lighting
Ergonomic devices
 Keyboards, mouse, glare screens
Copyright 2003 The McGraw-Hill Companies,
Inc.
23
computing
ESSENTIALS

The Environment

Greatest user of electricity in workplace

Energy Star program with Green PC

System Unit

Display

Manufacturing
Copyright 2003 The McGraw-Hill Companies,
Inc.
24
computing
ESSENTIALS

A Look to the Future


Presence Technology
 Currently used with Instant
Messaging software
 May spread to other devices
 Television
 Automobile
 PDAs, cell phones
Potential loss of privacy
 Abused by advertisers
 Abused by government
Copyright 2003 The McGraw-Hill Companies,
Inc.
25
computing
ESSENTIALS
Copyright 2003 The McGraw-Hill Companies,
Inc.

26