Ch 9: Privacy and Security
Download
Report
Transcript Ch 9: Privacy and Security
computing
ESSENTIALS
9
Privacy and
Security
Copyright 2003 The McGraw-Hill Companies,
Inc..
1
computing
ESSENTIALS
Competencies
Negative effects
Privacy
Security
Ergonomics
Environment
Copyright 2003 The McGraw-Hill Companies,
Inc.
2
computing
ESSENTIALS
Negative Effects
Effective implementation of technology
Maximize positive effects
Minimize negative effects
Significant concerns
Privacy
Security
Ergonomics
Environment
Copyright 2003 The McGraw-Hill Companies,
Inc.
3
computing
ESSENTIALS
Privacy
Laws often do not keep up with technology
Ethics
Standards of moral conduct
Computer ethics
Guidelines for morally acceptable
computer use
• Privacy
• Property
• Accuracy
• Access
Copyright 2003 The McGraw-Hill Companies,
Inc.
4
computing
ESSENTIALS
Large Databases
Information on citizens and consumers
compiled daily
Banks, utilities, grocery stores
Hospitals, doctor’s offices
Government
Social Security Number
Used for ID number on forms
Information resellers
Contact data is valuable
Copyright 2003 The McGraw-Hill Companies,
Inc.
5
computing
ESSENTIALS
Information Without Consent
Information collected and used without the
person’s knowledge
Shopping habits, video rentals
Medical records
Banking transactions
Federal government
Know Your Customer
Total Information Awareness project
Copyright 2003 The McGraw-Hill Companies,
Inc.
6
computing
ESSENTIALS
Inaccurate Information
Inaccurate data can be circulated
Data propagation can spread mistakes to
other databases
Laws can help
Correct credit data
Freedom of Information Act
Copyright 2003 The McGraw-Hill Companies,
Inc.
7
computing
ESSENTIALS
Private Networks
Employers legally monitor email
Snoopware used in 75% of
businesses
Online services right to censor content
Copyright 2003 The McGraw-Hill Companies,
Inc.
8
computing
ESSENTIALS
Internet and Web
Concerns about email privacy on Web
Illusion of anonymity
Browser records pages visited
Cookies monitor
Times and pages visited
Other private information
Copyright 2003 The McGraw-Hill Companies,
Inc.
9
computing
ESSENTIALS
Cookies
Programs that monitor Web activity
Traditional cookies
Monitor activity at one site
Dormant other times
Ad network cookies
Spyware programs that record all Internet
activity
Web bugs
Cookie-cutter programs
Copyright 2003 The McGraw-Hill Companies,
Inc.
10
computing
ESSENTIALS
Privacy Laws
Mostly cover government usage, but not private
organizations
Some current laws
Fair Credit Reporting Act (1970)
Freedom of Information Act (1970)
Right to Financial Privacy Act (1974)
Computer Abuse Amendments Act (1994)
No Electronic Theft (NET) Act (1997)
Copyright 2003 The McGraw-Hill Companies,
Inc.
11
computing
ESSENTIALS
Code of Fair Information
Practice
Response to information privacy concerns
Not law, but adopted by many information
collecting businesses
• No secret
• Right to correct
databases
• Assurance of
• Right of individual
reliability and proper
access
use
• Right of consent
Copyright 2003 The McGraw-Hill Companies,
Inc.
12
computing
ESSENTIALS
Security
Threats to computer systems include
Viruses
Electronic break-ins
Natural and other hazards
Terrorist activity
Copyright 2003 The McGraw-Hill Companies,
Inc.
13
computing
ESSENTIALS
Computer Criminals
Employees
Outside users
“Hackers” and “crackers”
Organized crime
Terrorists
Copyright 2003 The McGraw-Hill Companies,
Inc.
14
computing
ESSENTIALS
Computer Crime
Damage to computers, programs or files
Viruses and worms
Denial of Service attack
Theft
Hardware, data, computer time
Software piracy
Manipulation
Copyright 2003 The McGraw-Hill Companies,
Inc.
15
computing
ESSENTIALS
Other Hazards
Other hazards to computer systems besides
criminal misuse
Natural hazards
Earthquake, fire, floods, hurricanes
Civil strife
War, riots
Technological failures
Voltage surge, brownouts
Human error
Data-entry, programming errors
Copyright 2003 The McGraw-Hill Companies,
Inc.
16
computing
ESSENTIALS
Security Measures
Protecting information, hardware, software
Principle methods
Encrypting messages
Pretty Good Privacy
Restricting access
Passwords, firewalls
Anticipating disasters
Disaster recovery plan
Backing up data
In case other measures fail
Copyright 2003 The McGraw-Hill Companies,
Inc.
17
computing
ESSENTIALS
Security for Microcomputers
Individuals should also implement security
Some basic procedures
Avoid extreme conditions
Clean and protect equipment
Avoid viruses
Virus protection software
Guard computer
Cable locks, marking equipment
Guard programs and data
Store media securely
Copyright 2003 The McGraw-Hill Companies,
Inc.
18
computing
ESSENTIALS
Ergonomics
Study of human
factors related to
things people use
Fitting the job to the
worker
Improve productivity
Health issues
Physical health
Mental health
Copyright 2003 The McGraw-Hill Companies,
Inc.
19
computing
ESSENTIALS
Physical Health
Sitting in awkward position for long periods
Eyestrain and headache
Back and neck pain
Repetitive strain injury (RSI)
Carpal Tunnel Syndrome
Copyright 2003 The McGraw-Hill Companies,
Inc.
20
computing
ESSENTIALS
Ideal Microcomputer Work
Environment
Copyright 2003 The McGraw-Hill Companies,
Inc.
21
computing
ESSENTIALS
Mental Health
Technology can be counterproductive
Noise
Voice input/output
Printers
Cooling fans, equipment vibration
Excessive monitoring
Time of customer service calls
Number of keystrokes
Less is more
Copyright 2003 The McGraw-Hill Companies,
Inc.
22
computing
ESSENTIALS
Ergonomic Design
Devices made with less features
Simpler to use, setup
Fewer buttons and lights
Plug and Play
Adjustable equipment
Chairs, footrests, lighting
Ergonomic devices
Keyboards, mouse, glare screens
Copyright 2003 The McGraw-Hill Companies,
Inc.
23
computing
ESSENTIALS
The Environment
Greatest user of electricity in workplace
Energy Star program with Green PC
System Unit
Display
Manufacturing
Copyright 2003 The McGraw-Hill Companies,
Inc.
24
computing
ESSENTIALS
A Look to the Future
Presence Technology
Currently used with Instant
Messaging software
May spread to other devices
Television
Automobile
PDAs, cell phones
Potential loss of privacy
Abused by advertisers
Abused by government
Copyright 2003 The McGraw-Hill Companies,
Inc.
25
computing
ESSENTIALS
Copyright 2003 The McGraw-Hill Companies,
Inc.
26