




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Chapter 8Protecting People and Information: Threats and Safeguards,Copyright 2010 by the McGraw-Hill Companies, Inc. All rights reserved.,McGraw-Hill/Irwin,STUDENT LEARNING OUTCOMES,Define ethics and describe the two factors that affect how you make a decision concerning an ethical issue. Define and
2、 describe intellectual property, copyright, Fair Use Doctrine, and pirated software. Describe privacy and describe ways in which it can be threatened. Describe the ways in which information on your computer or network is vulnerable and list measures you can take to protect it.,8-2,SHE LOST $400,000
3、TO AN E-MAIL SCAM,“419” e-mails are a popular type of scam 419 scams promise you, in an e-mail, that you will get rich if you ante up a small fee Janella Spears took the bait and spent $400,000 trying to collect her fortune She even cashed in her husbands retirement to get the money to send the croo
4、ks,8-3,Case Study Questions,What do you think about this true story? Have you ever been caught in a scam? How did you feel when you discovered that you had been fooled? What would you do if you knew that your parent was being complicity in his or her own victimization?,8-4,INTRODUCTION,Handling info
5、rmation responsibly means understanding the following issues Ethics Personal privacy Threats to information Protection of information,8-5,CHAPTER ORGANIZATION,Ethics Learning Outcomes #1 & #2 Privacy Learning Outcome #3 Security Learning Outcome #4,8-6,ETHICS,Ethics the principles and standards that
6、 guide our behavior toward other people Ethics are rooted in history, culture, and religion,8-7,Factors the Determine How You Decide Ethical Issues,Actions in ethical dilemmas determined by Your basic ethical structure The circumstances of the situation Your basic ethical structure determines what y
7、ou consider to be Minor ethical violations Serious ethical violations Very serious ethical violations,8-8,Basic Ethical Structure,8-9,Circumstances of the Situation,Consequences of the action or inaction Societys opinion of the action or inaction Likelihood of effect of action or inaction Time to co
8、nsequences of action or inaction Relatedness of people who will be affected by action or inaction Reach of result of action or inaction,8-10,Intellectual Property,Intellectual property intangible creative work that is embodied in physical form Copyright legal protection afforded an expression of an
9、idea Fair Use Doctrine may use copyrighted material in certain situations,8-11,Intellectual Property,Using copyrighted software without permission violates copyright law Pirated software the unauthorized use, duplication, distribution, or sale of copyrighted software,8-12,PRIVACY,Privacy the right t
10、o left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Dimensions of privacy Psychological: to have a sense of control Legal: to be able to protect yourself,8-13,Privacy and Other Individuals,Key logger (key trapper) software
11、 a program that, when installed on a computer, records every keystroke and mouse click Screen capture programs capture screen from video card E-mail is stored on many computers as it travels from sender to recipient Hardware key logger hardware device that captures keystrokes moving between keyboard
12、 and motherboard. Event Data Recorders (EDR) located in the airbag control module and collects data from your car as you are driving.,8-14,An E-Mail is Stored on Many Computers,8-15,Identity Theft,Identity theft the forging of someones identity for the purpose of fraud,8-16,Identity Theft,Phishing (
13、carding, brand spoofing) a technique to gain personal information for the purpose of identity theft NEVER Reply without question to an e-mail asking for personal information Click directly on a Web site provided in such an e-mail,8-17,Identity Theft,8-18,Pharming,Pharming - rerouting your request fo
14、r a legitimate Web site sending it to a slightly different Web address or by redirecting you after you are already on the legitimate site Pharming is accomplished by gaining access to the giant databases that Internet providers use to route Web traffic. It often works because its hard to spot the ti
15、ny difference in the Web site address.,8-19,Privacy and Employees,Companies need information about their employees to run their business effectively As of March 2005, 60% of employers monitored employee e-mails 70% of Web traffic occurs during work hours 78% of employers reported abuse 60% employees
16、 admitted abuse,8-20,Privacy and Employees,Visiting inappropriate sites Gaming, chatting, stock trading, social networking, etc.,8-21,Reasons for Monitoring,Hire the best people possible Ensure appropriate behavior on the job Avoid litigation for employee misconduct,8-22,Privacy and Consumers,Consum
17、ers want businesses to Know who they are, but not to know too much Provide what they want, but not gather information on them Let them know about products, but not pester them with advertising,8-23,Cookies,Cookie a small file that contains information about you and your Web activities, which a Web s
18、ite places on your computer Handle cookies by using Web browser cookie management option Buy a program that manages cookies,8-24,Spam,Spam unsolicited e-mail from businesses advertising goods and services Gets past spam filters by Inserting extra characters Inserting HTML tags that do nothing Replyi
19、ng usually increases, rather than decreases, amount of spam,8-25,Adware and Spyware,Adware software to generate ads that installs itself when you download another program Spyware (sneakware, stealthware) software that comes hidden in downloaded software and helps itself to your computer resources,8-
20、26,Adware in Free Version of Eudora,8-27,Trojan Horse Software,Trojan horse software software you dont want inside software you do want Some ways to detect Trojan horse software AdAware at www.lavasoftUSA.com The Cleaner at Trojan First Aid Kit (TFAK) Check it out before you download at ,8-28,Web Lo
21、gs,Web log one line of information for every visitor to a Web site Clickstream records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought. Anonymous Web browsing (AWB) hides your identity from th
22、e Web sites you visit The Anonymizer at SuftSecret at ,8-29,Privacy and Government Agencies,About 2,000 government agencies have databases with information on people Government agencies need information to operate effectively Whenever you are in contact with government agency, you leave behind infor
23、mation about yourself,8-30,Government Agencies Storing Personal Information,Law enforcement NCIC (National Crime Information Center) FBI Electronic Surveillance Carnivore or DCS-1000 Magic Lantern (software key logger) NSA (National Security Agency) Echelon collect electronic information by satellit
24、e,8-31,Government Agencies Storing Personal Information,IRS Census Bureau Student loan services FICA Social Security Administration Social service agencies Department of Motor Vehicles,8-32,Laws on Privacy,Health Insurance Portability and Accountability Act (HIPAA) protects personal health informati
25、on Financial Services Modernization Act requires that financial institutions protect personal customer information Other laws in Figure 8.6 on page 244,8-33,SECURITY AND EMPLOYEES,Attacks on information and computer resources come from inside and outside the company Computer sabotage costs about $10
26、 billion per year In general, employee misconduct is more costly than assaults from outside,8-34,Security and Employees,8-35,Security and Outside Threats,Hackers knowledgeable computer users who use their knowledge to invade other peoples computers Computer virus (virus) software that is written wit
27、h malicious intent to cause annoyance or damage Worm type of virus that spreads itself from computer to computer usually via e-mail Denial-of-service (DoS) attack floods a Web site with so many requests for service that it slows down or crashes,8-36,Computer Viruses Cant,Hurt your hardware Ex: Monitors, printers, processors, etc. Hurt a
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025至2030年中国小功率灯管数据监测研究报告
- 2025至2030年中国寿司杯行业发展研究报告
- 2025年中国密码锁市场竞争格局及投资战略规划报告
- 2018-2024年中国海洋休闲食品市场竞争格局分析及投资方向研究报告
- 2025至2030年中国啤酒篮数据监测研究报告
- 中国高纯铜行业发展监测及投资战略研究报告
- 2025至2030年中国台式煮面机行业发展研究报告
- 中国不锈钢橱柜行业市场供需格局及投资规划建议报告
- 2025至2030年中国可倾燃气炒锅市场分析及竞争策略研究报告
- 视频平台可行性报告
- 2-山东工业技师学院申报国家级高技能人才培训基地项目申报书
- 常用消毒剂的分类、配制及使用课件演示幻灯片
- GB 45069-2024悬崖秋千安全技术要求
- 员工反恐怖协议
- 2025年高考政治一轮复习知识清单必修四《哲学与文化》重难点知识
- 2021年4月17日江苏事业单位考试《综合知识和能力素质》(管理岗客观题)
- 《临床技术操作规范-放射医学检查技术分册》
- 生活中的魔法数学名师公开课获奖课件百校联赛一等奖课件
- 2024年同等学力申硕英语考试真题
- 江苏省南京市六校2024-2025学年高一上学期期中联合调研 化学试题
- 儿科基础临床知识题库单选题100道及答案解析
评论
0/150
提交评论