【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传
转载请保留链接:https://www.ichengzhen.cn/view-5299.html
以下为本文档部分文字说明:
ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N
otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpo
stedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Not
authorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpa
rt.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEd
ucation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocume
ntmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Pa
ge1of3)Identifythemostsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivacyissuesofaccuracy,property,andacc
ess.Describetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Discussonlineidentityandmaj
orlawsonprivacy.2ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietar
ymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwa
rded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcreationofmalici
ousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasdenialofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogue
Wi-Fihotspots,theft,anddatamanipulation.Detailwaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisaster
s,andpreventingdataloss.3ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforautho
rizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicat
ed,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsinclud
ingcopyrightlaw,softwarepiracy,digitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyp
lagiarism.4ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietaryma
terialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distrib
uted,orpostedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssomeveryimportantquestionsabouttheus
eofpersonaldataandourrighttoprivacy.ThischaptercoversissuesrelatedtotheimpactoftechnologyonpeopleandhowtoprotectourselvesontheWeb.5Computi
ngEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut
horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inw
holeorpart.PeoplePrivacy–Whatarethethreatstopersonalprivacyandhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbeco
ntrolledandhowcanwesecurehardwareandsoftware?Ethics–Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Privacy,Se
curityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut
horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsit
e,inwholeorpart.PrivacyPrivacy–concernsthecollectionanduseofdataaboutindividualsThreeprimaryprivacyissues:AccuracyPropertyAccess7Computin
gEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorized
instructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicate
d,forwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page1of2)Largeorganizationscompileinformationaboutus
.Federalgovernmenthasover2,000databasesTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuya
ndwhen8ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut
horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedona
website,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicpro
fileseasilycreatedPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyide
ntifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentitytheftSpreadinginaccurateinf
ormationMistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,SecurityandEthics©2
014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordist
ributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaweb
site,inwholeorpart.PrivateNetworksEmployerscanmonitore-maillegally75percentofallbusinessessearchemployees’electronicm
ailandcomputerfilesusingsnoopwareAproposedlawcouldprohibitthistypeofelectronicmonitoringoratleastrequirethee
mployertonotifytheemployeefirst10ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterials
olelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forw
arded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCookiesCookiesSmallpiecesofinformationthataredepositedonyourharddiskfrom
websitesyouhavevisitedFirst-partycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispropr
ietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dupli
cated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntarilypostabout
themselvesonlineArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGramm-
Leach-BlileyActHealthInsurancePortabilityandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Pr
ivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstruct
oruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpos
tedonawebsite,inwholeorpart.SecurityCybercrimeorcomputercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGain
unauthorizedaccess13ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispro
prietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,sca
nned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareVirusesWorm
sTrojanhorseZombiesDenialofService(DoS)attack14ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGra
w-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioni
nanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page
2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprie
tarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentm
aynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page3of3)SocialnetworkingrisksCyber-
bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbuseAct16ComputingEssentials2014Privacy,SecurityandEthics©2014byMc
Graw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistr
ibutioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebs
ite,inwholeorpart.MakingITWorkforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcyberc
rime.17ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.
Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart
.MakingITWorkforYou~Cloud-BasedBackupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18Computi
ngEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauth
orizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplic
ated,forwarded,distributed,orpostedonawebsite,inwholeorpart.EthicsStandardsofmoralconductCopyrightGivescont
entcreatorstherighttocontroltheuseanddistributionoftheirworkPaintings,books,music,films,videogamesSoftwarepiracyUnauthorizedcopyingandd
istributionDigitalMillenniumCopyrightActDigitalrightsmanagement(DRM)Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014b
yMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdo
cumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Careers
inITITSecurityAnalystsmaintainthesecurityofacompany’snetwork,systems,anddata.Mustsafeguardinformationsystemsagainstexternalthrea
tsAnnualsalaryisusuallyfrom$62,000to$101,000Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,Securi
tyandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize
dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaw
ebsite,inwholeorpart.ALooktotheFutureAWebcamonEveryCornerImagesofpublicplacesaremoreaccessiblethaneverbefore(e.
g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcamscontinuetogrowinpopularity21ComputingEssentials2014P
rivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributi
oninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,i
nwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWeb
.Defineanddiscussonlineidentityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciouspr
ograms,includingviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworki
ngrisks,rogueWi-Fihotspots,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation
.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentm
aynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discus
swaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdatalo
ss.Defineethics,anddescribecopyrightlawandplagiarism.23