计算机专业英语课件-CE_Chap09

PPT
  • 阅读 39 次
  • 下载 0 次
  • 页数 23 页
  • 大小 3.536 MB
  • 2022-11-13 上传
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
此文档由【小橙橙】提供上传,收益归文档提供者,本网站只提供存储服务。若此文档侵犯了您的版权,欢迎进行违规举报版权认领
计算机专业英语课件-CE_Chap09
可在后台配置第一页与第二页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第二页与第三页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第三页与第四页中间广告代码
计算机专业英语课件-CE_Chap09
计算机专业英语课件-CE_Chap09
还剩10页未读,继续阅读
【这是免费文档,您可以免费阅读】
/ 23
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
文本内容

【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传

转载请保留链接:https://www.ichengzhen.cn/view-5299.html

以下为本文档部分文字说明:

ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notautho

rizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.

©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.This

documentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputingEssentia

ls2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw

-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanne

r.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page1of3)Id

entifythemostsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivacyissuesofaccu

racy,property,andaccess.Describetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Discussonlineid

entityandmajorlawsonprivacy.2ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyfora

uthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedon

awebsite,inwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcreationofmaliciousprogramssuchasviruses,

worms,Trojanhorse,andzombiesaswellasdenialofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogueW

i-Fihotspots,theft,anddatamanipulation.Detailwaystoprotectcomputersecurityincludingrestrictingaccess,encrypting

data,anticipatingdisasters,andpreventingdataloss.3ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillE

ducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbe

copied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discussc

omputerethicsincludingcopyrightlaw,softwarepiracy,digitalrightsmanagement,theDigitalMillenniumCopyrig

htAct,aswellasplagiarismandwaystoidentifyplagiarism.4ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEdu

cation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dupli

cated,forwarded,distributed,orpostedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnol

ogypromptssomeveryimportantquestionsabouttheuseofpersonaldataandourrighttoprivacy.Thischaptercoversissuesrelated

totheimpactoftechnologyonpeopleandhowtoprotectourselvesontheWeb.5ComputingEssentials2014Privacy,SecurityandEth

ics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioni

nanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PeoplePrivacy

–Whatarethethreatstopersonalprivacyandhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecureha

rdwareandsoftware?Ethics–Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Privacy,SecurityandEthics©2014byMc

Graw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributi

oninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhole

orpart.PrivacyPrivacy–concernsthecollectionanduseofdataaboutindividualsThreeprimaryprivacyissues:AccuracyPropertyAccess7ComputingEss

entials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorize

dinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplica

ted,forwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page1of2)Largeorganizationscompileinformationaboutus.Fed

eralgovernmenthasover2,000databasesTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuyandwhen8Compu

tingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolely

forauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,fo

rwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsell

personaldataElectronicprofileseasilycreatedPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonally

identifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidenti

tytheftSpreadinginaccurateinformationMistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,SecurityandEthics©2014byMc

Graw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmayno

tbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivateNetworksEmployerscanmonitore-maillegally75percentofa

llbusinessessearchemployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcouldprohibitthistypeofelectronicmonitoringoratle

astrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducati

on.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,du

plicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCookiesCookiesSmallpie

cesofinformationthataredepositedonyourharddiskfromwebsitesyouhavevisitedFirst-partycookiesThird-partycookies11ComputingEssen

tials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistrib

utioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentit

yTheinformationthatpeoplevoluntarilypostaboutthemselvesonlineArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPr

ivacyGramm-Leach-BlileyActHealthInsurancePortabilityandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingE

ssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforau

thorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,or

postedonawebsite,inwholeorpart.SecurityCybercrimeorcomputercrimeisanyoffensethatinvolvesacomputerandanetworkHackers

Gainunauthorizedaccess13ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarym

aterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbeco

pied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPro

grams-MalwareVirusesWormsTrojanhorseZombiesDenialofService(DoS)attack14ComputingEssentials2014Privac

y,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notautho

rizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpos

tedonawebsite,inwholeorpart.ComputerCrime(Page2of3)InternetscamsPhishing15ComputingEssentials2014Privacy

,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordis

tributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerC

rime(Page3of3)SocialnetworkingrisksCyber-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbuseAct16ComputingEssentials201

4Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedfo

rsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkfo

rYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.17ComputingEss

entials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin

structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,

orpostedonawebsite,inwholeorpart.MakingITWorkforYou~Cloud-BasedBackupCloud-basedbackupservicessuchasCarboniteprovi

decloud-basedbackupservices.18ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.

Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner

.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.EthicsStandardsofmoralconduct

CopyrightGivescontentcreatorstherighttocontroltheuseanddistributionoftheirworkPaintings,books,music,films,videogamesS

oftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightActDigitalrightsmanagement(D

RM)Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstr

uctoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,o

rpostedonawebsite,inwholeorpart.CareersinITITSecurityAnalystsmaintainthesecurityofacompany’snetwork,s

ystems,anddata.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62,000to$101,000Demandforthisposition

isexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsol

elyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distrib

uted,orpostedonawebsite,inwholeorpart.ALooktotheFutureAWebcamonEveryCornerImagesofpublicplacesaremorea

ccessiblethaneverbefore(e.g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcamscontinuetogrowinpopularity21Computi

ngEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin

structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,

forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenet

works,theInternet,andtheWeb.Defineanddiscussonlineidentityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandtheimpact

ofmaliciousprograms,includingviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams

,socialnetworkingrisks,rogueWi-Fihotspots,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privac

y,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauth

orizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhole

orpart.Open-EndedQuestions(Page2of2)Discusswaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventin

gdataloss.Defineethics,anddescribecopyrightlawandplagiarism.23

小橙橙
小橙橙
文档分享,欢迎浏览!
  • 文档 25747
  • 被下载 7
  • 被收藏 0
广告代码123
若发现您的权益受到侵害,请立即联系客服,我们会尽快为您处理。侵权客服QQ:395972555 (支持时间:9:00-21:00) 公众号
Powered by 太赞文库
×
确认删除?