【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传
转载请保留链接:https://www.ichengzhen.cn/view-5299.html
以下为本文档部分文字说明:
ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notautho
rizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orposte
donawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthori
zedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Comput
ingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,SecurityandEthics©2014byM
cGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocume
ntmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page1of3)
Identifythemostsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivac
yissuesofaccuracy,property,andaccess.Describetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Disc
ussonlineidentityandmajorlawsonprivacy.2ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEdu
cation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied
,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcre
ationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasdenialofserviceattacks,Internets
cams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipulation.Detailwaystoprotectcomputersecurityincludingres
trictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3ComputingEssentials2014Privacy,SecurityandEthics©2014byMc
Graw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied
,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingco
pyrightlaw,softwarepiracy,digitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4Co
mputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforau
thorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distribut
ed,orpostedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssome
veryimportantquestionsabouttheuseofpersonaldataandourrighttoprivacy.Thischaptercoversissuesrelatedtotheimpactoftechn
ologyonpeopleandhowtoprotectourselvesontheWeb.5ComputingEssentials2014Privacy,SecurityandEthics©2014by
McGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocument
maynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstopersonalprivacyan
dhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecurehardwareandsoftware?Ethics–
Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-H
illEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbeco
pied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivacyPrivacy–concernsthecollectionandu
seofdataaboutindividualsThreeprimaryprivacyissues:AccuracyPropertyAccess7ComputingEssentials2014Privacy,Securityan
dEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsa
leordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDa
tabases(Page1of2)Largeorganizationscompileinformationaboutus.Federalgovernmenthasover2,000database
sTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuyandwhen8ComputingEssentials2014Privacy,Securityand
Ethics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthoriz
edforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,
inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicprofileseasilycreat
edPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyident
ifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentityt
heftSpreadinginaccurateinformationMistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,Secu
rityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner
.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivateNet
worksEmployerscanmonitore-maillegally75percentofallbusinessessearchemployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcou
ldprohibitthistypeofelectronicmonitoringoratleastrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Priv
acy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordist
ributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCooki
esCookiesSmallpiecesofinformationthataredepositedonyourharddiskfromwebsitesyouhavevisitedFirst-pa
rtycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorized
instructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,
orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntarilypostaboutthemselvesonlin
eArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGramm-Leach-BlileyActHealthInsurancePor
tabilityandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Privacy,SecurityandEthics©
2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocu
mentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.SecurityCybercrimeorcomp
utercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEssentials2
014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributionin
anymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Comput
erCrime(Page1of3)MaliciousPrograms-MalwareVirusesWormsTrojanhorseZombiesDenialofService(DoS)attack14ComputingEsse
ntials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistribu
tioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Com
puterCrime(Page2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispropr
ietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,
scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page3of3)SocialnetworkingrisksCybe
r-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbuseAct16ComputingEssentials2014Privacy,SecurityandEthics©2014by
McGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributi
oninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~SecuritySu
itesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.1
7ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolel
yforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,s
canned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~Cloud-BasedBa
ckupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18ComputingEssentials2014Privacy,Security
andEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordi
stributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhol
eorpart.EthicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributionoftheirworkPaintings,bo
oks,music,films,videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightActDigitalrightsmanagement(DRM)Plagiari
sm19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut
horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orposted
onawebsite,inwholeorpart.CareersinITITSecurityAnalystsmaintainthesecurityofacompany’snetwork,systems,and
data.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62,000to$101,000
Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducat
ion.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopi
ed,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktotheFutureAWebcamonEveryCornerImagesofpublicplacesaremorea
ccessiblethaneverbefore(e.g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcamscontinuetogrowinpopularity21ComputingEssent
ials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin
structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,fo
rwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,t
heInternet,andtheWeb.Defineanddiscussonlineidentityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandt
heimpactofmaliciousprograms,includingviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofservicea
ttacks,Internetscams,socialnetworkingrisks,rogueWi-Fihotspots,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,S
ecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N
otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distribute
d,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discusswaystoprotectcomputersecurityincludi
ngrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.Defineethics,anddescribe
copyrightlawandplagiarism.23