计算机专业英语课件-CE_Chap09

PPT
  • 阅读 54 次
  • 下载 0 次
  • 页数 23 页
  • 大小 3.536 MB
  • 2022-11-13 上传
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
此文档由【小橙橙】提供上传,收益归文档提供者,本网站只提供存储服务。若此文档侵犯了您的版权,欢迎进行违规举报版权认领
计算机专业英语课件-CE_Chap09
可在后台配置第一页与第二页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第二页与第三页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第三页与第四页中间广告代码
计算机专业英语课件-CE_Chap09
计算机专业英语课件-CE_Chap09
还剩10页未读,继续阅读
【这是免费文档,您可以免费阅读】
/ 23
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
文本内容

【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传

转载请保留链接:https://www.ichengzhen.cn/view-5299.html

以下为本文档部分文字说明:

ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notautho

rizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orposte

donawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthori

zedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Comput

ingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,SecurityandEthics©2014byM

cGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocume

ntmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page1of3)

Identifythemostsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivac

yissuesofaccuracy,property,andaccess.Describetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Disc

ussonlineidentityandmajorlawsonprivacy.2ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEdu

cation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied

,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcre

ationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasdenialofserviceattacks,Internets

cams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipulation.Detailwaystoprotectcomputersecurityincludingres

trictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3ComputingEssentials2014Privacy,SecurityandEthics©2014byMc

Graw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied

,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingco

pyrightlaw,softwarepiracy,digitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4Co

mputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforau

thorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distribut

ed,orpostedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssome

veryimportantquestionsabouttheuseofpersonaldataandourrighttoprivacy.Thischaptercoversissuesrelatedtotheimpactoftechn

ologyonpeopleandhowtoprotectourselvesontheWeb.5ComputingEssentials2014Privacy,SecurityandEthics©2014by

McGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocument

maynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstopersonalprivacyan

dhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecurehardwareandsoftware?Ethics–

Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-H

illEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbeco

pied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivacyPrivacy–concernsthecollectionandu

seofdataaboutindividualsThreeprimaryprivacyissues:AccuracyPropertyAccess7ComputingEssentials2014Privacy,Securityan

dEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsa

leordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDa

tabases(Page1of2)Largeorganizationscompileinformationaboutus.Federalgovernmenthasover2,000database

sTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuyandwhen8ComputingEssentials2014Privacy,Securityand

Ethics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthoriz

edforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,

inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicprofileseasilycreat

edPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyident

ifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentityt

heftSpreadinginaccurateinformationMistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,Secu

rityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner

.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivateNet

worksEmployerscanmonitore-maillegally75percentofallbusinessessearchemployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcou

ldprohibitthistypeofelectronicmonitoringoratleastrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Priv

acy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordist

ributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCooki

esCookiesSmallpiecesofinformationthataredepositedonyourharddiskfromwebsitesyouhavevisitedFirst-pa

rtycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorized

instructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,

orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntarilypostaboutthemselvesonlin

eArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGramm-Leach-BlileyActHealthInsurancePor

tabilityandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Privacy,SecurityandEthics©

2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocu

mentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.SecurityCybercrimeorcomp

utercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEssentials2

014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributionin

anymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Comput

erCrime(Page1of3)MaliciousPrograms-MalwareVirusesWormsTrojanhorseZombiesDenialofService(DoS)attack14ComputingEsse

ntials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistribu

tioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Com

puterCrime(Page2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispropr

ietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,

scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page3of3)SocialnetworkingrisksCybe

r-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbuseAct16ComputingEssentials2014Privacy,SecurityandEthics©2014by

McGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributi

oninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~SecuritySu

itesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.1

7ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolel

yforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,s

canned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~Cloud-BasedBa

ckupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18ComputingEssentials2014Privacy,Security

andEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordi

stributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhol

eorpart.EthicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributionoftheirworkPaintings,bo

oks,music,films,videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightActDigitalrightsmanagement(DRM)Plagiari

sm19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut

horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orposted

onawebsite,inwholeorpart.CareersinITITSecurityAnalystsmaintainthesecurityofacompany’snetwork,systems,and

data.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62,000to$101,000

Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducat

ion.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopi

ed,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktotheFutureAWebcamonEveryCornerImagesofpublicplacesaremorea

ccessiblethaneverbefore(e.g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcamscontinuetogrowinpopularity21ComputingEssent

ials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin

structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,fo

rwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,t

heInternet,andtheWeb.Defineanddiscussonlineidentityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandt

heimpactofmaliciousprograms,includingviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofservicea

ttacks,Internetscams,socialnetworkingrisks,rogueWi-Fihotspots,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,S

ecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N

otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distribute

d,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discusswaystoprotectcomputersecurityincludi

ngrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.Defineethics,anddescribe

copyrightlawandplagiarism.23

小橙橙
小橙橙
文档分享,欢迎浏览!
  • 文档 25747
  • 被下载 7
  • 被收藏 0
广告代码123
若发现您的权益受到侵害,请立即联系客服,我们会尽快为您处理。侵权客服QQ:395972555 (支持时间:9:00-21:00) 公众号
Powered by 太赞文库
×
确认删除?