计算机专业英语课件-CE_Chap09

PPT
  • 阅读 45 次
  • 下载 0 次
  • 页数 23 页
  • 大小 3.536 MB
  • 2022-11-13 上传
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
此文档由【小橙橙】提供上传,收益归文档提供者,本网站只提供存储服务。若此文档侵犯了您的版权,欢迎进行违规举报版权认领
计算机专业英语课件-CE_Chap09
可在后台配置第一页与第二页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第二页与第三页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第三页与第四页中间广告代码
计算机专业英语课件-CE_Chap09
计算机专业英语课件-CE_Chap09
还剩10页未读,继续阅读
【这是免费文档,您可以免费阅读】
/ 23
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
文本内容

【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传

转载请保留链接:https://www.ichengzhen.cn/view-5299.html

以下为本文档部分文字说明:

ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N

otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpo

stedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Not

authorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpa

rt.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEd

ucation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocume

ntmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Pa

ge1of3)Identifythemostsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivacyissuesofaccuracy,property,andacc

ess.Describetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Discussonlineidentityandmaj

orlawsonprivacy.2ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietar

ymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwa

rded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcreationofmalici

ousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasdenialofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogue

Wi-Fihotspots,theft,anddatamanipulation.Detailwaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisaster

s,andpreventingdataloss.3ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforautho

rizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicat

ed,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsinclud

ingcopyrightlaw,softwarepiracy,digitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyp

lagiarism.4ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietaryma

terialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distrib

uted,orpostedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssomeveryimportantquestionsabouttheus

eofpersonaldataandourrighttoprivacy.ThischaptercoversissuesrelatedtotheimpactoftechnologyonpeopleandhowtoprotectourselvesontheWeb.5Computi

ngEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut

horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inw

holeorpart.PeoplePrivacy–Whatarethethreatstopersonalprivacyandhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbeco

ntrolledandhowcanwesecurehardwareandsoftware?Ethics–Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Privacy,Se

curityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut

horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsit

e,inwholeorpart.PrivacyPrivacy–concernsthecollectionanduseofdataaboutindividualsThreeprimaryprivacyissues:AccuracyPropertyAccess7Computin

gEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorized

instructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicate

d,forwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page1of2)Largeorganizationscompileinformationaboutus

.Federalgovernmenthasover2,000databasesTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuya

ndwhen8ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notaut

horizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedona

website,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicpro

fileseasilycreatedPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyide

ntifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentitytheftSpreadinginaccurateinf

ormationMistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,SecurityandEthics©2

014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordist

ributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaweb

site,inwholeorpart.PrivateNetworksEmployerscanmonitore-maillegally75percentofallbusinessessearchemployees’electronicm

ailandcomputerfilesusingsnoopwareAproposedlawcouldprohibitthistypeofelectronicmonitoringoratleastrequirethee

mployertonotifytheemployeefirst10ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterials

olelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forw

arded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCookiesCookiesSmallpiecesofinformationthataredepositedonyourharddiskfrom

websitesyouhavevisitedFirst-partycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispropr

ietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dupli

cated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntarilypostabout

themselvesonlineArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGramm-

Leach-BlileyActHealthInsurancePortabilityandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Pr

ivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstruct

oruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpos

tedonawebsite,inwholeorpart.SecurityCybercrimeorcomputercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGain

unauthorizedaccess13ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispro

prietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,sca

nned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareVirusesWorm

sTrojanhorseZombiesDenialofService(DoS)attack14ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGra

w-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioni

nanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page

2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprie

tarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentm

aynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page3of3)SocialnetworkingrisksCyber-

bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbuseAct16ComputingEssentials2014Privacy,SecurityandEthics©2014byMc

Graw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistr

ibutioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebs

ite,inwholeorpart.MakingITWorkforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcyberc

rime.17ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.

Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart

.MakingITWorkforYou~Cloud-BasedBackupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18Computi

ngEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauth

orizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplic

ated,forwarded,distributed,orpostedonawebsite,inwholeorpart.EthicsStandardsofmoralconductCopyrightGivescont

entcreatorstherighttocontroltheuseanddistributionoftheirworkPaintings,books,music,films,videogamesSoftwarepiracyUnauthorizedcopyingandd

istributionDigitalMillenniumCopyrightActDigitalrightsmanagement(DRM)Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014b

yMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdo

cumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Careers

inITITSecurityAnalystsmaintainthesecurityofacompany’snetwork,systems,anddata.Mustsafeguardinformationsystemsagainstexternalthrea

tsAnnualsalaryisusuallyfrom$62,000to$101,000Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,Securi

tyandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize

dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaw

ebsite,inwholeorpart.ALooktotheFutureAWebcamonEveryCornerImagesofpublicplacesaremoreaccessiblethaneverbefore(e.

g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcamscontinuetogrowinpopularity21ComputingEssentials2014P

rivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributi

oninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,i

nwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWeb

.Defineanddiscussonlineidentityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciouspr

ograms,includingviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworki

ngrisks,rogueWi-Fihotspots,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation

.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentm

aynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discus

swaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdatalo

ss.Defineethics,anddescribecopyrightlawandplagiarism.23

小橙橙
小橙橙
文档分享,欢迎浏览!
  • 文档 25747
  • 被下载 7
  • 被收藏 0
广告代码123
若发现您的权益受到侵害,请立即联系客服,我们会尽快为您处理。侵权客服QQ:395972555 (支持时间:9:00-21:00) 公众号
Powered by 太赞文库
×
确认删除?