计算机专业英语课件-CE_Chap09

PPT
  • 阅读 93 次
  • 下载 0 次
  • 页数 23 页
  • 大小 3.536 MB
  • 2022-11-13 上传
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
此文档由【小橙橙】提供上传,收益归文档提供者,本网站只提供存储服务。若此文档侵犯了您的版权,欢迎进行违规举报版权认领
计算机专业英语课件-CE_Chap09
可在后台配置第一页与第二页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第二页与第三页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第三页与第四页中间广告代码
计算机专业英语课件-CE_Chap09
计算机专业英语课件-CE_Chap09
还剩10页未读,继续阅读
【这是免费文档,您可以免费阅读】
/ 23
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
文本内容

【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传

转载请保留链接:https://www.ichengzhen.cn/view-5585.html

以下为本文档部分文字说明:

ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsole

lyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed

,orpostedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthor

izedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaweb

site,inwholeorpart.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,Secur

ityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanne

r.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page1of3)Identifythemo

stsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivacyissuesofaccuracy,property,andaccess.Des

cribetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Discussonlineidentityandmajorlawsonprivacy.2Comput

ingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructorus

e.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsi

te,inwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcreationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesa

swellasdenialofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipulation.Detailwaystopr

otectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3ComputingEssentials

2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize

dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpost

edonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingcopyrightlaw,softwarepiracy,digitalrightsmanagement,

theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4ComputingEssentials201

4Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsa

leordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsit

e,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssomeveryimportantquestionsabout

theuseofpersonaldataandourrighttoprivacy.Thischaptercoversissuesrelatedtotheimpactoftechnologyonpeopl

eandhowtoprotectourselvesontheWeb.5ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.T

hisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmay

notbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstoperson

alprivacyandhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecurehardwareandsoftwar

e?Ethics–Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw

-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisd

ocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivacyPrivacy–concernsthecol

lectionanduseofdataaboutindividualsThreeprimaryprivacyissues:AccuracyPropertyAccess7ComputingEssentials201

4Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.

Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwho

leorpart.LargeDatabases(Page1of2)Largeorganizationscompileinformationaboutus.Federalgovernmenthasover2,0

00databasesTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuyandwhen8ComputingEssentials2014P

rivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N

otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,d

istributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicpr

ofileseasilycreatedPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyi

dentifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentitytheftSpreadinginaccurateinformation

MistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillE

ducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentma

ynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivateNetworksEmployersc

anmonitore-maillegally75percentofallbusinessessearchemployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcould

prohibitthistypeofelectronicmonitoringoratleastrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Privac

y,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedfo

rsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Viewi

ngandBlockingCookiesCookiesSmallpiecesofinformationthataredepositedonyourharddiskfromwebsitesyouhavevisitedFirst-part

ycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsol

elyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,du

plicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntarilypostaboutthemselvesonl

ineArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGramm-Leach-BlileyActHealthInsurancePortabilit

yandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Privacy,Secur

ityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedfors

aleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.SecurityCyberc

rimeorcomputercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEssentials2014Privacy,Sec

urityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthor

izedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedo

nawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareVirusesWormsTrojanhorseZombiesDenialofService

(DoS)attack14ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyfora

uthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,for

warded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,Securityan

dEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleor

distributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeor

part.ComputerCrime(Page3of3)SocialnetworkingrisksCyber-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbuseAct16Computing

Essentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize

dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWor

kforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.17Comp

utingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructorus

e.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhole

orpart.MakingITWorkforYou~Cloud-BasedBackupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18Co

mputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.

Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orp

ostedonawebsite,inwholeorpart.EthicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributi

onoftheirworkPaintings,books,music,films,videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightActDi

gitalrightsmanagement(DRM)Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisprop

rietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated

,forwarded,distributed,orpostedonawebsite,inwholeorpart.CareersinITITSecurityAnalystsmaintainthesecu

rityofacompany’snetwork,systems,anddata.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62,0

00to$101,000Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.T

hisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dupl

icated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktotheFutureAWebcamonEveryCornerIm

agesofpublicplacesaremoreaccessiblethaneverbefore(e.g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcams

continuetogrowinpopularity21ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolel

yforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dup

licated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacya

nddiscusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWeb.Defineanddiscussonlineidentityandthemajo

rprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciousprograms,includingviruses,worms,Trojanhorses,

andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworkingrisks,rogueWi-Fihotspots,thefts,datamanipulation,andoth

erhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsol

elyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scan

ned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discusswaystoprotectcomputersecurityincludingrest

rictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.Defineethics,anddescribecop

yrightlawandplagiarism.23

小橙橙
小橙橙
文档分享,欢迎浏览!
  • 文档 25747
  • 被下载 7
  • 被收藏 0
广告代码123
若发现您的权益受到侵害,请立即联系客服,我们会尽快为您处理。侵权客服QQ:395972555 (支持时间:9:00-21:00) 公众号
Powered by 太赞文库
×
确认删除?