计算机专业英语课件-CE_Chap09

PPT
  • 阅读 73 次
  • 下载 0 次
  • 页数 23 页
  • 大小 3.536 MB
  • 2022-11-13 上传
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
此文档由【小橙橙】提供上传,收益归文档提供者,本网站只提供存储服务。若此文档侵犯了您的版权,欢迎进行违规举报版权认领
计算机专业英语课件-CE_Chap09
可在后台配置第一页与第二页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第二页与第三页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第三页与第四页中间广告代码
计算机专业英语课件-CE_Chap09
计算机专业英语课件-CE_Chap09
还剩10页未读,继续阅读
【这是免费文档,您可以免费阅读】
/ 23
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
文本内容

【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传

转载请保留链接:https://www.ichengzhen.cn/view-5585.html

以下为本文档部分文字说明:

ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructo

ruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed

,orpostedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructor

use.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedo

nawebsite,inwholeorpart.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Priva

cy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributio

ninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page1of3)Identi

fythemostsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivacyiss

uesofaccuracy,property,andaccess.Describetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Disc

ussonlineidentityandmajorlawsonprivacy.2ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprieta

rymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentma

ynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Pa

ge2of3)Discusscybercrimesincludingcreationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasde

nialofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipulat

ion.Detailwaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3Computi

ngEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstruct

oruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forward

ed,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingcopyrightlaw,sof

twarepiracy,digitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4Comput

ingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin

structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,

forwarded,distributed,orpostedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypro

mptssomeveryimportantquestionsabouttheuseofpersonaldataandourrighttoprivacy.Thischaptercoversissuesrelatedtotheimpa

ctoftechnologyonpeopleandhowtoprotectourselvesontheWeb.5ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.This

proprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbec

opied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstopersonalp

rivacyandhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecur

ehardwareandsoftware?Ethics–Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Pri

vacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructorus

e.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwho

leorpart.PrivacyPrivacy–concernsthecollectionanduseofdataaboutindividualsThreeprimaryprivacyissues:AccuracyProp

ertyAccess7ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymate

rialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,

scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page1of2)Largeorganizations

compileinformationaboutus.Federalgovernmenthasover2,000databasesTelephonecompaniesReversedirectorylistsofcallswemakeSu

permarketsWhatwebuyandwhen8ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterials

olelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,f

orwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsel

lpersonaldataElectronicprofileseasilycreatedPersonalinformationisamarketablecommodity,whichraisesmany

issues:Collectingpublic,butpersonallyidentifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwit

houtpersonalconsent,leadingtoidentitytheftSpreadinginaccurateinformationMistakenidentityFreedomofInformationAct9ComputingE

ssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthor

izedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwar

ded,distributed,orpostedonawebsite,inwholeorpart.PrivateNetworksEmployerscanmonitore-maillegally75percentofallbusinessessearche

mployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcouldprohibitthistypeofelectronicmonitoringoratle

astrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisprop

rietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,

forwarded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCookiesCookiesSmallpiecesofinformationthataredepositedonyour

harddiskfromwebsitesyouhavevisitedFirst-partycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEdu

cation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmayn

otbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinfo

rmationthatpeoplevoluntarilypostaboutthemselvesonlineArchivingandsearchfeaturesoftheWebmakeitavaila

bleindefinitelyMajorLawsonPrivacyGramm-Leach-BlileyActHealthInsurancePortabilityandAccountabilityAct(HIPAA)FamilyE

ducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprie

tarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanne

d,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.SecurityCybercrimeorcomputercrimeisanyoffenset

hatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEssentials2014Privacy,SecurityandEthics©2014b

yMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbec

opied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareViru

sesWormsTrojanhorseZombiesDenialofService(DoS)attack14ComputingEssentials2014Privacy,Securityan

dEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordis

tributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeor

part.ComputerCrime(Page2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,SecurityandEthics©2014byM

cGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Th

isdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Compute

rCrime(Page3of3)SocialnetworkingrisksCyber-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFra

udandAbuseAct16ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterial

solelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated

,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatin

cludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.17ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisp

roprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,

scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~Cloud-BasedBackupC

loud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18ComputingEssentials2014Priva

cy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanyma

nner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Et

hicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributionoftheirworkPaintings,books,music,films,

videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightActDigitalrightsmanagement(DRM)

Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforau

thorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forward

ed,distributed,orpostedonawebsite,inwholeorpart.CareersinITITSecurityAnalystsmaintainthesecurityofacompany’snetwork,systems,

anddata.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62,000to$101,000Demandforthisposi

tionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterial

solelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbec

opied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktotheFutureAWe

bcamonEveryCornerImagesofpublicplacesaremoreaccessiblethaneverbefore(e.g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcamscontinue

togrowinpopularity21ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthor

izedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawe

bsite,inwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,th

eInternet,andtheWeb.Defineanddiscussonlineidentityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciousprograms,inclu

dingviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworkingrisks,rogueWi-Fihotspo

ts,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.T

hisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumen

tmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discusswa

ystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.Defineethics,andde

scribecopyrightlawandplagiarism.23

小橙橙
小橙橙
文档分享,欢迎浏览!
  • 文档 25747
  • 被下载 7
  • 被收藏 0
广告代码123
若发现您的权益受到侵害,请立即联系客服,我们会尽快为您处理。侵权客服QQ:395972555 (支持时间:9:00-21:00) 公众号
Powered by 太赞文库
×
确认删除?