【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传
转载请保留链接:https://www.ichengzhen.cn/view-5585.html
以下为本文档部分文字说明:
ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoru
se.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpo
stedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notautho
rizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orp
ostedonawebsite,inwholeorpart.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,SecurityandEthics©
2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsale
ordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeo
rpart.Competencies(Page1of3)Identifythemostsignificantconcernsforeffectiveimplementationofcomputertechnolog
y.Discusstheprimaryprivacyissuesofaccuracy,property,andaccess.Describetheimpactoflargedatabases,privatenetwor
ks,theInternet,andtheWebonprivacy.Discussonlineidentityandmajorlawsonprivacy.2ComputingEssentials2014Privacy,
SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthoriz
edforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,i
nwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcreationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasdenial
ofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipula
tion.Detailwaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3Com
putingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N
otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,dis
tributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingcopyrightlaw,softwarepiracy,di
gitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4C
omputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauth
orizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpos
tedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssomeveryimportantquestionsaboutt
heuseofpersonaldataandourrighttoprivacy.ThischaptercoversissuesrelatedtotheimpactoftechnologyonpeopleandhowtoprotectourselvesontheWeb.5ComputingEss
entials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notau
thorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,or
postedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstopersonalprivacyandhowcanweprotectourselves?
Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecurehardwareandsoftware?Ethics–Howdotheactionsofindividualusersandcompanie
saffectsociety?6ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyfor
authorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,
distributed,orpostedonawebsite,inwholeorpart.PrivacyPrivacy–concernsthecollectionanduseofdataaboutindividua
lsThreeprimaryprivacyissues:AccuracyPropertyAccess7ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietar
ymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,dist
ributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page1of2)Largeorganizationscompileinformationaboutus.Federalgovernmenthasover2
,000databasesTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuyandwhen8ComputingEssent
ials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistribut
ioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite
,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicprofileseas
ilycreatedPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyid
entifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentitytheftSpread
inginaccurateinformationMistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispr
oprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanne
d,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivateNetworksEmployerscanmonitore-maillegal
ly75percentofallbusinessessearchemployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcouldprohibitthistypeofelectronicmonitori
ngoratleastrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillE
ducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dup
licated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCookiesCookiesSmallpiecesofinformationthataredeposi
tedonyourharddiskfromwebsitesyouhavevisitedFirst-partycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics
©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumen
tmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntar
ilypostaboutthemselvesonlineArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGr
amm-Leach-BlileyActHealthInsurancePortabilityandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Pr
ivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize
dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebs
ite,inwholeorpart.SecurityCybercrimeorcomputercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEs
sentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin
structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,o
rpostedonawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareVirusesWormsTrojanhorseZombiesDenialofS
ervice(DoS)attack14ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolely
forauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forw
arded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page2of3)InternetscamsPhishing15ComputingEssentia
ls2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributi
oninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpa
rt.ComputerCrime(Page3of3)SocialnetworkingrisksCyber-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbus
eAct16ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthori
zedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeo
rpart.MakingITWorkforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.17Comp
utingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize
dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhole
orpart.MakingITWorkforYou~Cloud-BasedBackupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbac
kupservices.18ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthoriz
edinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaweb
site,inwholeorpart.EthicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributionoftheirworkPa
intings,books,music,films,videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightA
ctDigitalrightsmanagement(DRM)Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolely
forauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanne
d,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.CareersinITITSecurityAnalystsmai
ntainthesecurityofacompany’snetwork,systems,anddata.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62
,000to$101,000Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014b
yMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleord
istributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktot
heFutureAWebcamonEveryCornerImagesofpublicplacesaremoreaccessiblethaneverbefore(e.g.,GoogleStreetView)“V
irtualsite-seeingtours”Publicwebcamscontinuetogrowinpopularity21ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGr
aw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocument
maynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQue
stions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWeb.Defineanddiscussonlineid
entityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciousprograms,includi
ngviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworkingrisks,rogueWi-Fi
hotspots,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.This
proprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.This
documentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestio
ns(Page2of2)Discusswaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,a
ndpreventingdataloss.Defineethics,anddescribecopyrightlawandplagiarism.23