【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传
转载请保留链接:https://www.ichengzhen.cn/view-5585.html
以下为本文档部分文字说明:
ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructo
ruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed
,orpostedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructor
use.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedo
nawebsite,inwholeorpart.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Priva
cy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributio
ninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page1of3)Identi
fythemostsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivacyiss
uesofaccuracy,property,andaccess.Describetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Disc
ussonlineidentityandmajorlawsonprivacy.2ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprieta
rymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentma
ynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Pa
ge2of3)Discusscybercrimesincludingcreationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasde
nialofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipulat
ion.Detailwaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3Computi
ngEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstruct
oruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forward
ed,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingcopyrightlaw,sof
twarepiracy,digitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4Comput
ingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin
structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,
forwarded,distributed,orpostedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypro
mptssomeveryimportantquestionsabouttheuseofpersonaldataandourrighttoprivacy.Thischaptercoversissuesrelatedtotheimpa
ctoftechnologyonpeopleandhowtoprotectourselvesontheWeb.5ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.This
proprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbec
opied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstopersonalp
rivacyandhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecur
ehardwareandsoftware?Ethics–Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Pri
vacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructorus
e.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwho
leorpart.PrivacyPrivacy–concernsthecollectionanduseofdataaboutindividualsThreeprimaryprivacyissues:AccuracyProp
ertyAccess7ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymate
rialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,
scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page1of2)Largeorganizations
compileinformationaboutus.Federalgovernmenthasover2,000databasesTelephonecompaniesReversedirectorylistsofcallswemakeSu
permarketsWhatwebuyandwhen8ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterials
olelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,f
orwarded,distributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsel
lpersonaldataElectronicprofileseasilycreatedPersonalinformationisamarketablecommodity,whichraisesmany
issues:Collectingpublic,butpersonallyidentifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwit
houtpersonalconsent,leadingtoidentitytheftSpreadinginaccurateinformationMistakenidentityFreedomofInformationAct9ComputingE
ssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthor
izedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwar
ded,distributed,orpostedonawebsite,inwholeorpart.PrivateNetworksEmployerscanmonitore-maillegally75percentofallbusinessessearche
mployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcouldprohibitthistypeofelectronicmonitoringoratle
astrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisprop
rietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,
forwarded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCookiesCookiesSmallpiecesofinformationthataredepositedonyour
harddiskfromwebsitesyouhavevisitedFirst-partycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEdu
cation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmayn
otbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinfo
rmationthatpeoplevoluntarilypostaboutthemselvesonlineArchivingandsearchfeaturesoftheWebmakeitavaila
bleindefinitelyMajorLawsonPrivacyGramm-Leach-BlileyActHealthInsurancePortabilityandAccountabilityAct(HIPAA)FamilyE
ducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprie
tarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanne
d,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.SecurityCybercrimeorcomputercrimeisanyoffenset
hatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEssentials2014Privacy,SecurityandEthics©2014b
yMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbec
opied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareViru
sesWormsTrojanhorseZombiesDenialofService(DoS)attack14ComputingEssentials2014Privacy,Securityan
dEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordis
tributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeor
part.ComputerCrime(Page2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,SecurityandEthics©2014byM
cGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Th
isdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Compute
rCrime(Page3of3)SocialnetworkingrisksCyber-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFra
udandAbuseAct16ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterial
solelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated
,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatin
cludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.17ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisp
roprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,
scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWorkforYou~Cloud-BasedBackupC
loud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18ComputingEssentials2014Priva
cy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanyma
nner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Et
hicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributionoftheirworkPaintings,books,music,films,
videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightActDigitalrightsmanagement(DRM)
Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforau
thorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forward
ed,distributed,orpostedonawebsite,inwholeorpart.CareersinITITSecurityAnalystsmaintainthesecurityofacompany’snetwork,systems,
anddata.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62,000to$101,000Demandforthisposi
tionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterial
solelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbec
opied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktotheFutureAWe
bcamonEveryCornerImagesofpublicplacesaremoreaccessiblethaneverbefore(e.g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcamscontinue
togrowinpopularity21ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthor
izedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawe
bsite,inwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,th
eInternet,andtheWeb.Defineanddiscussonlineidentityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciousprograms,inclu
dingviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworkingrisks,rogueWi-Fihotspo
ts,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.T
hisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumen
tmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discusswa
ystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.Defineethics,andde
scribecopyrightlawandplagiarism.23