【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传
转载请保留链接:https://www.ichengzhen.cn/view-5585.html
以下为本文档部分文字说明:
ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsole
lyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed
,orpostedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthor
izedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaweb
site,inwholeorpart.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,Secur
ityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanne
r.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Competencies(Page1of3)Identifythemo
stsignificantconcernsforeffectiveimplementationofcomputertechnology.Discusstheprimaryprivacyissuesofaccuracy,property,andaccess.Des
cribetheimpactoflargedatabases,privatenetworks,theInternet,andtheWebonprivacy.Discussonlineidentityandmajorlawsonprivacy.2Comput
ingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructorus
e.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsi
te,inwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcreationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesa
swellasdenialofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipulation.Detailwaystopr
otectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3ComputingEssentials
2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize
dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpost
edonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingcopyrightlaw,softwarepiracy,digitalrightsmanagement,
theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4ComputingEssentials201
4Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsa
leordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsit
e,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssomeveryimportantquestionsabout
theuseofpersonaldataandourrighttoprivacy.Thischaptercoversissuesrelatedtotheimpactoftechnologyonpeopl
eandhowtoprotectourselvesontheWeb.5ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.T
hisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmay
notbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstoperson
alprivacyandhowcanweprotectourselves?Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecurehardwareandsoftwar
e?Ethics–Howdotheactionsofindividualusersandcompaniesaffectsociety?6ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw
-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisd
ocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivacyPrivacy–concernsthecol
lectionanduseofdataaboutindividualsThreeprimaryprivacyissues:AccuracyPropertyAccess7ComputingEssentials201
4Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.
Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwho
leorpart.LargeDatabases(Page1of2)Largeorganizationscompileinformationaboutus.Federalgovernmenthasover2,0
00databasesTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuyandwhen8ComputingEssentials2014P
rivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N
otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,d
istributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicpr
ofileseasilycreatedPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyi
dentifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentitytheftSpreadinginaccurateinformation
MistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillE
ducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentma
ynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivateNetworksEmployersc
anmonitore-maillegally75percentofallbusinessessearchemployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcould
prohibitthistypeofelectronicmonitoringoratleastrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Privac
y,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedfo
rsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Viewi
ngandBlockingCookiesCookiesSmallpiecesofinformationthataredepositedonyourharddiskfromwebsitesyouhavevisitedFirst-part
ycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsol
elyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,du
plicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntarilypostaboutthemselvesonl
ineArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGramm-Leach-BlileyActHealthInsurancePortabilit
yandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Privacy,Secur
ityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedfors
aleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.SecurityCyberc
rimeorcomputercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEssentials2014Privacy,Sec
urityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthor
izedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedo
nawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareVirusesWormsTrojanhorseZombiesDenialofService
(DoS)attack14ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyfora
uthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,for
warded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page2of3)InternetscamsPhishing15ComputingEssentials2014Privacy,Securityan
dEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleor
distributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeor
part.ComputerCrime(Page3of3)SocialnetworkingrisksCyber-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbuseAct16Computing
Essentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize
dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.MakingITWor
kforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.17Comp
utingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructorus
e.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhole
orpart.MakingITWorkforYou~Cloud-BasedBackupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbackupservices.18Co
mputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.
Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orp
ostedonawebsite,inwholeorpart.EthicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributi
onoftheirworkPaintings,books,music,films,videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightActDi
gitalrightsmanagement(DRM)Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisprop
rietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated
,forwarded,distributed,orpostedonawebsite,inwholeorpart.CareersinITITSecurityAnalystsmaintainthesecu
rityofacompany’snetwork,systems,anddata.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62,0
00to$101,000Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.T
hisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dupl
icated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktotheFutureAWebcamonEveryCornerIm
agesofpublicplacesaremoreaccessiblethaneverbefore(e.g.,GoogleStreetView)“Virtualsite-seeingtours”Publicwebcams
continuetogrowinpopularity21ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolel
yforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dup
licated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page1of3)Defineprivacya
nddiscusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWeb.Defineanddiscussonlineidentityandthemajo
rprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciousprograms,includingviruses,worms,Trojanhorses,
andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworkingrisks,rogueWi-Fihotspots,thefts,datamanipulation,andoth
erhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsol
elyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scan
ned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestions(Page2of2)Discusswaystoprotectcomputersecurityincludingrest
rictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.Defineethics,anddescribecop
yrightlawandplagiarism.23