计算机专业英语课件-CE_Chap09

PPT
  • 阅读 83 次
  • 下载 0 次
  • 页数 23 页
  • 大小 3.536 MB
  • 2022-11-13 上传
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
此文档由【小橙橙】提供上传,收益归文档提供者,本网站只提供存储服务。若此文档侵犯了您的版权,欢迎进行违规举报版权认领
计算机专业英语课件-CE_Chap09
可在后台配置第一页与第二页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第二页与第三页中间广告代码
计算机专业英语课件-CE_Chap09
可在后台配置第三页与第四页中间广告代码
计算机专业英语课件-CE_Chap09
计算机专业英语课件-CE_Chap09
还剩10页未读,继续阅读
【这是免费文档,您可以免费阅读】
/ 23
  • 收藏
  • 违规举报
  • © 版权认领
下载文档8.00 元 加入VIP免费下载
文本内容

【文档说明】计算机专业英语课件-CE_Chap09.ppt,共(23)页,3.536 MB,由小橙橙上传

转载请保留链接:https://www.ichengzhen.cn/view-5585.html

以下为本文档部分文字说明:

ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoru

se.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpo

stedonawebsite,inwholeorpart.©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notautho

rizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orp

ostedonawebsite,inwholeorpart.ComputingEssentials2014Privacy,Security,andEthicsChapter9ComputingEssentials2014Privacy,SecurityandEthics©

2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsale

ordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeo

rpart.Competencies(Page1of3)Identifythemostsignificantconcernsforeffectiveimplementationofcomputertechnolog

y.Discusstheprimaryprivacyissuesofaccuracy,property,andaccess.Describetheimpactoflargedatabases,privatenetwor

ks,theInternet,andtheWebonprivacy.Discussonlineidentityandmajorlawsonprivacy.2ComputingEssentials2014Privacy,

SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthoriz

edforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,i

nwholeorpart.Competencies(Page2of3)Discusscybercrimesincludingcreationofmaliciousprogramssuchasviruses,worms,Trojanhorse,andzombiesaswellasdenial

ofserviceattacks,Internetscams,socialnetworkingrisks,cyberbullying,rogueWi-Fihotspots,theft,anddatamanipula

tion.Detailwaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,andpreventingdataloss.3Com

putingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.N

otauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,dis

tributed,orpostedonawebsite,inwholeorpart.Competencies(Page3of3)Discusscomputerethicsincludingcopyrightlaw,softwarepiracy,di

gitalrightsmanagement,theDigitalMillenniumCopyrightAct,aswellasplagiarismandwaystoidentifyplagiarism.4C

omputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauth

orizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpos

tedonawebsite,inwholeorpart.IntroductionTheubiquitoususeofcomputersandtechnologypromptssomeveryimportantquestionsaboutt

heuseofpersonaldataandourrighttoprivacy.ThischaptercoversissuesrelatedtotheimpactoftechnologyonpeopleandhowtoprotectourselvesontheWeb.5ComputingEss

entials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notau

thorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,or

postedonawebsite,inwholeorpart.PeoplePrivacy–Whatarethethreatstopersonalprivacyandhowcanweprotectourselves?

Security–Howcanaccesstosensitiveinformationbecontrolledandhowcanwesecurehardwareandsoftware?Ethics–Howdotheactionsofindividualusersandcompanie

saffectsociety?6ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyfor

authorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,

distributed,orpostedonawebsite,inwholeorpart.PrivacyPrivacy–concernsthecollectionanduseofdataaboutindividua

lsThreeprimaryprivacyissues:AccuracyPropertyAccess7ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietar

ymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,dist

ributed,orpostedonawebsite,inwholeorpart.LargeDatabases(Page1of2)Largeorganizationscompileinformationaboutus.Federalgovernmenthasover2

,000databasesTelephonecompaniesReversedirectorylistsofcallswemakeSupermarketsWhatwebuyandwhen8ComputingEssent

ials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistribut

ioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite

,inwholeorpart.LargeDatabases(Page2of2)InformationresellersorinformationbrokersCollectandsellpersonaldataElectronicprofileseas

ilycreatedPersonalinformationisamarketablecommodity,whichraisesmanyissues:Collectingpublic,butpersonallyid

entifyinginformation(e.g.,Google’sStreetView)Spreadinginformationwithoutpersonalconsent,leadingtoidentitytheftSpread

inginaccurateinformationMistakenidentityFreedomofInformationAct9ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thispr

oprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanne

d,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.PrivateNetworksEmployerscanmonitore-maillegal

ly75percentofallbusinessessearchemployees’electronicmailandcomputerfilesusingsnoopwareAproposedlawcouldprohibitthistypeofelectronicmonitori

ngoratleastrequiretheemployertonotifytheemployeefirst10ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillE

ducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,dup

licated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ViewingandBlockingCookiesCookiesSmallpiecesofinformationthataredeposi

tedonyourharddiskfromwebsitesyouhavevisitedFirst-partycookiesThird-partycookies11ComputingEssentials2014Privacy,SecurityandEthics

©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumen

tmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.OnlineIdentityTheinformationthatpeoplevoluntar

ilypostaboutthemselvesonlineArchivingandsearchfeaturesoftheWebmakeitavailableindefinitelyMajorLawsonPrivacyGr

amm-Leach-BlileyActHealthInsurancePortabilityandAccountabilityAct(HIPAA)FamilyEducationalRightsandPrivacyAct(FERPA)12ComputingEssentials2014Pr

ivacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize

dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebs

ite,inwholeorpart.SecurityCybercrimeorcomputercrimeisanyoffensethatinvolvesacomputerandanetworkHackersGainunauthorizedaccess13ComputingEs

sentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedin

structoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,o

rpostedonawebsite,inwholeorpart.ComputerCrime(Page1of3)MaliciousPrograms-MalwareVirusesWormsTrojanhorseZombiesDenialofS

ervice(DoS)attack14ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolely

forauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forw

arded,distributed,orpostedonawebsite,inwholeorpart.ComputerCrime(Page2of3)InternetscamsPhishing15ComputingEssentia

ls2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributi

oninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpa

rt.ComputerCrime(Page3of3)SocialnetworkingrisksCyber-bullyingRogueWi-FihotspotsTheftDatamanipulationComputerFraudandAbus

eAct16ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthori

zedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeo

rpart.MakingITWorkforYou~SecuritySuitesSecuritySuitesaresoftwarepackagesthatincludevariousutilitiesthathelpprotectyourcomputerfromcybercrime.17Comp

utingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorize

dforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwhole

orpart.MakingITWorkforYou~Cloud-BasedBackupCloud-basedbackupservicessuchasCarboniteprovidecloud-basedbac

kupservices.18ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthoriz

edinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonaweb

site,inwholeorpart.EthicsStandardsofmoralconductCopyrightGivescontentcreatorstherighttocontroltheuseanddistributionoftheirworkPa

intings,books,music,films,videogamesSoftwarepiracyUnauthorizedcopyinganddistributionDigitalMillenniumCopyrightA

ctDigitalrightsmanagement(DRM)Plagiarism19ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.Thisproprietarymaterialsolely

forauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocumentmaynotbecopied,scanne

d,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.CareersinITITSecurityAnalystsmai

ntainthesecurityofacompany’snetwork,systems,anddata.MustsafeguardinformationsystemsagainstexternalthreatsAnnualsalaryisusuallyfrom$62

,000to$101,000Demandforthispositionisexpectedtogrow20ComputingEssentials2014Privacy,SecurityandEthics©2014b

yMcGraw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleord

istributioninanymanner.Thisdocumentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.ALooktot

heFutureAWebcamonEveryCornerImagesofpublicplacesaremoreaccessiblethaneverbefore(e.g.,GoogleStreetView)“V

irtualsite-seeingtours”Publicwebcamscontinuetogrowinpopularity21ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGr

aw-HillEducation.Thisproprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.Thisdocument

maynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQue

stions(Page1of3)Defineprivacyanddiscusstheimpactoflargedatabases,privatenetworks,theInternet,andtheWeb.Defineanddiscussonlineid

entityandthemajorprivacylaws.Definesecurity.Definecomputercrimeandtheimpactofmaliciousprograms,includi

ngviruses,worms,Trojanhorses,andzombies,aswellascyberbullying,denialofserviceattacks,Internetscams,socialnetworkingrisks,rogueWi-Fi

hotspots,thefts,datamanipulation,andotherhazards.22ComputingEssentials2014Privacy,SecurityandEthics©2014byMcGraw-HillEducation.This

proprietarymaterialsolelyforauthorizedinstructoruse.Notauthorizedforsaleordistributioninanymanner.This

documentmaynotbecopied,scanned,duplicated,forwarded,distributed,orpostedonawebsite,inwholeorpart.Open-EndedQuestio

ns(Page2of2)Discusswaystoprotectcomputersecurityincludingrestrictingaccess,encryptingdata,anticipatingdisasters,a

ndpreventingdataloss.Defineethics,anddescribecopyrightlawandplagiarism.23

小橙橙
小橙橙
文档分享,欢迎浏览!
  • 文档 25747
  • 被下载 7
  • 被收藏 0
广告代码123
若发现您的权益受到侵害,请立即联系客服,我们会尽快为您处理。侵权客服QQ:395972555 (支持时间:9:00-21:00) 公众号
Powered by 太赞文库
×
确认删除?