1 / 26

Privacy and Security

computing ESSENTIALS. 10. Privacy and Security. computing ESSENTIALS. Competencies. Negative effects Privacy Security Ergonomics Environment. computing ESSENTIALS. Negative Effects. Effective implementation of technology Maximize positive effects Minimize negative effects

alika-tyler
Download Presentation

Privacy and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. computing ESSENTIALS 10 Privacy and Security

  2. computing ESSENTIALS Competencies Negative effects Privacy Security Ergonomics Environment

  3. computing ESSENTIALS Negative Effects • Effective implementation of technology • Maximize positive effects • Minimize negative effects • Significant concerns • Privacy • Security • Ergonomics • Environment

  4. Laws often do not keep up with technology Ethics Standards of moral conduct Computer ethics Guidelines for morally acceptable computer use computing ESSENTIALS Privacy • Privacy • Accuracy • Property • Access

  5. computing ESSENTIALS Large Databases • Information on citizens and consumers compiled daily • Banks, utilities, grocery stores • Hospitals, doctor’s offices • Government • Social Security Number • Used for ID number on forms • Information resellers • Contact data is valuable

  6. computing ESSENTIALS Information Without Consent • Information collected and used without the person’s knowledge • Shopping habits, video rentals • Medical records • Banking transactions • Federal government • Know Your Customer • Total Information Awareness project

  7. computing ESSENTIALS Inaccurate Information • Inaccurate data can be circulated • Data propagation can spread mistakes to other databases • Laws can help • Correct credit data • Freedom of Information Act

  8. computing ESSENTIALS Private Networks • Employers legally monitor email • Snoopware used in 75% of businesses • Online services right to censor content

  9. computing ESSENTIALS Internet and Web • Concerns about email privacy on Web • Illusion of anonymity • Browser records pages visited • Cookiesmonitor • Times and pages visited • Other private information

  10. computing ESSENTIALS Cookies • Programs that monitor Web activity • Traditional cookies • Monitor activity at one site • Dormant other times • Ad network cookies • Spyware programs that record all Internet activity • Web bugs • Cookie-cutter programs

  11. computing ESSENTIALS Privacy Laws • Mostly cover government usage, but not private organizations • Some current laws • Fair Credit Reporting Act (1970) • Freedom of Information Act (1970) • Right to Financial Privacy Act (1974) • Computer Abuse Amendments Act (1994) • No Electronic Theft (NET) Act (1997)

  12. computing ESSENTIALS Code of Fair Information Practice • Response to information privacy concerns • Not law, but adopted by many information collecting businesses • No secret databases • Right of individual access • Right of consent • Right to correct • Assurance of reliability and proper use

  13. Threats to computer systems include Viruses Electronic break-ins Natural and other hazards Terrorist activity computing ESSENTIALS Security

  14. computing ESSENTIALS Computer Criminals • Employees • Outside users • “Hackers” and “crackers” • Organized crime • Terrorists

  15. computing ESSENTIALS Computer Crime • Damage to computers, programs or files • Viruses and worms • Denial of Service attack • Theft • Hardware, data, computer time • Software piracy • Manipulation

  16. computing ESSENTIALS Other Hazards • Other hazards to computer systems besides criminal misuse • Natural hazards • Earthquake, fire, floods, hurricanes • Civil strife • War, riots • Technological failures • Voltage surge, brownouts • Human error • Data-entry, programming errors

  17. computing ESSENTIALS Security Measures • Protecting information, hardware, software • Principle methods • Encrypting messages • Pretty Good Privacy • Restricting access • Passwords, firewalls • Anticipating disasters • Disaster recovery plan • Backing up data • In case other measures fail

  18. computing ESSENTIALS Security for Microcomputers • Individuals should also implement security • Some basic procedures • Avoid extreme conditions • Clean and protect equipment • Avoid viruses • Virus protection software • Guard computer • Cable locks, marking equipment • Guard programs and data • Store media securely

  19. computing ESSENTIALS Ergonomics • Study of human factors related to things people use • Fitting the job to the worker • Improve productivity • Health issues • Physical health • Mental health

  20. computing ESSENTIALS Physical Health • Sitting in awkward position for long periods • Eyestrain and headache • Back and neck pain • Repetitive strain injury (RSI) • Carpal Tunnel Syndrome

  21. computing ESSENTIALS Ideal Microcomputer Work Environment

  22. computing ESSENTIALS Mental Health • Technology can be counterproductive • Noise • Voice input/output • Printers • Cooling fans, equipment vibration • Excessive monitoring • Time of customer service calls • Number of keystrokes • Less is more

  23. computing ESSENTIALS Ergonomic Design • Devices made with less features • Simpler to use, setup • Fewer buttons and lights • Plug and Play • Adjustable equipment • Chairs, footrests, lighting • Ergonomic devices • Keyboards, mouse, glare screens

  24. computing ESSENTIALS The Environment • Greatest user of electricity in workplace • Energy Star program with Green PC • System Unit • Display • Manufacturing

  25. computing ESSENTIALS A Look to the Future • Presence Technology • Currently used with Instant Messaging software • May spread to other devices • Television • Automobile • PDAs, cell phones • Potential loss of privacy • Abused by advertisers • Abused by government

  26. computing ESSENTIALS

More Related