html5-img
1 / 5

Reliability and integrity, S ecurity, and Privacy and anonymity

Reliability and integrity, S ecurity, and Privacy and anonymity. Garrett, Spencer, and Hannah. Reliability and Integrity. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data.

samara
Download Presentation

Reliability and integrity, S ecurity, and Privacy and anonymity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Reliability and integrity, Security, and Privacy and anonymity Garrett, Spencer, and Hannah

  2. Reliability and Integrity • Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data. • Data is unreliable when entered incorrectly or if it becomes outdated. • Reliability of machines, and data determine confidence in their value. • Integrity refers to protecting the accuracy and completeness or stored data. • Data lacks integrity when it has been changed or tampered with. • Social: Some people are dependent on the reliability and integrity, where undeveloped countries are not concerned about it. • Global: It is necessary for other countries to learn the correct information or news about other countries. • Ethical: People are able to tamper with the data and then it will no longer be reliable. • Example: Wikipedia

  3. Security • Security refers to protection of hardware, software, machines and networks from unauthorized access. • Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. • Authentication: requires used to provide proof of identity to gain access to systems. • Three types of Authentication techniques: • Something you know • Something you have • Something you are • Something you know: passwords, pins. • Something you have: requires users to authenticate themselves. Example: keycard • Something you are: Biometric scanners • Social: The security of hardware, software and networks impacts everyone who uses them. It is used to protect their computer’s safety, along with personal data. Business and companies must also provide protection for their employee’s information on networks, along with the networks used by the companies themselves. • Global: Everyone around the world are advised to have security for protection, where most companies are forced to provide protection. • Ethical: Businesses have explicit rules governing ethical behavior in the workplace; violators of security can be removed from the company.

  4. Privacy and Anonymity • Privacy: the ability of individuals and groups to determine for themselves when, how, and to what extent information about themselves is shared with others. • Anonymity: the state of being unknown or unacknowledged. • Social: Everyone is capable of protecting their identity and having a right to their privacy when on social networking. This also affects confidentiality within businesses. • Global: From a Global standpoint, most everyone is able to use social networking or attends doctors appointments, where this will effect their right to privacy. • Ethical: Are you using the ability to hide your identity for the right reason? • Witness Protection vs. Hacking

  5. Work Cited • "Home." Itgs -. N.p., n.d. Web. 10 Apr. 2014. • "Privacy and Anonymity." Privacy and Anonymity. N.p., n.d. Web. 10 Apr. 2014.

More Related