1 / 22

Computer Security and Safety, Ethics and Privacy

Amy Tullos Puckett ICTII. Computer Security and Safety, Ethics and Privacy. Wireless Security. Techniques use to Access the network War Driving or access point mapping

lyndon
Download Presentation

Computer Security and Safety, Ethics and Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Amy Tullos Puckett ICTII Computer Security and Safety, Ethics and Privacy

  2. Wireless Security • Techniques use to Access the network • War Driving or access point mapping • Individuals attempt to detect wireless network via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network • War Flying • Use airplanes instead of vehicle to detect unsecured wireless network

  3. Wireless Security How can I ensure my wireless communication is secure? • Firewalls • Secure your wireless access point (WAP) • WiFi Protected Access (WPA) • Authenticate network users and provide advanced encryption techniques • 802.11i (WPAs) • Conforms to the government security standards and uses more sophisticated encryption techniques the WPA

  4. Health Concerns of Computer Use What are some health concerns of computer use? Computer addiction-when computer consume entire social Tendonitis – inflammation of a tendon due to repeated motion Repetitive strain injury (RSI) Injury or disorder of the muscles, nerves, tendons, ligaments, and joints Carpal tunnel syndrome – inflammation of the nerve that connects the forearm to the palm Computer vision syndrome (CVS) eye and vision problems

  5. Health Concerns of Computer Use • What precautions can prevent tendonitis or carpal tunnel syndrome? • Spread fingers apart for several seconds while keeping wrist straight • Gently push back fingers and then thumb • Dangle arms loosely at sides and shake arms and hands

  6. Ergonomics and Workplace Design What is Ergonomics? An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

  7. Ethics and Society What are computer ethics? Moral guidelines that govern use of computers and information systems Unauthorized use of computer &Networks Software theft (piracy) Information accuracy Intellectual property rights Codes of conduct Information privacy Green Computing

  8. Ethics and Society What is information accuracy? • Accuracy of computer input • Altering photo • National Press Photographer Association oppose

  9. Ethics and Society • What are intellectual Property (IP) and Intellectual property rights? • Intellectual Property • Refer to unique & original work such as ideas, inventions, art, writing, processes, company and product name and logos. • Intellectual Property Rights • The rights to which creators are entitled for their work

  10. Ethics and Society IT Code of Conduct Computer may not be used to harm other people. Employee may not interfere with other’s computer work. Employees my not meddle in other’s computer files. Computers may not be used to steal .Computers may not be used to bear false witness. Employees may not copy or use software illegally. Employees may not use others’ computer resources without authorization Employees may not use others’ intellectual property as their own. Employees shall consider the social impact of program and systems they design. Employees always should use computers in a way that demonstrates and respect for fellow humans. What is an IT code of conduct? • Written guideline that helps determine whether computer action is ethical • Employers can distribute to employees

  11. Ethics and Society • What is Green Computing? • Involves reducing the electricity and environmental waste while using a computer. • ENERGY STAR program • Develop by US Department of Energy and US Environmental Protection Agency (EPA) • Help reduce the amount of electricity used by computer and related devices

  12. Information Privacy – Section 5 • What is Information Privacy? • Right of individual and companies to deny or restrict the collection and use of information about them • Difficult to maintain today because data is stored online

  13. Information Privacy • What is an electronic profile? • Data collected when you fill out forms on the Web • Merchant sell your electronic profile • Often you can specify whether you want personal information distributed

  14. Information Privacy What is a Cookie? Small text file on your computer that contains data about you Some Web sites sell or trade information stored on your cookie Set browser to accept cookies, prompt you to accept cookies or disable cookies User Preferences How regularly you visit Web site Interest and browsing habits

  15. Information Privacy What is Spam? • Unsolicited e-mail message or newsgroup, posting sent to many recipients or newsgroups at once. • Internet Junk mail

  16. Information Privacy How can you control spam? E-mail filtering Service that blocks email messages from designated source Collects spam in central location that you can view anytime Anti-spam program Attempts to remove spam Sometimes removes valid email messages

  17. Information Privacy What is Phishing and Pharming? Phishing Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information Pharming Similar as phishing but they attempts to obtain your personal and financial information through spoofing

  18. Information Privacy What are Spyware and Adware? • Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user • Adware is a program that displays an online advertisement

  19. Information Privacy Some Privacy laws that have been enacted • 1970 Fair Credit Reporting Act • Limits the right of other viewing a credit report to only those with a legitimate business need. • 1984 Computer Fraud and Abuse Act • Outlaws unauthorized access of federal government computers • 1998 Children’s Online Privacy Protection Act (COPPA) • Requires Web sites protect personal information of children under 13 years of age

  20. Information Privacy What is Social Engineering? • Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and naivety of other

  21. Information Privacy What is Employee Monitoring? • Involves the use of computers to observe, record, and review an employee’s use of a computer

  22. Information Privacy What is content filtering? • Process of restricting access to certain material • Internet Content Rating Association (ICRA) provides rating system of Web content • Web filtering software restricts access to specific sites

More Related