Chapter 9 - Security, Privacy and Ethics
Chapter 9 - Security, Privacy and Ethics
PROCESSING (CSC134)
Chapter 9
Security: threats to computer security, computer criminal, computer crime, and measure of protections
Cybersecurity
Ethics issue
Learning Objectives
1. Identify the most significant concerns for effective implementation of computer
technology.
2. Discuss cybercrimes including creation of malicious programs such as viruses,
worms, Trojan horse, and zombies as well as denial of service attacks, Internet
scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
3. Detail ways to protect computer security including restricting access, encrypting
data, anticipating disasters, and preventing data loss.
4. Discuss the primary privacy issues of accuracy, property, and access.
5. Describe the impact of large databases, private networks, the Internet, and the
Web on privacy.
6. Discuss online identity and major laws on privacy.
7. Discuss computer ethics including copyright law, software piracy, digital rights
management, the Digital Millennium Copyright Act, as well as plagiarism and ways
to identify plagiarism.
Introduction
• The ubiquitous use of computers and technology prompts
some very important questions about the use of personal data
and our right to privacy.
• This chapter covers issues
related to the impact of
technology on people and
how to protect ourselves
on the Web.
People
Technology has had a very positive impact on people,
but some of the impact could be negative.
Most significant concerns:
• Privacy – What are the threats to personal privacy and how can we
protect ourselves?
• Security – How can access to sensitive information be controlled and
how can we secure hardware and software?
• Ethics – How do the actions of individual users and companies affect
society?
Privacy
• Privacy – concerns the collection and use of data about individuals or
companies to deny or restrict the collection, use, and dissemination of
information about them
• Huge databases store data online
• Three primary privacy issues:
• Accuracy – responsibility of those who collect data
• Must be secure and correct
• Property – who owns data and who has rights to software
• Access – responsibility of those who control data and use of data
Treats - Large Databases
Large organizations compile information about us daily
Target
advertisements
C. Privacy Modes
• Ensures your browsing activity is not
recorded on your hard drive
• Incognito Mode
• Google Chrome
• Private Browsing
• Safari
D. Privacy Threats
• Web bugs
• Invisible images or HTML code hidden within an
e-mail message or web page
• When a user opens the message information is
sent back to the source of the bug
• Spyware
• Wide range of programs that are designed to
secretly record and report Internet activities,
add Internet ad cookies
• Computer monitoring software
• Invasive and dangerous
• Keystroke Loggers
• Record activities and keystrokes
• Anti-Spyware programs
• Detect and remove privacy threats
Information Privacy
Page 242
18
Figure 5-23
Security
Involves protecting individuals or organizations from theft and danger
A digital security risk is any event or action that could cause a loss of or damage to a
computer or mobile device hardware, software, data, information, or processing
capability
• Hackers
• Gain unauthorized access with malicious intent
• Not all hackers are illegal
• Any illegal act involving the use of a computer or related devices generally is referred to
as a computer crime
• A cybercrime is an online or Internet-based illegal act
• Use anti-virus software: will detect and removes threats. Keep software updated for protection.
• Use strong passwords: Ensure your passwords are not easily guessable.
• Do not open email attachments from unknown senders: These could be infected with malware.
• Do not click on links in emails from unknown senders or unfamiliar websites: This is a common
way that malware is spread.
• Avoid using unsecure WiFi networks in public places: Unsecure networks leave vulnerable to man-
in-the-middle attacks.
Software Theft
• Software theft occurs when someone:
Illegally registers
Steals software Intentionally Illegally copies a
and/or activates
media erases programs program
a program
Page 231 30
Hardware Theft, Vandalism, and
Failure
Hardware theft is
the act of stealing
digital equipment
Hardware vandalism
is the act of defacing
or destroying digital
equipment
Page 233 31
Measures to Protect Computer Security
Principle measures to ensure
computer security
• Restricting access
• Encrypting data
• Anticipating disasters
• Physical security
• Data security
• Disaster recovery plan
• Preventing data loss
Restricting Access
• Biometric scanning Fingerprint
Face
recognition
• Fingerprint scanners reader
system
• Iris (eye) scanners
• Passwords
• Dictionary attack Hand
Voice
geometry
• Uses software to try thousands system verification
of common words sequentially system
in an attempt to gain
unauthorized access to a user’s
account
Signature Iris recognition
verification system system
Restricting Access
• A passphrase is a private combination of words, often containing mixed capitalization
and punctuation, associated with a user name that allows access to certain computer
resources
• A PIN (personal identification number), sometimes called a passcode, is a numeric
password, either assigned by a company or selected by a user
• A possessed object is any item that you must possess, or carry with you, in order to gain
access to a computer or computer facility (badges, cards, keys and etc)
• A biometric device authenticates a person’s identity by translating a personal
characteristic into a digital code that is compared with a digital code in a computer or
mobile device verifying a physical or behavioral characteristic
• Cloud-based backup
services such as
Carbonite provide
cloud-based backup
services.
Ethics
Standards of moral conduct
Computer Ethics – guidelines for the morally
acceptable use of computers
• Copyright
• Gives content creators the right to control the use and
distribution of their work
• Paintings, books, music, films, video games
• Software piracy
• Unauthorized copying and distribution of software
• Digital rights management (DRM) controls access to
electronic media
• Digital Millennium Copyright Act protects against piracy
Ethics and Society
• Green computing involves reducing the electricity and environmental waste
while using computers, mobile devices, and related technologies
Page 241
41
Figure 5-22
Plagiarism
Representing some other person’s work and ideas as your own
without giving credit to the original person’s work and ideas
Computer Addiction
• Computer addiction occurs when the computer consumes someone’s entire
social life
• Symptoms of users include:
Advantages Disadvantages
• Drones are quite easy when you want to • A Drone flying nearby you/ your area
fly for surveillance purpose. does not guarantee a safety, it can be a
• Some of its applications are quite helpful terrorist activity.
in disaster management activities. • Drones coming on the way of passenger
• It can be used for transportation and flight makes it quite dangerous for the
delivery society/people.
• In war time, there is no risk of losing the • Flying drones in public area is dangerous
Pilot. and can hurt anyone.
• Can go to place, where it is difficult for a • UNCLEAR LEGISLATION • Some drone
human being to reach. (for some users may find themselves in violation of
application) laws that they knew nothing about. •
Drones also pose a great risk of abuse.
A Look to the Future ~
The End of Anonymity