chap 5
chap 5
Chapter 5
Digital Security,
Ethics, and Privacy
Objectives Overview
Cyberterrorist
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
Face recognition
Fingerprint reader system
Signature verification
system Iris recognition system
Information
Insurance
security
agencies departments
© 2016 Cengage Learning®. May not be scanned, copied
Page 227 or duplicated, or posted to a publicly accessible website, 17
in whole or in part.
Software Theft
Hardware theft is the act of stealing digital Hardware vandalism is the act of defacing
equipment or destroying digital equipment
Cloud
Storage
© 2016 Cengage Learning®. May not be scanned, copied
Pages 233 - 234 or duplicated, or posted to a publicly accessible website, 27
in whole or in part.
Backing Up – The Ultimate Safeguard
– Cloud
Child
Pages 238 - 240 © 2016 Cengage Learning®. May not be scanned, copied
31
or duplicated, or posted to a publicly accessible website,
Figure 5-20
Ethics and Society
Pages 242 - 243 © 2016 Cengage Learning®. May not be scanned, copied
37
or duplicated, or posted to a publicly accessible website,
Figure 5-24
Information Privacy
Many programs exist that easily allow employers to monitor employees. Further, it is legal
for employers to use these programs
Pages 247 - 248 © 2016 Cengage Learning®. May not be scanned, copied
45
or duplicated, or posted to a publicly accessible website,
Figure 5-26
Summary
Chapter 5
Digital Security,
Ethics, and Privacy
Chapter 5 Complete