chapter 5
chapter 5
Chapter 5
Digital Security,
Ethics, and Privacy
Objectives Overview
Cyberterrorist
• Information transmitted
over networks has a
higher degree of security
risk than information kept
on an organization’s
premises
• Malware is a software
that is specifically
designed to disrupt,
damage, or gain
unauthorized access to a
computer system.
Page 215 © 2016 Cengage Learning®. May not be scanned, copied
9
or duplicated, or posted to a publicly accessible website,
Table 5-1
Internet and Network Attacks
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
Face
Fingerprint
recognition
reader
system
Hand Voice
geometry verification
system system
Signature Iris
verification recognition
system system
© 2016 Cengage Learning®. May not be scanned, copied
Pages 224 – 226 or duplicated, or posted to a publicly accessible website, 17
Figures 5-8 – 5-11 in whole or in part.
Unauthorized Access and Use
Information
Insurance
security
agencies
departments
© 2016 Cengage Learning®. May not be scanned, copied
Page 227 or duplicated, or posted to a publicly accessible website, 19
in whole or in part.
Software Theft
Illegally registers
Illegally copies a
and/or activates
program
a program
© 2016 Cengage Learning®. May not be scanned, copied
Page 228 or duplicated, or posted to a publicly accessible website, 20
in whole or in part.
Software Theft
Hardware vandalism
Hardware theft is
is the act of defacing
the act of stealing
or destroying digital
digital equipment
equipment
Cloud
Storage
© 2016 Cengage Learning®. May not be scanned, copied
Pages 233 - 234 or duplicated, or posted to a publicly accessible website, 29
in whole or in part.
Backing Up – The Ultimate Safeguard
– Cloud
Child
Pages 238 - 240 © 2016 Cengage Learning®. May not be scanned, copied
33
or duplicated, or posted to a publicly accessible website,
Figure 5-20
Ethics and Society
Pages 242 - 243 © 2016 Cengage Learning®. May not be scanned, copied
39
or duplicated, or posted to a publicly accessible website,
Figure 5-24
Information Privacy
Track how
Target
often users
advertisements
visit a site
© 2016 Cengage Learning®. May not be scanned, copied
Pages 243 - 244 or duplicated, or posted to a publicly accessible website, 40
in whole or in part.
Information Privacy
• Content filtering is a
process that manages
or screens access to
specific emails or
webpages.
• Web filtering software
restricts access to
specified websites
Pages 247 - 248 © 2016 Cengage Learning®. May not be scanned, copied
47
or duplicated, or posted to a publicly accessible website,
Figure 5-26
Summary
Chapter 5
Digital Security,
Ethics, and Privacy
Chapter 5 Complete