Discovering Computers 2016: Digital Security, Ethics, and Privacy
Discovering Computers 2016: Digital Security, Ethics, and Privacy
2016
Tools, Apps, Devices, and the Impact of
Technology
Chapter 5
Digital
Security,
Ethics, and
Privacy
Objectives Overview
Identify safeguards
Explain the options
against hardware theft,
available for backing up
vandalism, and failure
Discuss issues
surrounding information
privacy
Hacker Cracker
Unethical
Cyberextortionist
employees
Cyberterrorist
• Information
transmitted over
networks has a higher
degree of security
risk than information
kept on an
organization’s
premises
• Malware, short for
malicious software,
consists of programs
that act without a
user’s knowledge and
deliberately alter the
operations of
computers and
mobile devices
• Organizations
take several
measures to help
prevent
unauthorized
access and use
– Acceptable use
policy
– Disable file and
printer sharing
Face
Fingerprint
recognition
reader
system
Hand Voice
geometry verification
system system
Signature
Iris recognition
verification
system
system
Information
Insurance
security
agencies
departments
Illegally registers
Illegally copies a
and/or activates
program
a program
Hardware vandalismis
the act of defacing or
destroying digital
equipment
© 2016 Cengage Learning®. May not be
Page 233 scanned, copied or duplicated, or posted 25
to a publicly accessible website, in whole
or in part.
Hardware Theft, Vandalism,
and Failure
• Categories of • Three-
backups: generation
– Full backup policy
– Differential
– Incremental Grandparent
– Selective
– Continuous data
protection
– Cloud Parent
Child
• Wireless access
poses additional
security risks
• Some perpetrators
connect to other’s
wireless networks
to gain free
Internet access or
confidential data
• Others connect to
a network through
an unsecured
wireless access
point (WAP) or
combination
router/WAP
• Technology ethics
are the moral
guidelines that
govern the use of
computers, mobile
devices, information
systems, and related
technologies
• Information
accuracy is a
concern
– Not all information
on the Internet is
correct
• Information
about you can be
stored in a
database when
you:
– Fill out a printed
or online form
– Create a profile
on an online
social network
– Register a
product warranty
Target
advertisements
© 2016 Cengage Learning®. May not be
Pages 243 - 244 scanned, copied or duplicated, or posted 38
to a publicly accessible website, in whole
or in part.
Information Privacy
• Content filtering
is the process of
restricting access
to certain
material
– Many businesses
use content
filtering
• Web filtering
software restricts
access to
specified
websites
Chapter 5
Digital
Security,
Ethics, and
Privacy
Chapter 5 Complete