IT Fundamentals Ch09
IT Fundamentals Ch09
3
9.1 Security Issues
5
Procedural errors
• When people fail to follow established procedures, errors can occur
Software errors
• Software bug: an error in a program that causes it not to work properly
7
Computer Crimes
• Two types of computer crime:
• Illegal act perpetrated against computers or telecommunications (computer
is the target)
• Use of computers or telecommunications to accomplish an illegal act
(computer is the tool)
8
Computer Crimes (continued)
• Theft of hardware
• Theft of software
• Theft of intellectual property (piracy)
• Theft of time and services
• Theft of information (e.g., medical info, credit card info)
• Internet-related fraud (e.g., Wi-Fi phishing, or evil twin attack)
• Crimes of malice: crashing entire systems
• Attacks on power-control systems and attacks on the Internet
9
9.2 Security Safeguards
11
Deterrents to computer crime
• Enforcing laws
• CERT: The Computer Emergency Response Team
• Provides round-the-clock information on international computer security
threats
• Tools to fight fraudulent and unauthorized online uses
• Rule-based detection software
• Predictive-statistical-model software
• Employee Internet management software
• Internet filtering software
• Electronic surveillance
12
Identification and access
• Verify legitimate right of access by what you have, what you know, and who
you are
• What you have: cards, keys, signatures, badges
• What you know: PINs and passwords; callback provision
• Who you are: biometrics (such as hand geometry, fingerprint scans, iris
recognition, face recognition, voice recognition)
13
Encryption
• The process of altering readable data into unreadable form to prevent
unauthorized access
• Advantage: encrypting data that is available over the Internet keeps thieves and
crackers from reading it
• Disadvantage: encrypting data may prevent law-enforcement officials from
reading the data criminals are sending to one another
Discussion Questions: Does information privacy outweigh law enforcement’s needs to track down and prosecute
criminals? Should we all encrypt our information to prevent crackers and criminals from stealing it?
14
Protection of software and data
• Restrict access to online files; use transaction logs
• Use audit controls to track who used what programs and servers, which
files were opened, and so on
• Use people controls—screen applicants; do background checks; monitor
Internet, email, and computer usage; use shredders for discarded
documents and materials
15
Disaster-recovery plans
• Method of restoring information-processing operations that have been
halted by destruction or accident
• Back up everything; put mainframes in different locations
• Plans range in price and complexity
• Automatically store data redundantly in two or more places
• Have an off-site computer-based data storage center with independent
power supply
16
9.3 Privacy & Surveillance
22
9.4 Truth Issues
24
9.5 Quality-of-Life Issues
26
Mental-Health Problems
• Isolation: computer gamers may substitute online games for
interpersonal interaction; videogame and Internet addiction
• Online gambling is too easy
• Many users find computers stressful and anger-inducing
27
Protecting Children
• Pornography
• The Internet has allowed the widespread distribution of sexually explicit
material
• Online pornographers use pop-up ads, Internet search engines to troll for
new customers
• This means that children may be exposed to porn when involved in innocent
online searches
• Online blocking software, DVD filters, the V-chip, and .xxx web addresses
can be used to avoid/filter out pornography
28
Online Sexual Predators
• Prevention Strategies
• Monitor children’s Internet use
• Be candid to children about threats
• Caution children about revealing too much information
• Tell them not to engage in sexting (online information and images NEVER go
away; they are there forever)
29
Sexting is use of a smartphone or other mobile device to send
sexually explicit photos or videos; sometimes it also refers to
sexually charged text messages.
• Can lead to dangerous behavior and embarrassing experiences.
30
Cyberbullies
• Another example of how information technology can negatively affect
children
• When it happens:
• Save the evidence
• Block messages
• Contact an attorney or the police
• Cyberbullying can also occur in the workplace
31
Workplace Problems
• Misuse of technology
• Playing online games, shopping, writing personal emails, etc. interfere with
workers’ productivity and can get them fired
• Fussing with computers
• Dealing with hardware, software, and network connections can waste a lot
of time, as can dealing with spam and the like
• Information overload
• With so much available technology, people tend to work more hours and
get swamped by too much information
32
Information Overload
• Term first used by Alvin Toffler in 1970: he predicted that the rapidly
increasing amounts of information being produced would eventually
cause people problems.
• Although computer processing and memory speed and capacity are
increasing all the time, the brain that humans must use to process the
information is not getting any faster.
What are some of the signs of information overload?
• Increased cardiovascular stress owing to a rise in blood pressure.
• Weakened vision.
• Confusion and frustration.
• Impaired judgment based on overconfidence.
• Irritation with others owing to an environmental input glut (which
may also account for part of the “brusqueness” that is commonly
attributed to big-city dwellers).
What can be done about information overload? For example:
• Spend less time on information that is nice to know and more time on
information that you need to know now.
• Focus on getting relevant information, not on getting information faster,
and focus on quality of information, rather than quantity.
• Learn how to create better information. Be direct in what you ask people,
so that they can provide short precise answers.
• Understand the tools you have and don’t switch tasks very often (single-
tasking keeps the mind focused on one issue at a time).
• Avoid interruptions.
• Have quiet periods, when you disconnect.
• Take breaks.
9.6 Economic & Political Issues