DC16_Ch05
DC16_Ch05
Chapter 5
Digital Security,
Ethics, and Privacy
Objectives Overview
See Page 212 © 2016 Cengage Learning®. May not be scanned, copied o 2
for Detailed Objectives r duplicated, or posted to a publicly accessible website, in
Objectives Overview
See Page 212 © 2016 Cengage Learning®. May not be scanned, copied o 3
for Detailed Objectives r duplicated, or posted to a publicly accessible website, in
Digital Security Risks
Unethical
Corporate spies Cyberextortionist
employees
Cyberterrorist
Pages 216 - 217 © 2016 Cengage Learning®. May not be scanned, copied o 10
r duplicated, or posted to a publicly accessible website, in
Internet and Network Attacks
Pages 219 - 220 © 2016 Cengage Learning®. May not be scanned, copied o 11
Figure 5-4 r duplicated, or posted to a publicly accessible website, in
Unauthorized Access and Use
Unauthorized
Unauthorized use is the use
access is the of a
use of a computer or
computer or its data for
network unapproved
without or possibly
permission illegal
activities
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
Page 221 13
© 2016 Cengage Learning®. May not be scanned, copied o
Figure 5-5 r duplicated, or posted to a publicly accessible website, in
Unauthorized Access and Use
Face
Fingerprint
recognition
reader
system
Hand Voice
geometry verification
system system
Signature Iris
verification recognition
system system
Pages 224 – 226 © 2016 Cengage Learning®. May not be scanned, copied o 16
Figures 5-8 – 5-11 r duplicated, or posted to a publicly accessible website, in
Unauthorized Access and Use
Pages 226 – 227 © 2016 Cengage Learning®. May not be scanned, copied o 17
Figure 5-12 r duplicated, or posted to a publicly accessible website, in
Unauthorized Access and Use
Information
Insurance
security
agencies
departments
Page 227 © 2016 Cengage Learning®. May not be scanned, copied o 18
r duplicated, or posted to a publicly accessible website, in
Software Theft
Illegally registers
Illegally copies a
and/or activates
program
a program
Page 228 © 2016 Cengage Learning®. May not be scanned, copied o 19
r duplicated, or posted to a publicly accessible website, in
Software Theft
Pages 228 – 229 © 2016 Cengage Learning®. May not be scanned, copied o 21
Figure 5-13 r duplicated, or posted to a publicly accessible website, in
Information Theft
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing digital
or destroying digital
equipment
equipment
Cloud
Storage
Pages 233 - 234 © 2016 Cengage Learning®. May not be scanned, copied o 28
r duplicated, or posted to a publicly accessible website, in
Backing Up – The Ultimate Safeguard
– Selective
– Continuous data
protection Parent
– Cloud
Child
Page 234 29
© 2016 Cengage Learning®. May not be scanned, copied o
r duplicated, or posted to a publicly accessible website, in
Backing Up – The Ultimate Safeguard
Page 236 31
© 2016 Cengage Learning®. May not be scanned, copied o
Figure 5-18 r duplicated, or posted to a publicly accessible website, in
Ethics and Society
Page 242 37
© 2016 Cengage Learning®. May not be scanned, copied o
Figure 5-23 r duplicated, or posted to a publicly accessible website, in
Information Privacy
Track how
Target
often users visit
advertisements
a site
Pages 243 - 244 © 2016 Cengage Learning®. May not be scanned, copied o 39
r duplicated, or posted to a publicly accessible website, in
Information Privacy
Pages 244 - 245 © 2016 Cengage Learning®. May not be scanned, copied o 41
r duplicated, or posted to a publicly accessible website, in
Information Privacy
Chapter 5
Digital Security,
Ethics, and Privacy
Chapter 5 Complete