TOPIC 9
SECURITY, PRIVACY,
   ETHICS AND
   ERGONOMIC
                     Adapted from slides provided by the authors of the textbook “Computing Essentials 2017” by
                                                          Timothy O'Leary and Linda O'Leary and Daniel O'Leary
Learning Outcomes
   Identify the most significant concerns for effective implementation of computer technology.
        Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan horse, and zombies as well as
        denial of service attacks, Internet scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
        Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing
        data loss.
   Discuss the primary privacy issues of accuracy, property, and access.
Learning Outcomes
   Describe the impact of large databases, private networks, the Internet, and the Web on privacy.
      Discuss online identity and major laws on privacy.
      Discuss computer ethics including copyright law, software piracy, digital rights management,
      the Digital Millennium Copyright Act, as well as plagiarism and ways to identify plagiarism.
   Discuss the ergonomic concept and the related health concerns.
OUTLINE
                            Networks
Introduction                • Terms
Communications              Network Types
• Connectivity              • Local Area Networks (LAN)
• The Wireless Revolution   • Home Networks
• Communication Systems     • Wireless LAN (WLAN)
Communication Channels      • Personal Area Network (PAN)
• Physical Connections      • Metropolitan Area Networks (MAN)
• Wireless Connections      • Wide Area Networks (WAN)
Connection Devices          Network Architecture
• Modems                    • Topologies
• Connection Service        • Strategies
Data Transmission           Organizational Networks
• Bandwidth                 • Internet Technologies
• Protocols                 • Network Security
 Introduction
• The ubiquitous use of computers and technology prompts some very
  important questions about the use of personal data and our right to
  privacy.
• This chapter covers issues
  related to the impact of
  technology on people and
  how to protect ourselves
  on the Web.
People
Technology has had a very positive impact on people, but
some of the impact could be negative.
Most significant concerns:
  • Privacy – What are the threats to personal privacy and how can we
      protect ourselves?
  • Security – How can access to sensitive information be controlled and
      how can we secure hardware and software?
  • Ethics – How do the actions of individual users and companies affect
      society?
  • Ergonomics - How do the science devoted to incorporating comfort,
      efficiency, and safety into the design of items in the workplace?
Security
               • Involves protecting individuals or organizations from theft
 DEFINITION      and danger
               • Gain unauthorized access with malicious intent
  HACKERS      • Not all hackers are illegal
CYBERCRIME /   • Criminal offense that involves a computer and a network
 COMPUTER        • Effects over 400 million people annually
                 • Costs over $400 billion each year
   CRIME
Forms of Computer Crime
  Malicious Programs - Malware
• Malicious Programs or Malware
    • Designed by crackers, computer criminals, to
      damage or disrupt a computer system
    • Computer Fraud and Abuse Act makes spreading a
      virus a federal offense
    • 3 most common of malicious programs
        VIRUSES                       WORMS                  TROJAN HORSE
• migrate through            • fills the computer with   • – programs disguised
  networks and attach          self-replicating            as something else
  to different programs        information
    • Zombies are computers infected by a virus, worm,
      or Trojan Horse
Cyber Crime
                         Rogue Wi-Fi
  Denial of Service                         Data manipulation
                          hotspots
 • (DoS) attack       • Imitate free Wi-    • Finding entry
   attempts to slow     Fi networks and       into someone’s
   down or stop a       capture any and       computer
   computer system      all information       network and
   or network by        sent by the users     leaving a
   flooding it with     to legitimate         prankster’s
   requests for         sites including       message
   information or       usernames and
   data                 passwords
    Cyber Crime
     Internet
      Scams
                         Identity Theft           Cyber-bullying              Phishing
• A fraudulent or       • Illegal assumption     • Use of the Internet,   • Attempts to trick
  deceptive act or        of someone’s             cell phones, or          Internet users into
  operation to trick      identity for purpose     other devices to         thinking a fake but
  someone into            of economic gain         send or post             official-looking
  providing personal                               content intended to      website is
  information or                                   harm                     legitimate
  spending money for
  little or no return
Types of Internet Scams
Measures to Protect Computer Security
Principle measures to ensure
computer security
• Restricting access
• Encrypting data
• Anticipating disasters
  • Physical security
  • Data security
  • Disaster recovery plan
• Preventing data loss
Restricting Access
• Biometric scanning
  • Fingerprint scanners
  • Iris (eye) scanners
• Passwords
  • Dictionary attack
    • Uses software to try
      thousands of common words
      sequentially in an attempt to
      gain unauthorized access to a
      user’s account
Automated Security Tasks
Ways to perform and automate important security tasks
• Security Suites
   • Provide a collection of utility programs designed to protect your privacy and
     security
• Firewalls
   • Security buffer between a corporation’s provide network and all external
     networks
• Password Managers
   • Helps to create strong passwords
Encryption
Coding information to make it unreadable, except to
those who have the encryption key
   • E-mail encryption protects emails
   • File encryption protects files
   • Web site encryption uses HTTPS protocol for
     protection
      • HTTPS – hypertext transfer protocol secured
   • Virtual private networks (VPNs)
      • Encrypts connects between company networks and
        their remote users
   • Wireless network encryption restricts access to
     authorized users
      • WPA2 – Wi-Fi Protected Access
Anticipating Disasters
• Anticipating/Expecting Disasters
  • Physical Security protects hardware
  • Data Security protects software and data from unauthorized
    tampering or damage
  • Disaster Recovery Plan describes ways to continue operating in
    the event of a disaster
• Preventing Data Loss
  • Frequent backups
  • Redundant data storage
     • Store off-site in case of loss of equipment
Privacy
• Privacy – concerns the collection and use of data about
  individuals
• Three (3) primary privacy issues:
    • Accuracy – responsibility of those who collect data
       • Must be secure and correct
    • Property – who owns data and who has rights to software
    • Access – responsibility of those who control data and use of
      data
 Large Databases
Large organizations compile information about us daily
• Big Data is exploding and ever-growing
    • 90% of the data collected has been collected over the last 2
      years
• Data collectors include
   •   Government agencies
   •   Telephone companies
   •   Credit card companies
   •   Supermarket scanners
   •   Financial institutions
   •   Search engines
   •   Social networking sites
• Information Resellers/Brokers
   • Collect and sell personal data
   • Create electronic profiles
 Large Databases (Cont.)
• Personal information is a marketable commodity, which raises
  many issues:
  • Collecting public, but personally identifying information (e.g., Google’s
    Street View)
  • Spreading information without personal consent, leading to identity
    theft
  • Spreading inaccurate information
     • Mistaken identity
• Freedom of Information Act
  • Entitlement to look at your records held by government agencies
Private Networks
  Employee monitoring software
  • Employers can monitor e-mail legally
    • A proposed law could prohibit this type of
      electronic monitoring or at least require the
      employer to notify the employee first
 The Internet and the Web
• Illusion of anonymity
  • People are NOT concerned about privacy when surfing the Internet or
    when sending e-mail
• When browsing the web, critical information is stored on the hard
  drive in these locations:
  • History Files
  • Temporary Internet Files
     • Browser cache
  • Cookies
  • Privacy Mode
  • Spyware
 History Files and Temporary Internet Files
History Files
• Include locations or addresses of sites
  you have recently visited
Temporary Internet Files / Browser Cache
• Saved files from visited websites
• Offers quick re-display when you return
  to the site
Cookies
• Cookies are small data files that are
  deposited on your hard disk from
  web sites you have visited
     • First-party cookies are generated only by
       websites you are visiting
     • Third-party cookies are generated by an
       advertising company that is affiliated with
       the website
        • Also known as tracking cookies that keep track
          of your Internet activities through 3rd party
          cookies
        • Refer to the accompanying graphic displaying
          how to block 3rd party cookies
   Privacy Modes
• Ensures your browsing activity is not
  recorded on your hard drive
  • Incognito Mode
     • Google Chrome
  • Private Browsing
     • Safari
  Privacy Threats
• Web bugs
   • Invisible images or HTML code hidden within an e-mail
     message or web page
   • When a user opens the message information is sent back
     to the source of the bug
• Spyware
   • Wide range of programs that are designed to secretly
     record and report Internet activities, add Internet ad
     cookies
• Computer monitoring software
   • Invasive and dangerous
   • Keystroke Loggers
       • Record activities and keystrokes
• Anti-Spyware programs
   • Detect and remove privacy threats
Online Identity
• The information that people voluntarily post about themselves online
• Archiving and search features of the Web make it available
  indefinitely
• Major Laws on Privacy
   • Gramm-Leach-Bliley Act protects personal financial information
   • Health Insurance Portability and Accountability Act (HIPAA) protects medical
     records
   • Family Educational Rights and Privacy Act (FERPA) resists disclosure of
     educational records
Making IT Work for You Cloud-Based Backup
• Cloud-based backup services such as Carbonite provide cloud-based
  backup services.
Ethics
   Standards of moral conduct
   Computer Ethics – guidelines for the morally
   acceptable use of computers
   • Copyright
      • Gives content creators the right to control the use and
        distribution of their work
      • Paintings, books, music, films, video games
   • Software piracy
      • Unauthorized copying and distribution of software
          • Digital rights management (DRM) controls access to
            electronic media
          • Digital Millennium Copyright Act protects against piracy
Plagiarism
Representing some
other person’s work
and ideas as your
own without giving
credit to the original
person’s work and
ideas
Netiquette
• Netiquette is the code of acceptable Internet behavior
 Ergonomics
• Ergonomics is an
  applied science
  devoted to
  incorporating comfort,
  efficiency, and safety
  into the design of
  items in the workplace
Health Concerns of Computer Use
• The widespread use of
  computers has led to health
  concerns
  • Repetitive strain injury (RSI)
    • Tendonitis
    • Carpal tunnel syndrome (CTS)
  • Computer vision syndrome
    (CVS)
                                     33
Health Concerns of Computer Use
Computer vision syndrome
(CVS)
                                  34
Health Concerns of Computer Use
• Computer addiction occurs when the computer consumes someone’s
  entire social life
• Symptoms of users include:
            Craves        Overjoyed      Unable to stop
           computer       when at the      computer
             time          computer         activity
         Irritable when     Neglects      Problems at
            not at the     family and       work or
            computer         friends        school
                                                               35
A Look to the Future - The End of Anonymity
• Most forums and comment areas on websites allow
  users to post messages anonymously
• Some use this for abusive and threatening comments
  • Online harassment
  • Cyberbullying
  • Stalking
  • Damaging reputations
• How do you feel?
Open-Ended Questions (Page 1 of 3)
  1. Define privacy and discuss the impact of large databases, private
     networks, the Internet, and the Web.
  2. Define and discuss online identity and the major privacy laws.
  3. Define security. Define computer crime and the impact of
     malicious programs, including viruses, worms, Trojan horses, and
     zombies, as well as denial of service attacks, rogue Wi-Fi hotspots,
     data manipulation, identity theft, Internet scams, and
     cyberbullying.
Open-Ended Questions (Page 2 of 2)
  4. Discuss ways to protect computer security including
     restricting access, encrypting data, anticipating disasters, and
     preventing data loss.
  5. Define ethics, and describe copyright law and plagiarism.
Slides adapted from:
References:
Computing Essentials 2017
26th Edition
By: Timothy O'Leary and Linda O'Leary and Daniel O'Leary
Copyright: 2017
  TOPIC 9
     Complete
SECURITY, PRIVACY,
   ETHICS AND
   ERGONOMIC
                     Adapted from slides provided by the authors of the textbook “Computing Essentials 2017” by
                                                          Timothy O'Leary and Linda O'Leary and Daniel O'Leary