Computers: Tools for an Information Age

Download Report

Transcript Computers: Tools for an Information Age

Module 13:
Ethics and Security in computing
Some social issues in computing

Division issues, workplace issues, legal issues

protecting children on the Internet
Ethics in computing

Significance of the ethics

intellectual property rights
Security issues in computing



Security problems
Protection
Viruses and worms
Workplace Issues
Healthy computing



Harmful emissions from monitor, Eyestrain from monitor, Back
pain from position of chair and desk, Repetitive strain injury
Ergonomic equipment, Ergonomic behavior
Ergonomics refers to human factors related to the use of
computers
Employee monitoring


An employer monitors an employee’s performance
Many companies have policies that notify employees about
monitoring practices
Environmental concerns

Power consumption. Computer supplies. PC disposal
3
Many other issues
Jurisdictional issues

International issues
Applying national laws to a world-wide medium is a difficult process
Issues exist over which country’s court has jurisdiction

National issues
Issues exist over which locality’s court has jurisdiction
Imposition of sales taxes on Internet transactions
Protecting Children on the Internet



The Internet offers many opportunities for children
There are also unsavory elements on the Internet
Ways to protect children
Blocking software. Child monitoring. Laws to protect children
4
Ethics in Computing
Ethics – standards of moral conduct

Used to help determine the proper course of
action in difficult situations
Ethics Issues




Computer ethics
Professional ethics
Programmer responsibility
Ethical use of computers
5
Intellectual Property Rights
Refers to results of intellectual activity in
the industrial, scientific, literary, or artistic
fields
U.S. Copyright Act provides protection in
three areas



Copyrights
Patents
Trademarks
10
Security and Privacy
Security – data stored on computer must
be kept safe
Privacy – private data must be kept from
prying eyes
15
Computer Crime
Hacker – someone who attempts to gain
access to computer systems illegally
Cracker – someone who uses the
computer to engage in illegal activity
Most commonly reported categories




Credit card fraud
Data communications fraud
Unauthorized access to computer files
Unlawful copying of copyrighted software
16
Methods Computer Criminals Use
Bomb
Denial of service
Piggybacking
Trapdoor
Trojan horse
17
White-Hat Hackers
Hackers that are paid by a company to
break into that company’s computer
systems


Expose security holes and flaws before
criminals find them
Once exposed, flaws can be fixed
23
Discovery and Prosecution
Crimes are often undetected

When they are detected, they are often not reported
Prosecution is difficult


Law enforcement agencies and prosecutors are illequipped to handle computer crime
Judges and juries often don’t understand computer
crime
Congress passed the Computer Fraud and
Abuse Act to increase awareness of computer
crime
24
Security: Playing It Safe
Security – a system of safeguards


Protects system and data from deliberate or
accidental damage
Protects system and data from unauthorized
access
25
Controlling Access
Four means of controlling who has access
to the computer




What you have
What you know
What you do
What you are
26
A Disaster Recovery Plan
A method of restoring computer processing
operations and data files in the event of major
destruction
Several approaches



Manual services
Buying time at a service bureau
Consortium
Plan should include priorities for restoring
programs, plans for notifying employees, and
procedures for handling data in a different
environment
27
Data Security
Several techniques can be taken to
prevent theft or alteration of data





Internal controls
Auditor checks
Applicant screening
Passwords
Built-in software protection
28
Personal Computer Security
Physical security of hardware


Secure hardware in place with
locks and cables
Avoid eating, drinking, and
smoking around computers
29
Backing Up Files
Back up to tape drive, CD-RW, or DVD-RAM

You can use software that automatically backs up at a certain
type of day
Disk mirroring

Makes second copy of everything you put on disk to another
hard disk
Three types of backup



Full backup – copies everything from the hard drive
Differential backup – copies all files that have been changed
since the last full backup
Incremental backup – copies only those files that have been
changed since either the last full backup or the last incremental
backup
Comprehensive backup plan
30
Security Problems on the Internet
With so many people on the Internet, how
do you keep data secure?
Several approaches


Using a firewall
Encryption
34