Chapter 9 Privacy, Security, and Ethics Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems.
Download ReportTranscript Chapter 9 Privacy, Security, and Ethics Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems.
Chapter 9 Privacy, Security, and Ethics Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Overview Chapter 9 Identify Concerns About Technology Describe Privacy Issues Discuss Online Identity Discuss Major Laws On Privacy Discuss Cybercrimes Discuss Computer Security Discuss Computer Ethics 2/24 Privacy Chapter 9 Collection and Use of People’s Data Primary Privacy Issues: Accuracy Ensure that Data is Correct Property Who Owns Data and Rights to Software Access Control Who is Able to Use that Data 3/24 Privacy Chapter 9 Large Databases Telephone Companies Know What Calls We Make Reverse Directory Supermarkets What We Buy and When Search Engines Record Search Histories of Their Users 4/24 Privacy Chapter 9 Large Databases Information Resellers or Brokers Collect and Sell Personal Data Create Electronic Profiles Public, Personally Identifying Information Google Street View Spreading Information Without Consent Identity Theft Spreading Inaccurate Information www.annualcreditreport.com 5/24 Privacy Chapter 9 Private Networks Employers Can Legally Monitor E-mail Used by 75 % of All Businesses The Internet and the Web Illusion of Anonymity History Files Temporary Internet Files 6/24 Privacy Chapter 9 The Internet and the Web Cookies First-party cookies Third-party cookies Privacy Mode Web Bugs Spyware Keystroke Loggers Spyware Removal 7/24 Privacy Chapter 9 Online Identity Information People Post About Themselves Social Networking, Photo/Video Sharing Consequences Major Laws on Privacy Gramm-Leach-Bliley Act (Financial) HIPAA (Medical) FERPA (Educational) 8/24 Privacy Chapter 9 Chip Implants (FDA Approved 2004) Size of a Grain of Rice ID Medical History (1000+ Mexican Patients) Secure Access (Mexico) Access to VIP Areas (Rotterdam Nightclub) “Mark of the Beast” (Virginia) 9/24 Security Chapter 9 Protection from Unauthorized Use Information Hardware Software Preventing or Limiting Damage from Intrusions Sabotage Natural Disasters 10/24 Security Chapter 9 Cybercrime Hackers Malware Crackers Virus Worm Trojan Horse 11/24 Security Chapter 9 Zombies Rootkit Botnet Car Hacking Control Acceleration and Braking Key Fobs 12/24 Security Chapter 9 DoS (Denial of Service) Phishing Cyberbullying Rogue Wi-Fi Hotspots Theft Data Manipulation Computer Fraud and Abuse Act 13/24 Information Theft Chapter 9 Data Loss http://www.privacyrights.org/data-breach Organization Event When Amount Saudi Aramco Hack August 2012 Adult Friend Finder Hack May 2015 3,500,000 UCLA Health Hack May 2015 4,500,000 OPM (US Gov) Hack June 2015 21,500,000 IRS (US Gov) Hack July 2015 Blue Cross Hack September 2015 35,000 PCs 330,000 10,000,000 14/24 Security Chapter 9 Mid-Year Data Breach QuickView Report Report Highlights: Exceeded 16,700 Reported Data Breaches Exposing Nearly 3.9 Billion Records Five Breaches Exposed 181 Million Records 78.4% Were the Result of Hacking Breaches Involving U.S. Entities: 37.6% Risk Based Security 2015 15/24 Security Chapter 9 Biggest Cybersecurity Threats China 16/24 Security Chapter 9 Measures to Protect Computer Security Antivirus Detects & Identifies Viruses Looks for Signature Specific Pattern of Virus Code Inoculates Existing Program Files Records File Size & Creation Date Removes or Quarantines Viruses Creates Rescue/Recovery Disk 17/24 Security Chapter 9 Measures to Protect Computer Security Restricting Access Biometric Scanning Passwords Security Suites Firewalls 18/24 Security Chapter 9 Measures to Protect Computer Security Encryption Emails Files Web Sites HTTPS Intrusion Detection Software Analyzes Network Traffic Assesses System Vulnerabilities Identifies Intrusions & Suspicious Behavior 19/24 Security Chapter 9 Measures to Protect Computer Security Anticipating Disasters Physical Security Data Security Disaster Recovery Plan Preventing Data Loss Backup Stored Offsite 20/24 Security Chapter 9 Measures to Protect Computer Security System Failure Aging Hardware Natural Disasters Electrical Power Problems Power Surge or Spike Surge Protector Protects Against Power Disturbances Uninterruptible Power Supply (UPS) Provides Short-term Power 21/24 Ethics Chapter 9 Morally Acceptable Use of Computers Copyright Software Piracy Unauthorized Copying and Distribution Digital Rights Management (DRM) Control Number of Devices that Can Access a File Limit Kinds of Devices that Can Access a File Digital Millennium Copyright Act Plagiarism 22/24 Careers in IT Chapter 9 IT Security Analyst Maintain Security of Network, Systems, and Data Data Confidentiality, Integrity, and Availability Bachelor's Degree in Computer Science Good Communication Skills Handle High-stress Situations Annual Salary of $62,000 - $101,000 23/24