Chapter 9 Privacy, Security, and Ethics Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems.

Download Report

Transcript Chapter 9 Privacy, Security, and Ethics Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems.

Chapter 9
Privacy, Security, and Ethics
Professor Michael J. Losacco
CIS 1150 – Introduction to Computer Information Systems
Overview
Chapter
9
Identify Concerns About Technology
Describe Privacy Issues
Discuss Online Identity
Discuss Major Laws On Privacy
Discuss Cybercrimes
Discuss Computer Security
Discuss Computer Ethics
2/24
Privacy
Chapter
9
Collection and Use of People’s Data
Primary Privacy Issues:
Accuracy
Ensure that Data is Correct
Property
Who Owns Data and Rights to Software
Access
Control Who is Able to Use that Data
3/24
Privacy
Chapter
9
Large Databases
Telephone Companies
Know What Calls We Make
Reverse Directory
Supermarkets
What We Buy and When
Search Engines
Record Search Histories of Their Users
4/24
Privacy
Chapter
9
Large Databases
Information Resellers or Brokers
Collect and Sell Personal Data
Create Electronic Profiles
Public, Personally Identifying Information
Google Street View
Spreading Information Without Consent
Identity Theft
Spreading Inaccurate Information
www.annualcreditreport.com
5/24
Privacy
Chapter
9
Private Networks
Employers Can Legally Monitor E-mail
Used by 75 % of All Businesses
The Internet and the Web
Illusion of Anonymity
History Files
Temporary Internet Files
6/24
Privacy
Chapter
9
The Internet and the Web
Cookies
First-party cookies
Third-party cookies
Privacy Mode
Web Bugs
Spyware
Keystroke Loggers
Spyware Removal
7/24
Privacy
Chapter
9
Online Identity
Information People Post About Themselves
Social Networking, Photo/Video Sharing
Consequences
Major Laws on Privacy
Gramm-Leach-Bliley Act (Financial)
HIPAA (Medical)
FERPA (Educational)
8/24
Privacy
Chapter
9
Chip Implants (FDA Approved 2004)
Size of a Grain of Rice
ID
Medical History (1000+ Mexican Patients)
Secure Access (Mexico)
Access to VIP Areas (Rotterdam Nightclub)
“Mark of the Beast” (Virginia)
9/24
Security
Chapter
9
Protection from Unauthorized Use
Information
Hardware
Software
Preventing or Limiting Damage from
Intrusions
Sabotage
Natural Disasters
10/24
Security
Chapter
9
Cybercrime
Hackers
Malware
Crackers
Virus
Worm
Trojan Horse
11/24
Security
Chapter
9
Zombies
Rootkit
Botnet
Car Hacking
Control Acceleration and Braking
Key Fobs
12/24
Security
Chapter
9
DoS (Denial of Service)
Phishing
Cyberbullying
Rogue Wi-Fi Hotspots
Theft
Data Manipulation
Computer Fraud and Abuse Act
13/24
Information Theft
Chapter
9
Data Loss
http://www.privacyrights.org/data-breach
Organization
Event
When
Amount
Saudi Aramco
Hack
August 2012
Adult Friend Finder
Hack
May 2015
3,500,000
UCLA Health
Hack
May 2015
4,500,000
OPM (US Gov)
Hack
June 2015
21,500,000
IRS (US Gov)
Hack
July 2015
Blue Cross
Hack
September 2015
35,000 PCs
330,000
10,000,000
14/24
Security
Chapter
9
Mid-Year Data Breach QuickView Report
Report Highlights:
Exceeded 16,700 Reported Data Breaches
Exposing Nearly 3.9 Billion Records
Five Breaches Exposed 181 Million Records
78.4% Were the Result of Hacking
Breaches Involving U.S. Entities: 37.6%
Risk Based Security 2015
15/24
Security
Chapter
9
Biggest Cybersecurity Threats
China
16/24
Security
Chapter
9
Measures to Protect Computer Security
Antivirus
Detects & Identifies Viruses
Looks for Signature
Specific Pattern of Virus Code
Inoculates Existing Program Files
Records File Size & Creation Date
Removes or Quarantines Viruses
Creates Rescue/Recovery Disk
17/24
Security
Chapter
9
Measures to Protect Computer Security
Restricting Access
Biometric Scanning
Passwords
Security Suites
Firewalls
18/24
Security
Chapter
9
Measures to Protect Computer Security
Encryption
Emails
Files
Web Sites
HTTPS
Intrusion Detection Software
Analyzes Network Traffic
Assesses System Vulnerabilities
Identifies Intrusions & Suspicious Behavior
19/24
Security
Chapter
9
Measures to Protect Computer Security
Anticipating Disasters
Physical Security
Data Security
Disaster Recovery Plan
Preventing Data Loss
Backup
Stored Offsite
20/24
Security
Chapter
9
Measures to Protect Computer Security
System Failure
Aging Hardware
Natural Disasters
Electrical Power Problems
Power Surge or Spike
Surge Protector
Protects Against Power Disturbances
Uninterruptible Power Supply (UPS)
Provides Short-term Power
21/24
Ethics
Chapter
9
Morally Acceptable Use of Computers
Copyright
Software Piracy
Unauthorized Copying and Distribution
Digital Rights Management (DRM)
Control Number of Devices that Can Access a File
Limit Kinds of Devices that Can Access a File
Digital Millennium Copyright Act
Plagiarism
22/24
Careers in IT
Chapter
9
IT Security Analyst
Maintain Security of Network, Systems, and Data
Data Confidentiality, Integrity, and Availability
Bachelor's Degree in Computer Science
Good Communication Skills
Handle High-stress Situations
Annual Salary of $62,000 - $101,000
23/24