Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems



Similar documents
Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Computers and Society: Security and Privacy

Chapter 11 Computers and Society, Security, Privacy, and Ethics

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

COB 302 Management Information System (Lesson 8)

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

CHAPTER 10: COMPUTER SECURITY AND RISKS

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Content Teaching Academy at James Madison University

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Information Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

The Information Security Problem

Acceptable Use Policy

region16.net Acceptable Use Policy ( AUP )

BE SAFE ONLINE: Lesson Plan

Executable Integrity Verification

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

Top tips for improved network security

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Contents. McAfee Internet Security 3

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

FKCC AUP/LOCAL AUTHORITY

Introduction to Computer Security Table of Contents

Hyde School Student Computer Systems Acceptable Use Policy

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

The Benefits of SSL Content Inspection ABSTRACT

How To Use A College Computer System Safely

Computer Security Maintenance Information and Self-Check Activities

Airtel PC Secure Trouble Shooting Guide

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

ESET Mobile Security Business Edition for Windows Mobile

Cyber Security Awareness

HIPAA Security Training Manual

Cyber Security Awareness

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

ELECTRONIC INFORMATION SECURITY A.R.

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Section 12 MUST BE COMPLETED BY: 4/22

Get Started Guide - PC Tools Internet Security

Remote Deposit Quick Start Guide

BOARD OF EDUCATION POLICY

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Terms and conditions of use

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Acceptable Usage Policy


ACCEPTABLE USE POLICY

PC Security and Maintenance

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Kaspersky Endpoint Security 8 for Smartphone for Android OS

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

3 day Workshop on Cyber Security & Ethical Hacking

Policy for the Acceptable Use of Information Technology Resources

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Did you know your security solution can help with PCI compliance too?

ViRobot Desktop 5.5. User s Guide

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures

Network Incident Report

Sophos Endpoint Security and Control Help. Product version: 11

Common Cyber Threats. Common cyber threats include:

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Sophos Endpoint Security and Control Help

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

Internet threats: steps to security for your small business

Profound Outdoors Privacy Policy

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Don t Fall Victim to Cybercrime:

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

MYACCLAIM PRIVACY POLICY

Computer Viruses: How to Avoid Infection

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Transcription:

What are Computer Ethics? Computing Issues Moral guidelines that govern use of computers and information systems Part I: Ethics Unauthorized use of computer systems Information privacy Intellectual property rights A106 Peter Lo 2002 1 Software theft (piracy) Information accuracy Codes of conduct A106 Peter Lo 2002 2 What do you think about ethical issues? What do you think about ethical issues? A106 Peter Lo 2002 3 A106 Peter Lo 2002 4

Why is information accuracy important? Inaccurate input can result in erroneous information and incorrect decisions based on that information Evaluate Web page s value before relying on its content Why is information accuracy important? A106 Peter Lo 2002 5 A106 Peter Lo 2002 6 What are the ethics of using computers to alter output? Alteration could lead to deliberately misleading photographs Intellectual Property Rights Intellectual property (IP) refers to work created by inventors, authors, and artists Intellectual property rights are rights to which creators are entitled for their inventions, writings, and works of art A106 Peter Lo 2002 7 TM copyright trademark A106 Peter Lo 2002 8

IT code of conduct Written guideline that helps determine whether specific computer action is ethical or unethical Computing Issues Part II: Security A106 Peter Lo 2002 9 A106 Peter Lo 2002 10 Computer Security Risk Computer Virus Event or action that causes loss of or damage to a computer system Computer crime Any illegal act involving a computer Cybercrime Online or Internetbased illegal acts Potentially damaging program that affects computer negatively by altering way computer works Segment of program code from some outside source that implants itself in computer A106 Peter Lo 2002 11 A106 Peter Lo 2002 12

What are the ways viruses can be activated? Opening infected file Running infected program Booting computer with infected floppy disk in disk drive What is the source of a virus? Written by programmer Some write viruses as challenge Others write viruses to cause destruction or to slow Internet A106 Peter Lo 2002 13 A106 Peter Lo 2002 14 Signs of a Virus Infection Three main types of virus Boot sector virus Resides in boot sector of floppy disk or master boot record of hard disk File virus Attaches itself to program files A106 Peter Lo 2002 15 Macro virus When you open document that contains infected macro, virus loads A106 Peter Lo 2002 into memory 16

How do viruses activate? Logic bomb Virus that activates when it detects certain condition Time bomb Type of logic bomb that activates on particular date Malware Malicious-logic program Worm and Trojan Horse Acts without user s knowledge and alters computer s operations A106 Peter Lo 2002 17 Antivirus Program A utility that prevents, detects, and removes viruses from a computer s memory or storage devices Some viruses destroy or corrupt data A106 Peter Lo 2002 18 How can you protect your system from a macro virus? Set macro s security level in all applications that allow you to write macros At medium security level, warning displays when you attempt to open document that contains macro What does an Antivirus Program do? Detects and identifies viruses Inoculates existing program files Removes or quarantines viruses Creates rescue disk A106 Peter Lo 2002 19 A106 Peter Lo 2002 20

How does an Antivirus program scan for a virus? Scans for Programs that attempt to modify boot program, operating system, and other programs that normally read from but not modified Files you download from the Web E-mail attachments Files you open All removable media, such as a floppy A106 Peter Lo 2002 21 How does an Antivirus program inoculate a program file? Antivirus program records file size and creation date and uses this information to detect if a virus tampers with inoculated program file A106 Peter Lo 2002 22 What two types of virus are more difficult to detect? Polymorphic virus Modifies its own code each time it attaches itself to another program or file Stealth virus Infects a program file, but still reports size and creation date of original, uninfected program Cannot be detected by its virus signature because code pattern in virus never looks the same Cannot be detected A106 Peter Lo 2002 by inoculation file 23 What does an Antivirus program do once it detects a virus? Removes virus if possible Quarantines infected file in folder on hard disk A106 Peter Lo 2002 24

Rescue Disk Removable disk that contains uninfected copy of key operating system commands and startup information Upon startup, rescue disk finds and removes boot sector virus What should you do if a virus infects your system? Remove virus If you share data with other users, then immediately inform them of virus infection A106 Peter Lo 2002 25 A106 Peter Lo 2002 26 How can you stay informed about viruses? Several Web sites publish list of virus alerts and virus hoaxes Virus hoax E-mail message that warns you of non-existent virus Unauthorized Access Use of computer or network without permission Hacker Once used as a complimentary word for a computer enthusiast Now another word for cracker Cracker Someone who tries to access a computer or network illegally A106 Peter Lo 2002 27 A106 Peter Lo 2002 28

How can unauthorized access and use be prevented? How can you make your password more secure? Longer passwords provide greater security User names and passwords Biometric devices Possessed objects (badge or card) Callback systems (computer calls back) A106 Peter Lo 2002 29 A106 Peter Lo 2002 30 How should you select a user name and password? Avoid obvious passwords, such as your initials or birthday Select password that is easy for you to remember IAWL0901 First letter of September 1 each word in is your your favorite anniversary movie, It s a A106 Peter Lo 2002 Wonderful Life 31 Biometric Device Translates person s characteristics into digital code that is compared to digital code stored in computer Biometric identifier Fingerprints Hand geometry Facial features Voice Signatures Retinal (eye) patterns A106 Peter Lo 2002 32

Fingerprint scanner Captures curves and indentations of a fingerprint Hand geometry system Measures shape and size of person s hand Typically used as time and attendance device by large companies A106 Peter Lo 2002 33 A106 Peter Lo 2002 34 Face recognition system Captures face image and compares it to stored image to see if person is legitimate user Can recognize people with or without glasses, makeup, or jewelry, and with new hairstyles Iris verification system Reads patterns in tiny blood vessels in back of eye A106 Peter Lo 2002 35 A106 Peter Lo 2002 36

Audit trail Software theft Records in file both successful and unsuccessful access attempts Companies should document and explain to employees policies regarding use of computers by employees for personal reasons Can range from someone stealing media that contains software to intentional piracy of software Software piracy is unauthorized and illegal duplication of copyrighted software When you purchase software, you do not own the software; instead, you become a licensed user A106 Peter Lo 2002 37 A106 Peter Lo 2002 38 Encryption Process of converting readable data into unreadable characters to prevent unauthorized access Used to transmit files over Internet Plaintext Unencrypted, readable data encryption software Ciphertext The encrypted (scrambled) data encryption key Some data encryption methods Encryption key (formula) often uses more than one of these methods Plaintext Unencrypted, readable data A106 Peter Lo 2002 39 A106 Peter Lo 2002 40

How does public key encryption work? Step 2: 3: 4: 1: Sender Receiver creates uses can receiver s read his document or her print public private to the be key decrypted e-mailed key to to encrypt decrypt message. to receiver. a the message. public key private key What services can help with security plans? International Computer Security Association (ICSA) can assist companies and individuals who need help with computer security plans message to be sent decrypted message Sender (Sylvia) (Joan) encrypted message Receiver (Doug) A106 Peter Lo 2002 41 A106 Peter Lo 2002 42 How do Web browsers provide secure data transmission? Many Web browsers use encryption Web site that uses encryption techniques to secure its data is known as secure site Use digital certificates with security protocol Digital certificate Notice that guarantees user or Web site is legitimate Also called publickey certificate Secure Sockets Layer (SSL) Provides private-key encryption of all data that passes between client and server https indicates secure connection A106 Peter Lo 2002 43 A106 Peter Lo 2002 44

Pretty Good Privacy (PGP) One of most popular e-mail digital encryption programs Freeware for personal, non-commercial users Uses public-key encryption scheme Digital signature Encrypted code that person, Web site, or company attaches to electronic message to verify identity of message sender Code usually consists of user's name and hash of all or part of message Hash Mathematical formula that generates code from contents of message A106 Peter Lo 2002 45 A106 Peter Lo 2002 46 Personal firewall Software program that detects and protects personal computer and its data from unauthorized intrusions Constantly monitors all transmissions to and from computer Informs you of any attempted intrusions What is another way to protect your personal computer? Disable File and Print Sharing on Internet connection Online security service Web site that evaluates computer to check for Web and e-mail vulnerabilities A106 Peter Lo 2002 47 A106 Peter Lo 2002 48

What are ways to safeguard personal information? What are ways to safeguard personal information? A106 Peter Lo 2002 49 (continued) A106 Peter Lo 2002 50 Electronic profile Data collected every time you fill out form or click advertisement on Web Merchants sell sell the contents of their databases to national marketing firms and Internet advertising firms Data combined with information from public sources Marketing firms sell your electronic profile to any company that requests it A106 Peter Lo 2002 51 Cookie Small file that Web server stores on your computer Typically contains data about you Web site can read data only from its own cookie file Some Web sites sell or trade information stored in your cookie to advertisers Track user preferences Track how regularly you visit site and Web pages you visit when at site Target advertisements to your interests and browsing habits A106 Peter Lo 2002 52

How can cookies track user preferences? Personal Personal information information you you enter enter in in form form is is converted converted to to codes, codes, which which are are stored stored in in cookie cookie on on your your hard hard disk disk How can you set your browser to control cookies? Set browser to accept cookies automatically, or prompt you if you wish to accept cookie, or disable cookie use Many Web sites do not allow you to access features if you disable cookie use Cookie for for MSNBC saved saved in in Cookies folder folder on on hard hard disk disk A106 Peter Lo 2002 53 A106 Peter Lo 2002 54 Cookie manager Software program that selectively blocks cookies Computing Issues Part III: Current issues and Controversies A106 Peter Lo 2002 55 A106 Peter Lo 2002 56

Information privacy Right of individuals and companies to deny or restrict collection and use of information about them More difficult to maintain today because huge databases store this data in online databases What privacy laws have been enacted? Many federal and state laws regarding storage and disclosure of personal data, such as: Is data about an individual really private? Child Online Protection Law Should employers Computer Abuse monitor your Penalizes those who computer usage Amendments Law distribute material and e-mail Outlaws viruses A106 Peter Lo 2002 57 A106 Peter Lo 2002 58 messages?? deemed harmful to children What is employee monitoring? Spyware Using computers to observe employee s computer use, including e-mail, keyboard activity, and Web sites visited Legal for employers to use monitoring software programs Privacy for Consumers and Workers Act Proposed law that employers monitoring electronic communications must notify A106 Peter Lo 2002 employees 59 Program placed on computer without user's knowledge Secretly collects information about user Can enter computer as virus or as a result of installing new program Adware Spyware used by Internet advertising firms to collect information about user s Web browsing habits A106 Peter Lo 2002 60

How can you control spam? E-mail filtering Service that blocks e-mail messages from designated sources Collects spam in central location that you can view any time Anti-spam program Attempts to remove spam Sometimes removes valid A106 Peter Lo 2002 e-mail messages 61 One of the most controversial issues surrounding the Internet Availability of objectionable material such as racist literature and obscene pictures The 1996 Communications Decency Act Made it a criminal offense to distribute indecent or patently offensive material online Declared unconstitutional in June 1997 by Supreme Court A106 Peter Lo 2002 62 Filtering software Can restrict access to specified Web sites Some filter sites use specific words Others filter e-mail messages and chat rooms Computing Issues Part IV: Emerging Technologies A106 Peter Lo 2002 63 A106 Peter Lo 2002 64

Tomorrow Hardware: Faster, Cheaper, Connected Moore s Law Computers double in power roughly every 18 months, but cost half as much. Metcalfe s Law A Network s social and economic value increases steeply as more people connect to it. Artificial Intelligence Application of human intelligence to computers Can sense actions and, based on logical assumptions and prior experience, take appropriate action to complete task smart software Software with built-in intelligence A106 Peter Lo 2002 65 A106 Peter Lo 2002 66 Voice Recognition The computer s capability of distinguishing spoken words Step 1: 2: 3: 4: 5: 6: Say, Say, Voice Say, Forty Dictation Algerian Green Command Say, Eight Font. to and instruct then to then instruct say, say, the the program program you Font you will End. will Color. be Size. dictating. be issuing Say, commands. Car for Say, sale. Center. References Computers in Your Future (Ch. 10) Introduction to Computing (Ch. 10 12) Discovering Computers World 2003 (Ch. 3, 12) A106 Peter Lo 2002 67 A106 Peter Lo 2002 68