chapter 11 – section 4-5. techniques use to access the network war driving or access point...

22
Computer Security and Safety, Ethics and Privacy Chapter 11 – Section 4-5

Upload: ami-waters

Post on 16-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Computer Security and Safety, Ethics and Privacy

Chapter 11 – Section 4-5

Wireless Security

Techniques use to Access the network War Driving or access point mapping▪ Individuals attempt to detect wireless

network via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network

War Flying▪ Use airplanes instead of vehicle to detect

unsecured wireless network

Wireless Security

How can I ensure my wireless communication is secure?

Firewalls Secure your wireless access point (WAP) WiFi Protected Access (WPA)

Authenticate network users and provide advanced encryption techniques

802.11i (WPAs)Conforms to the government security standards and

uses more sophisticated encryption techniques the WPA

Health Concerns of Computer Use

What are some health concerns of computer use?

Computer vision syndrome (CVS) eye and vision

problems

Computer addiction-when computer consume entire

social

Tendonitis – inflammation of a

tendon due to repeated motion

Carpal tunnel syndrome – inflammation of the nerve that connects the forearm

to the palm

Repetitive strain injury (RSI) Injury or disorder of the muscles, nerves, tendons, ligaments, and

joints

Health Concerns of Computer Use

What precautions can prevent tendonitis or carpal tunnel syndrome? Spread fingers apart for several seconds

while keeping wrist straight Gently push back fingers and then

thumb Dangle arms loosely at sides and shake

arms and hands

Ergonomics and Workplace Design

What is Ergonomics?An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Ethics and Society

What are computer ethics?

Moral guidelines that govern use of computers and information systems

Unauthorized use of

computer &Networks

Intellectual property

rights

Codes of conduct

Information privacy

Information accuracy

Software theft(piracy)

Green Computing

Ethics and Society

What is information accuracy?

Accuracy of computer input Altering photo

National Press Photographer Association oppose

Ethics and Society

What are intellectual Property (IP) and Intellectual property rights? Intellectual Property▪ Refer to unique & original work such as ideas,

inventions, art, writing, processes, company and product name and logos.

Intellectual Property Rights▪ The rights to which creators are entitled for

their work

Ethics and Society

What is an IT code of conduct? Written guideline

that helps determine whether computer action is ethical

Employers can distribute to employees

IT Code of Conduct1. Computer may not be used to

harm other people.2. Employee may not interfere with

other’s computer work.3. Employees my not meddle in

other’s computer files.4. Computers may not be used to

steal5. .Computers may not be used to

bear false witness.6. Employees may not copy or use

software illegally.7. Employees may not use others’

computer resources without authorization

8. Employees may not use others’ intellectual property as their own.

9. Employees shall consider the social impact of program and systems they design.

10. Employees always should use computers in a way that demonstrates and respect for fellow humans.

Ethics and Society

What is Green Computing? Involves reducing the electricity and

environmental waste while using a computer.

ENERGY STAR program▪ Develop by US Department of Energy and US

Environmental Protection Agency (EPA)▪ Help reduce the amount of electricity used by

computer and related devices

Information Privacy – Section 5

What is Information Privacy? Right of individual and companies to

deny or restrict the collection and use of information about them

Difficult to maintain today because data is stored online

Information Privacy

What is an electronic profile? Data collected when you fill out forms on

the Web Merchant sell your electronic profile Often you can specify whether you want

personal information distributed

Information Privacy

What is a Cookie?

Small text file on your

computer that contains data

about you

Set browser to accept cookies, prompt you to accept cookies

or disable cookies

Some Web sites sell or

trade information

stored on your cookie

User Preferenc

es

How regularly you visit Web site

Interest and

browsing habits

Information Privacy

What is Spam? Unsolicited e-mail message or

newsgroup, posting sent to many recipients or newsgroups at once.

Internet Junk mail

Information Privacy

How can you control spam?

E-mail filtering

Anti-spam program

Service that blocks email messages

from designated

source

Attempts to

remove spam

Collects spam in central

location that you can

view anytime

Sometimes removes

valid email messages

Information Privacy

What is Phishing and Pharming?

Phishing Scam in which a

perpetrator sends an official looking email

message that attempts to obtain your personal

and financial information

PharmingSimilar as phishing but

they attempts to obtain your personal

and financial information through

spoofing

Information Privacy

What are Spyware and Adware?

Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user

Adware is a program that displays an online advertisement

Information Privacy

Some Privacy laws that have been enacted

1970 Fair Credit Reporting Act Limits the right of other viewing a credit report to only

those with a legitimate business need. 1984 Computer Fraud and Abuse Act

Outlaws unauthorized access of federal government computers

1998 Children’s Online Privacy Protection Act (COPPA) Requires Web sites protect personal information of children

under 13 years of age

Information Privacy

What is Social Engineering?

Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and naivety of other

Information Privacy

What is Employee Monitoring?

Involves the use of computers to observe, record, and review an employee’s use of a computer

Information Privacy

What is content filtering? Process of restricting access to

certain material Internet Content Rating Association (ICRA)

provides rating system of Web content Web filtering software restricts access to

specific sites