Friday, April 15, 2011

CHAPTER 10 - PRIVACY AND SECURITY

      SUMMARY CHAPTER 10
PRIVACY
  • Ethics as you may know are standards of moral conduct. 
  • Computer ethics are guidelines for the morally acceptable use of computers in our society.
  • There are 4 primary computer ethics issues :
  1. Privacy - concerns the collection and use of data about individuals. 
  2. Accuracy - relates to the responsibility of those who collect data to ensure that the data is correct.
  3. Property - relates to who owns data and rights to software. 
  4. Access - relates to the responsibility of those who have data to control and who is able to use that data. 
LARGE DATABASES
  • Large organizations are constantly compiling information about us. 
  • A special telephone directory, called a reverse directory list telephone numbers followed by subscriber names. 
  • A vast industry of data gatherers known as information resellers or information brokers collect and sell personal data. 
  • Information resellers create electronic profiles to compiled from databases to provide highly detailed and personalized descriptions of individuals. 
  • This raises many issues, including : 
  1. Spreading information without personal consent - identify theft is the illegal assumption of someones identify for the purposes of economic gain. 
  2. Spreading inaccurate information - mistaken identify occurs when an electronic profile of one person is switched with an other. 
  3. The Freedom of Information Act entitles individuals access to governmental records relating to them. 
Private Networks
  • Many organizations monitor employee e-mail and computer files using special software called snoopware.
  • Snoopware program record virtually everything you do on your computer
The Internet and The Web
  • Many people belief that while using the Web, as long as they are selective about disclosing their name and other personal information, little can be done to invade their privacy, this called the illusion of anonymity. 
  • History files record locations of sites visited by a computer systems. 
  • Cookies store and track information for Web Sites. 
  • Two basics types of cookies are : 
  1. Traditional cookies - provide information to a single site. 
  2. Ad network@ adware cookies - record your activities across different sites. 
  • The term spyware described a wide range of programs designed to secretly record and report an individuals activities on the Internet. 
  •  Three types of spyware is : 
  1. Ad network cookies
  2. Web bugs - provide information back to spammers about activity on your e-mail account. 
  3. Computer monitoring software - record every activity and keystroke made on your computer system, including credit card numbers, bank account numbers and e-mail messages. 
  • Antispyware @ spy removal programs detect Web bugs and monitoring software. 
Major Laws on Privacy
  • There are numerous federal laws governing privacy matters. 
  • The Gramm-Leach-Bliley Act protects personal financial information. 
  • Privacy remains primarily an ethical issue. 
SECURITY
  • We are concerned with having a safe and secure environment to live in. 
Computer Criminals 
  • is an illegal action in which the perpetrator uses special knowledge of computer technology.
  • They are included : 
  1. Employees - the largest category of computer criminals consists of those with the easiest access to computers. 
  2. Outside users - some suppliers or clients may have access to a company's computer systems. Example are bank customers who use an automated teller machine. 
  3. Hackers and Crackers - Hackers create or improve programs and share those programs with fellow hackers, typically are not criminals. While, crackers share programs designed to gain unauthorized access to computer systems, typically are criminals. 
  4. Organized crime - example computers are useful for keeping track of stolen goods or illegal gambling debts. 
  5. Terrorists - knowledgeable terrorist groups and hostile government could potentially crash satellites and wage economic warfare by disrupting navigation and communications systems. 
Computer Crime
  • can take various forms including : 
  1. Malicious programs @ malware - include viruses ( the Computer Fraud and Abuse Act makes spreading a virus a federal offense) , worms ( self-replicate across a network) , Trojan horses ( enter a computer system disguised as something else). Antivirus programs alert users when certain viruses and worms enter their systems. 
  2. Denial of service attack (DoS) - is an attempt to shut down or stop a computer system or network. Servers under attack are unable to respond to legitimate users. 
  3. Internet scams - fraudulent or deceptive acts or operations designed to trick individuals into spending their time and money with little or no return. Common internet scams include identify theft, chain letters, auction fraud, vacation prizes, and advance fee loans. These are frequently coupled with punishing Web sites or e-mails. 
  4. Theft - takes many forms including stealing hardware, software, data, and computer time. Unauthorized copying of program is called software privacy and is protected by the Digital Millennium Copyright Act.   
  5. Data Manipulation - involves changing data or leaving prank messages. The Computer Fraud and Abuse Act helps protect against data manipulation. 
  6. Other hazards - include natural disasters, civil strifeterrorismtechnological failures (surge protectors protect against voltage surges or spikes) , and human error
MEASURES TO PROTECT COMPUTER SECURITY
  • Security is concerned with keeping hardware, software, data, and programs safe from unauthorized personnel and unforeseen events. 
  • Some measures are encryptingrestricting access by using biometric scanning devices, passwords, and data firewalls; anticipating disasters (physical and data security, disaster recovery plans); and backing up data. 
ERGONOMICS
  • Is the study of human factors related to things people use, including computer. 
Physical Health
  • Physical health problems and their solutions include : 
  1. Eyestrain and headache - take frequent breaks, avoid glare on the monitor. 
  2. Back and neck pains - use adjustable chairs, tables, monitor stands, and footrests. 
  3. Repetitive strain injury (RSI, repetitive motion injury, cumulative trama disorder)  includes carpal tunnel syndrome - take frequent breaks, use good posture, adopt healthy lifestyle, use ergonomic keyboards. 
Mental Health
  • Counterproductive mental irritations include : 
  1. Noise from clattering printers and high frequency squeals from computers. 
  2. Stress from electronic monitoring. 
  • Unnatural adaption to computers can cause techno stress.

Citation :
  • COMPUTING ESSENTIALS Complete 2010


No comments:

Post a Comment