Computing Essentials Chapter10.ppt
《Computing Essentials Chapter10.ppt》由会员分享,可在线阅读,更多相关《Computing Essentials Chapter10.ppt(29页珍藏版)》请在得力文库 - 分享文档赚钱的网站上搜索。
1、McGraw-Hill/IrwinCopyright 2008 by The McGraw-Hill Companies,Inc.All rights reserved.Chapter 10Privacy and Security10-2Competencies(Page 1 of 2)Discuss the privacy issues related to the presence of large databases,private networks,the Internet,and the WebDescribe and control cookies,web bugs,and spy
2、wareDescribe the security threats posed by computer crime,and other hazardsPage 28210-3Competencies(Page 2 of 2)Discuss ways that individuals and organizations protect their securityDescribe the common types of physical and mental risks associated with computer use and ways to protect yourself again
3、st these risksDiscuss what the computer industry is doing,and what you can do,to protect the environment Page 28210-4IntroductionThe ubiquitous use of computers and technology prompts some very important questions about use of personal data and privacy.This chapter will cover issues related to the i
4、mpact of technology on people and how to protect ourselves on the Web.Page 28310-5Information Systems Concerns for PeoplePrivacy What are the threats to personal privacy and how can we protect our selves?Security How can access to sensitive information be controlled and how can we secure hardware an
5、d software?Ergonomics What are the physical and mental risks to technology and how can these risks be eliminated or controlled?Environment What can individuals and organizations do to minimize the impact of technology?Page 28310-6Computer Ethics and PrivacyPrivacy relates to the collection and use o
6、f personal information;concerns include:Large databasesPrivate networksInternet/WebPrivacy laws exist,but privacy remains primarily an ethical issueComputer ethics provide guidelines for computer use Ethics issues include:PrivacyAccuracyPropertyAccessPage 28410-7Large DatabasesData collected dailyDa
7、ta gatherersInformation resellers or information brokersElectronic profiles are createdConcerns Spreading information without consentIdentify theftSpreading inaccurate informationMistaken identityFreedom of Information ActPage 284Return10-8Private NetworksEmployers monitor e-mailLegally done Snoopwa
8、re SoftwareOnline services right to censor contentScreen and reject messagesTerminate user accounts Page 286Return10-9The Internet and the WebIllusion of anonymityNot concerned about privacy when surfing the InternetNot concerned about privacy when sending e-mailHistory fileCookies two basic typesTr
9、aditional Ad network or adware cookiesCookie-cutter programsSpywareSpy removal programsFinancial Modernization ActPage 286Return10-10Viewing History FilesPage 28710-11Viewing and Blocking CookiesPage 28710-12Spyware RemovalAnti-Spyware is used for:Finding and removing spywareAutomating spyware remov
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Computing Essentials Chapter10
限制150内