Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 9: SECURITY, PRIVACY, ETHICS AND ERGONOMIC, Security
Involves…
CHAPTER 9: SECURITY, PRIVACY, ETHICS AND ERGONOMIC
Security
- Involves protecting individuals or organizations from theft and danger
i. Hackers
ii. Criminal offense that involves a computer and a network
-
c) Cyber crime
- Denial of service
- Rogue Wi-FI hotspots
- Data manipulation
e) Types of Internet scams
- Chain letter
- Auction fraud
- Vacation prize
- Advance fee loans
d) Internet scams
- Identify theft
- Cyber bullying
- Phishing
h) Automated security tasks
- Security suites
- Firewalls
- Password managers
g) Restricting access
- Biometric scanning
- Passwords
f) Measures to protect computer security
- Restricting access
- Anticipating disasters
- Preventing data loss
i) Encryption
- E-mail encryption protects emails
- File encryption protects files
- Web site encryption uses HTTPS protocol for protection
- Virtual private networks (VPNs)
- Wireless network encryption restricts access to authorized users
j) Anticipating disasters
- Anticipating disasters
- Preventing data loss
a) Forms of computer crime
- Malicious program
- DoS
- Rogue Wi-Fi hotspots
- Data manipulation
- Identity theft
- Internet scams
- Cyberbullying
Privacy
Concerns the collection and use of data about individuals.
a) Large databases
- Big Data is exploding and ever-growing
- Data collectors include
- Information Resellers/Brokers
- Personal information is a marketable commodity
- Freedom of Information act
b) Privacy networks
- Employers can monitor e-mail legally
c) The internet and the Web - Illusion of ananonymity
- Critical information is stored on the hard drive
d) History files and temporary internet files
- History files
- Temporary internet files/browser cache
e) Cookies
- Cookies are small data files that are deposited on your hard disk from web sites you have visited.
h) Online identity
- The information that people voluntarily post about themselves online/
f) Privacy modes
- Incognito mode
- Private browsing
g) Privacy threats
- Web bugs
- Spyware
- Computer monitoring software
- Anti-Spyware programs
i) Making IT work for you
- Cloud-based backup services such as Carbonite provide cloud-based backup services
Ergonomics
Ergonomic is an applied science devoted to incorporating comfort , efficiency and safety into the design of items in the design of items in the workplace
a) Health concerns of computer use i. The wide spread use of computers has led to health concerns:
- Repetitive strain injury (RSI)
- Computer vision syndrome (CV)
ii. Computer addiction occurs when the computer consumes someone's entire life social life:
- Crave computers
- Overjoyed when at the computer
- Unable to stop computer activity
- Irritable when not at the computer
- Neglects family and friends
- Problems at work and school
b) Careers in IT
- IT Security Analysts maintain the security of a company's network, systems and data
- Bachelors or associates degree in information systems or computer science
- Must safeguard information systems against external threats
- Annual salary is usually from $62,000 to $101,000
- Demand for this position is expected to grow
c) A look to the future ~ The end of anonymity i. Some use this for abusive and threatening comments:
- Online harassment
- Cyberbullying
- Stalking
- Damaging reputations
Ethics
- Standard of moral conduct
a) i. Copyright
- Gives content creators the right to control the use and distribution of their work.
- Painting, books, music, films, video games
ii. Software piracy
- Unauthorized copying and distribution of software
b) Plagiarism
- Representing some other person’s work and ideas as your own without giving credit to the original person’s work and ideas