Chapter 11 (Computer Security and Safety, Ethics, and Privacy)
Chapter 11 (Computer Security and Safety, Ethics, and Privacy)
Unethical
Cyberextortionists Cyberterrorists
Employees
Computer
Worm Trojan Horse Rootkit
Virus
• Affects a • Copies itself • A malicious • Program that
computer repeatedly, program that hides in a
negatively by using up hides within computer
altering the resources or looks like and allows
way the and possibly a legitimate someone
computer shutting program from a
works down the remote
computer or location to
network take full
control
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
– Firewalls
– Intrusion detection
software
Information
Insurance
security
agencies
departments
Page 569 Discovering Computers 2011: Living in a Digital World 17
Chapter 11
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
Illegally
Illegally copies a registers and/or
program activates a
program
Page 571 Discovering Computers 2011: Living in a Digital World 20
Chapter 11
Software Theft
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
Page 571 Discovering Computers 2011: Living in a Digital World 21
Chapter 11
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully
Click to view Web Link,
click Chapter 11, Click Web
Link from left navigation,
then click Business Software
Alliance below Chapter 11
Parent
Child
Configure a WAP
so that only Use WPA or WPA2
certain devices can security standards
access it
Page 578 Discovering Computers 2011: Living in a Digital World 32
Chapter 11
Health Concerns of Computer Use
• Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
Assist with
Allow for Store users’
online
personalization passwords
shopping
Track how
Target
Click to view Web Link, often users
click Chapter 11, Click Web advertisements
Link from left navigation,
then click Cookies
visit a site
below Chapter 11
• Spam is an unsolicited
e-mail message or
newsgroup posting
• E-mail filtering blocks
e-mail messages from
designated sources
• Anti-spam programs
attempt to remove
spam before it reaches
your inbox