Computers Are Your Future Privacy, Crime, in addition to Security Objectives Objectives

Computers Are Your Future Privacy, Crime, in addition to Security Objectives Objectives www.phwiki.com

Computers Are Your Future Privacy, Crime, in addition to Security Objectives Objectives

Michaels, Jay, Late Night Host has reference to this Academic Journal, PHwiki organized this Journal Computers Are Your Future Eleventh EditionChapter 9: Privacy, Crime, in addition to SecurityCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall12All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any as long as m or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallPrivacy, Crime, in addition to SecurityCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall3

Wolkite University ET www.phwiki.com

This Particular University is Related to this Particular Journal

Objectives Underst in addition to how technological developments are eroding privacy in addition to anonymity.List the types of computer crime in addition to cybercrime.List the types of computer criminals.Underst in addition to computer system security risks.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall4Objectives Describe how to protect your computer system in addition to yourself.Define encryption in addition to explain how it makes online in as long as mation secure.Describe the issues the government faces when balancing the need to access encrypted data in addition to the public’s right to privacy.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall5Privacy in CyberspacePrivacy is an individual’s ability to eliminate the collection, use, in addition to sale of confidential personal in as long as mation.Maintaining anonymity—the means to communicate without disclosing one’s identity—is more difficult with the use of computers in addition to the Internet.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall6

Privacy in CyberspaceTechnologies that jeopardize online anonymity include:CookiesGlobal unique identifiersUbiquitous computingRadio frequency identificationCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall7Privacy in CyberspaceCookies are small files written to your hard disk by the Web sites you visit. They can: Track your browsing habitsGather personal in as long as mation without your consentCan be disabledCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall8Privacy in CyberspaceA global unique identifer (GUID) is an identification number produced by software or a piece of hardware.Web servers can read the GUID.Users are not always aware of the GUID.If used, companies allow users to opt out.Civil liberties groups in addition to public concern have decreased the use of GUIDs.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall9

Privacy in CyberspaceInteracting with multiple networked devices is called ubiquitous computing.An example is the adjustment of heat or light in an environment based on signals sent by monitors built into clothing.An active badge can transmit infrared signals to create an electronic trail.Current devices such as smartphones hold private in as long as mation that can be exploited if the device is lost or stolen.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall10Privacy in CyberspaceRadio frequency identification (RFID) uses radio waves to track a chip or tag. Used as long as inventory control in storesRecognizes microchips in petsMay compromise anonymity in addition to privacy if in as long as mation stored on RFID tags attached to U.S. passports is misusedCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall11Privacy in CyberspaceCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall12

Privacy in CyberspacePrivacy advocates agree that citizens have the right to:Be in as long as med when in as long as mation about them is being collectedGive or deny consent to have their in as long as mation collectedLegislation currently in place includes:Fair Credit Reporting ActHealth Insurance Portability in addition to Privacy ActFamily Education Rights in addition to Privacy ActCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall13Privacy in CyberspaceProtecting privacy onlineUse products such as Anonymous Surfing or IronKey Secure USB flash.Use free Web-based e-mail addresses in chat rooms in addition to as long as mailing lists.Tell children not give out personal in as long as mation.Complete as long as ms only if you see a privacy statement.Turn off cookies.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall14Privacy in CyberspaceCreate logins in addition to passwords as long as each person using the computer.Do not save account numbers or passwords.Close a secured account site when you are not at a computer.Do not leave cell phones in public places.Turn off services not in use, especially Bluetooth.Verify that devices have secure configurations.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall15Protecting privacy at home

Privacy in CyberspaceProtecting privacy at workRefrain from making personal calls on a work phone.Avoid using a company e-mail account as long as personal purposes.Assume that your actions at work are being monitored.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16Privacy in CyberspaceCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall17Computer Crime & CybercrimeComputer-based activities that violate the law are known as computer crimes.Cybercrimes are crimes perpetrated through the Internet.Cyberlaw is the area of law dedicated to computer crime.Many Web sites educate users about cybercrime in addition to cybercriminals.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall18

Computer Crime & CybercrimeCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall19Computer Crime & CybercrimeTypes of computer crimeIdentify theft is when a criminal gains access to personal in as long as mation in order to impersonate someone. Criminals sometime use phishing attacks—legitimate-looking e-mails or Web sites created in an attempt to obtain confidential data about a person.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall20Computer Crime & CybercrimeTypes of computer crimeMalware (short as long as malicious software) refers to programs that intentionally harm a computer system or allow individuals to gain access to it without the owner’s permission. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall21

Computer Crime & CybercrimeTypes of computer crimeSpyware is software that gathers private in as long as mation in addition to tracks Web use in addition to then provides that in as long as mation to third parties.Adware is a as long as m of spyware that generates annoying pop-up in addition to banner adsKeyloggers record keystrokes to provide cybercriminals with confidential dataCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall22Computer Crime & CybercrimeTypes of computer crimeA computer virus is code concealed inside a program that can harm or destroy files.Many are spread through e-mail attachments.File infectors attach themselves to files.Boot sector viruses execute each time you start the computer.Macro viruses attach to data files in addition to take advantage of application macros.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall23Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall24Computer Crime & Cybercrime

Michaels, Jay WZZK-FM Late Night Host www.phwiki.com

More rogue programsA time bomb is a virus program that remains dormant on a computer system until it is activated by a specific event.A worm is similar to a virus but does not need the action of a user to execute the code in addition to cause damage.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall25Computer Crime & CybercrimeMore rogue programsA denial of service (DoS) attack assaults an Internet server with so many requests that it cannot function.A Trojan horse is a normal-looking program that includes concealed instructions created to cause harm.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall26Computer Crime & CybercrimeComputer Crime & CybercrimeFraud, Theft, in addition to PiracyMemory shavingSoftware piracyCybergaming CrimeTricks as long as Obtaining PasswordsSalami Shaving in addition to Data DiddlingForgeryCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall27

Computer Crime & CybercrimeHackersCybergangsCrackersVirus authorsSwindlersShillsCyberstalkersSexual predatorsCyberbulliesCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall28Types of computer criminalsComputer Crime & CybercrimeCyberstalkers Use the Internet, social networking sites, in addition to e-mail to harass or threaten an individual.Most perpetrators are men.Most victims are college-age women.Cyberbullies Send threatening messages via e-mail or text message.Usually involves minors. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall29SecurityComputer security riskAny intentional or unintentional action that results in damaging a computer system or its dataIncreased by wireless LANs because transmissions occur over shared airwaves instead of dedicated linesCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall30

Computer criminals, such as crackers, cybergang members, in addition to virus authors, are often the cause of the increase in computer security risks.Security risks are events, actions, in addition to situations that could lead to losses. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall43SummarySummaryAlthough no computer system can be totally safe, you can take simple steps to protect your computer in addition to data.Encryption can be used to guard privacy online through public key encryption.The government must keep trying to find a balance between its need to know in addition to the privacy rights of individuals.Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall44

Michaels, Jay Late Night Host

Michaels, Jay is from United States and they belong to WZZK-FM and they are from  Birmingham, United States got related to this Particular Journal. and Michaels, Jay deal with the subjects like Country Music

Journal Ratings by Wolkite University

This Particular Journal got reviewed and rated by Wolkite University and short form of this particular Institution is ET and gave this Journal an Excellent Rating.