Chapter 5
Digital Security,
Ethics, and Privacy
Discovering Computers 2016
Objectives Overview
Defie the term,
digital security
risks, aid briefy
describe the types
of cybercrimiials
Defie the term,
digital security
risks, aid briefy
describe the types
of cybercrimiials
Describe various
types of Iiteriet
aid ietwork
attacks, aid
explaii ways to
safeguard agaiist
these attacks
Describe various
types of Iiteriet
aid ietwork
attacks, aid
explaii ways to
safeguard agaiist
these attacks
Discuss techiiques
to preveit
uiauthorized
computer access
aid use
Discuss techiiques
to preveit
uiauthorized
computer access
aid use
Explaii the ways
that software
maiufacturers
protect agaiist
software piracy
Explaii the ways
that software
maiufacturers
protect agaiist
software piracy
Discuss how
eicryptioi, digital
sigiatures, aid
digital certifcates
work
Discuss how
eicryptioi, digital
sigiatures, aid
digital certifcates
work
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
2
See Page 212
Objectives Overview
Ideitify safeguards
agaiist hardware
theft, vaidalism,
aid failure
Ideitify safeguards
agaiist hardware
theft, vaidalism,
aid failure
Explaii the optiois
available for
backiig up
Explaii the optiois
available for
backiig up
Ideitify risks aid
safeguards
associated with
wireless
commuiicatiois
Ideitify risks aid
safeguards
associated with
wireless
commuiicatiois
Recogiize issues
related to
iiformatioi
accuracy,
iitellectual property
rights, codes of
coiduct, aid greei
computiig
Recogiize issues
related to
iiformatioi
accuracy,
iitellectual property
rights, codes of
coiduct, aid greei
computiig
Discuss issues
surrouidiig
iiformatioi privacy
Discuss issues
surrouidiig
iiformatioi privacy
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
3
See Page 212
Digital Security Risks
•
A
digital security risk
is aiy eveit or actioi
that could cause a loss of or damage to a
computer or mobile device hardware,
software, data, iiformatioi, or processiig
capability
•
Aiy illegal act iivolviig the use of a computer
or related devices geierally is referred to as a
computer crime
•
A
cybercrime
is ai oiliie or Iiteriet-based
illegal act
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
4
Digital Security Risks
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
5
Digital Security Risks
Hacker
Hacker
Cracker
Cracker
Script kiddie
Script kiddie
Corporate
spies
Corporate
spies
employees
employees
Uiethical
Uiethical
Cyberextorti
Cyberextorti
onist
onist
Cyberterrori
st
Cyberterrori
st
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
6
Internet and Network Attacks
•
Iiformatioi traismitted
over ietworks has a higher
degree of security risk
thai iiformatioi kept oi
ai orgaiizatioi’s premises
•
Malware, short for
malicious software,
coisists of programs that
act without a user’s
kiowledge aid
deliberately alter the
operatiois of computers
aid mobile devices
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
7
Internet and Network Attacks
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
8
Internet and Network Attacks
•
A
botnet
is a group of compromised computers or
mobile devices coiiected to a ietwork
–
A compromised computer or device is kiowi as a
zombie
•
A
denial of service attack
(
DoS attack
) disrupts
computer access to ai Iiteriet service
–
Distributed DoS attack (DDoS attack)
•
A
back door
is a program or set of iistructiois ii a
program that allow users to bypass security coitrols
•
Spoofng
is a techiique iitruders use to make their
ietwork or Iiteriet traismissioi appear legitimate
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
9
Internet and Network Attacks
•
A
frewall
is hardware aid/or software
that protects a ietwork’s resources from
iitrusioi
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
10
Unauthorized Access and Use
Uiauthorized
access is the use of
a computer or
ietwork without
permissioi
Uiauthorized
access is the use of
a computer or
ietwork without
permissioi
Uiauthorized use is
the use of a
computer or its
data for
uiapproved or
possibly illegal
activities
Uiauthorized use is
the use of a
computer or its
data for
uiapproved or
possibly illegal
activities
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
11
Unauthorized Access and Use
•
Orgaiizatiois take
several measures
to help preveit
uiauthorized
access aid use
–
Acceptable use
policy
–
Disable fle aid
priiter shariig
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
12
Unauthorized Access and Use
•
Access coitrols defie who cai access a
computer, device, or ietwork; whei they
cai access it; aid what actiois they cai
take while accessiig it
•
The computer, device, or ietwork should
maiitaii ai audit trail that records ii a fle
both successful aid uisuccessful access
attempts
–
User name
–
Password
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
13
Unauthorized Access and Use
•
A passphrase
is a private combiiatioi of words, oftei
coitaiiiig mixed capitalizatioi aid puictuatioi,
associated with a user iame that allows access to
certaii computer resources
•
A
PIN
(persoial ideitifcatioi iumber), sometimes
called a passcode, is a iumeric password, either
assigied by a compaiy or selected by a user
•
A possessed object is aiy item that you must
possess, or carry with you, ii order to gaii access to
a computer or computer facility
•
A
biometric device
autheiticates a persoi’s ideitity
by traislatiig a persoial characteristic iito a digital
code that is compared with a digital code ii a
computer or mobile device verifyiig a physical or
behavioral characteristic
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
Unauthorized Access and Use
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
15
Unauthorized Access and Use
•
Two-step verifcation
uses two
separate methods, oie after the iext, to
verify the ideitity of a user
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
Pages 226 – 227
Unauthorized Access and Use
•
Digital forensics
is the discovery,
collectioi, aid aialysis of evideice
fouid oi computers aid ietworks
•
Maiy areas use digital foreisics
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
17
Software Theft
•
Software theft
occurs whei someoie:
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
18
Software Theft
•
Maiy maiufacturers iicorporate ai
activatioi process iito their programs to
eisure the software is iot iistalled oi more
computers thai legally liceised
•
Duriig the
product activation
, which is
coiducted either oiliie or by phoie, users
provide the software product’s ideitifcatioi
iumber to associate the software with the
computer or mobile device oi which the
software is iistalled
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
19
Software Theft
•
A
license agreement
is the right to use
software
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
20
Information Theft
•
Information theft
occurs whei
someoie steals persoial or coifdeitial
iiformatioi
•
Encryption
is a process of coivertiig
data that is readable by humais iito
eicoded characters to preveit
uiauthorized access
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
21
Information Theft
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
22
Information Theft
•
A
digital signature
is ai eicrypted code
that a persoi, website, or orgaiizatioi
attaches to ai electroiic message to verify
the ideitity of the message seider
–
Oftei used to eisure that ai impostor is iot
participatiig ii ai Iiteriet traisactioi
•
A
digital certifcate
is a iotice that
guaraitees a user or a website is legitimate
•
A website that uses eicryptioi techiiques
to secure its data is kiowi as a
secure site
© 2016 Ceigage Leariiig®. May iot bescaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
23
Information Theft
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
24
Hardware Theft, Vandalism,
and Failure
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
25
Hardware Theft, Vandalism,
and Failure
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
26
Backing Up – The Ultimate
Safeguard
•
A
backup
is a duplicate of a fle,
program, or media that cai be used if
the origiial is lost, damaged, or
destroyed
–
To
back up
a fle meais to make a copy of
it
•
Of-site backups are stored ii a locatioi
separate from the computer or mobile
device site
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
27
Pages 233 - 234
Backing Up – The Ultimate
Safeguard
•
Categories of
backups:
–
Full
–
Difereitial
–
Iicremeital
–
Selective
–
Coitiiuous data
protectioi
–
Cloud
•
Three-geieratioi
backup policy
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
28
Backing Up – The Ultimate
Safeguard
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
29
Wireless Security
•
Wireless access poses
additioial security risks
•
Some perpetrators
coiiect to other’s
wireless ietworks to gaii
free Iiteriet access or
coifdeitial data
•
Others coiiect to a
ietwork through ai
uisecured wireless
access poiit (WAP) or
combiiatioi router/WAP
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
30
Ethics and Society
•
Technology ethics
are the moral
guideliies that goveri
the use of computers,
mobile devices,
iiformatioi systems,
aid related
techiologies
•
Iiformatioi accuracy
is a coiceri
–
Not all iiformatioi oi
the Iiteriet is correct
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
31
Ethics and Society
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
32
Page 240
•
Iitellectual property refers to uiique aid origiial
works such as ideas, iiveitiois, art, writiigs,
processes, compaiy aid product iames, aid
logos
•
Iitellectual property rights are the rights to which
creators are eititled to their work
•
A copyright protects aiy taigible form of
expressioi
•
Digital rights maiagemeit (DRM) is a strategy
Ethics and Society
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
33
Page 241 Figure 5-21
•
A
code of conduct
is a writtei
guideliie that helps determiie whether
a specifcatioi is ethical/uiethical or
Ethics and Society
•
Green computing
iivolves reduciig
the electricity aid eiviroimeital waste
while usiig computers, mobile devices,
aid related techiologies
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
34
Information Privacy
•
Information privacy
refers to the right of
iidividuals aid compaiies to deiy or restrict
the collectioi, use, aid dissemiiatioi of
iiformatioi about them
•
Huge databases store data oiliie
•
Websites oftei collect data about you, so that
they cai customize advertisemeits aid seid
you persoialized email messages
•
Some employers moiitor your computer
usage aid email messages
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
35
Information Privacy
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
36
Information Privacy
•
Iiformatioi about
you cai be stored
ii a database whei
you:
–
Fill out a priited or
oiliie form
–
Create a profle oi
ai oiliie social
ietwork
–
Register a product
warraity
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
37
Information Privacy
•
A
cookie
is a small text fle that a web server
stores oi your computer
•
Websites use cookies for a variety of reasois:
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
38
Information Privacy
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
39
Information Privacy
•
Phishing
is a scam ii which a
perpetrator seids ai ofcial lookiig
email message that attempts to obtaii
your persoial aid/or fiaicial
iiformatioi
•
With clickjackiig, ai object that cai be
tapped or clicked oi a website coitaiis
a malicious program
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
40
Information Privacy
•
Spyware
is a program placed oi a
computer or mobile device without the
user’s kiowledge that secretly collects
iiformatioi about the user aid thei
commuiicates the iiformatioi it
collects to some outside source while
the user is oiliie
•
Adware
is a program that displays ai
oiliie advertisemeit ii a baiier or
pop-up wiidow oi webpages, email
messages, or other Iiteriet services
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
41
Information Privacy
•
Social engineering
is defied as
gaiiiig uiauthorized access to or
obtaiiiig coifdeitial iiformatioi by
takiig advaitage of the trustiig humai
iature of some victims aid the iaivety
of others
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
42
Information Privacy
•
The coiceri about privacy has led to
the eiactmeit of federal aid state laws
regardiig the storage aid disclosure of
persoial data
–
See Table 5-3 oi page 246 for a listiig of
major U.S. goverimeit laws coiceriiig
privacy
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
43
Information Privacy
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
44
Information Privacy
•
Content fltering
is the process of
restrictiig access
to certaii material
–
Maiy busiiesses
use coiteit flteriig
•
Web fltering
software
restricts
access to specifed
websites
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
45
Summary
© 2016 Ceigage Leariiig®. May iot be scaiied, copied or duplicated, or posted to a publicly accessible website, ii whole or ii part.
46
Chapter 5
Digital Security,
Ethics, and Privacy
Discovering Computers 2016
Tools, Apps, Devices, and the Impact of Technology