Ethics, Privacy, and Security TEAP 1313- Office Application
Yvonne Hernandez
1
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Table of Contents Privacy
3
Online Identity and the major privacy laws
4
Security
5
Computer Crimes
5
Virus
6
Worm
6
Trojan Horses
7
Protecting security
7
Ethics
8
Copyright
8
Plagiarism
9
Resources
10
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Privacy What are the threats to personal privacy and how can we protect ourselves? Privacy relates to the collection and use of personal information. Privacy laws exist, but privacy remains primarily an ethical issue. Large organizations are constantly compiling information about us. Every day, data is gathered about us and stored in large databases. A vast industry of data gatherers known as information resellers or information brokers now exists that collects and sells such personal data. Using publicly available databases and in many cases nonpublic databases, information resellers create electronic profiles or highly detailed and personalized descriptions of individuals. There generally is little concern about email privacy on the Web due to the illusion of anonymity. Browsers record visited pages and Web sites often employ programs called cookies to record times and pages visited, as well as credit card numbers.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Online Identity and the major privacy laws An online identity, internet internet identity, identity, or internet persona is is a social identity that an Internet user establishes in online communities and websites. It can also be considered as an actively constructed presentation of oneself. An online identity may even be determined by a user's relationship to a certain social group they are a part of online. Regulation online. Regulation or statute statute that protects a person's a person's right right to be left alone, and governs and governs collection, collection, storage, storage, and and release release of his or her financial, medical, financial, medical, and other personal personal information. The difference between online identity and the major privacy laws is that the online they could get all of your information that you post in your profile just for example in Facebook, twitter, and other Web-site. In privacy laws is that no one could give away your personal information to anyone it doesn’t matter if it’s your brother, daughter, parents, or to anyone.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Security In the computer industry, the term security or the phrase computer security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.
Computer Crimes Computer crime is an illegal action involving special knowledge of computer technology. Like traditional crime, cybercrime can take many shapes and can occur nearly anytime or anyplace. Criminals committing cybercrime use a number of methods, depending on their skill-set and their goal.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Every 3 seconds an identity is stolen.
Without security, security, your unprotected PC can become infected within four minutes of connecting to the internet.
Virus A virus A virus is a program that spreads malicious code by copying itself and infecting host computers. Although some viruses are latent, others can corrupt data or impede system performance. system performance. The The term is specific, distinguished by how viruses are distributed (through downloads, email attachments, or removable media such as CDs, DVDs, or USB drives).
Worm A worm is is a self-replicating self-replicating computer program that that penetrates penetrates an an operating operating system with the intent of spreading malicious code. Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email. Worms can also
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trojan Horses A Trojan horse is a type of malware malware designed to provide provide unauthorized, unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator. The term gets its name from the Greek story of the Trojan War, when the Greeks offered the Trojans a peace offering in the form of a large wooden horse.
Protecting security
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
operating system to protect your files, you cannot trust it to encrypt your files at all the right times or to protect the encryption keys properly. Some service can be defined as a temporary reduction in system performance, a system crash requiring manual restart, or a major crash with permanent loss of data. Although reliable operation of the computer is a serious concern in most cases, denial of service has not traditionally been a topic of computer security research.
Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.
Copyright
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
photograph, poem, song, or drawing, it belongs to you and others have to get your permission to use it.
Plagiarism Plagiarism is the illegal and unethical representation of some other person’s work and ideas as your own without giving credit to the original source. As we all should know plagiarism is not allowed in any kind of form. We should be able to understand and get your own credit. We should not get credit on what other person had made and they were just sharing their ideas of report. Is like if your stealing someone’s personal information and they are just giving you some ideas on what they thought or they try to understand.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Resources o
Chapter Book
o
http://web.cecs.pdx.edu/~harry/cs105/slides/Chapter10.pdf
o
httpsoncourse.iu.eduaccess...earynsch.doc
o
http://instructional1.calstatela.edu/dfrankl/curr/ntrs455/ntrs455ch09_not es.html
o
http://en.wikipedia.org/wiki/Online_identity
o
http://www.businessdictionary.com/definition/privacy-law.html
o
http://www.webopedia.com/TERM/S/security.html
o
http://us.norton.com/cybercrime-definition
o
http://www.pctools.com/security-news/what-do-computer-viruses-do/
o
http://www.pctools.com/security-news/what-is-a-computer-worm/
o
http://www.pctools.com/security-news/what-is-a-trojan-virus/
o
http://www.cse.psu.edu/~tjaeger/cse544-s10/papers/gasser_ch1-2.pdf
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
Trusted by over 1 million members
Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions! Start Free Trial Cancel Anytime.
o
http://ronnie05.files.wordpress.com/2010/01/090110-online-identity1.jpg
o
http://www.purevpn.com/blog/wp-content/uploads/2011/09/HITECHTightens-Health-Care-Data-Privacy-Laws.gif
o
http://www.ago.state.ms.us/wp-content/uploads/2013/08/Cyber-Crimeimage.jpg
o
http://www.tranquilnet.com/uploads/tranquilnet-The-Danger-ofContracting-Computer-Viruses-blog.jpg
o
http://www.slate.com/content/dam/slate/archive/2009/03/1_123125_212 6996_2208023_2212799_090330_tech_confickerwormtn.jpg.CROP.ori ginal-original.jpg
o
http://ithepro.com/wp-content/uploads/2013/08/trojan-horse-attack-virus268x300.jpg
o