uit9 ppt ch09_au_rev
TRANSCRIPT
![Page 1: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/1.jpg)
McGraw-Hill
9-1
![Page 2: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/2.jpg)
9
McGraw-Hill
The Challenges of the Digital Age
![Page 3: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/3.jpg)
McGraw-Hill
9-3
McGraw-Hill
9.1 Truth Issues: Manipulating Digital Data
Digital sound and images can be manipulated Pros:
Creates new forms of art Digital technology allows musicians to sing every track of a
song and accompany themselves Morphing software makes one image morph into another Movie special effects are made possible Adobe Photoshop allows changes, enhancements to photos
Cons: Has made photographs and recordings untrustworthy “News” can be faked
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 4: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/4.jpg)
McGraw-Hill
9-4
McGraw-Hill
9.1 Truth Issues: Manipulating Digital Data
Limitations of public databases: accuracy and completeness You can’t get the whole story
Start with a public database, THEN do more research The data is not necessarily accurate
Cross-check against multiple sources Each database service has boundaries
Know what those boundaries are Different keywords bring different results History is limited
Databases often begin with data from 1980 or later© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 5: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/5.jpg)
McGraw-Hill
9-5
McGraw-Hill
9.2 Security Issues: Threats to Computers & Communications
Systems Errors and Accidents
Human errors Humans often are not good at assessing their own
information Human emotions affect performance
People get frustrated Human perceptions are slower than the equipment
Information overload may also be a problem
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 6: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/6.jpg)
McGraw-Hill
9-6
McGraw-Hill
9.2 Security Issues: Threats to Computers & Communications
Systems Errors and Accidents (continued)
Procedural errors When people fail to follow established procedures, errors
can occur Software errors
Software bug: an error in a program that causes it not to work properly
“Dirty data” problems Incomplete, outdated, or otherwise inaccurate data
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 7: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/7.jpg)
McGraw-Hill
9-7
McGraw-Hill
9.2 Security Issues: Threats to Computers & Communications
Systems Errors and Accidents (continued)
Electromechanical problems Mechanical systems can wear out or become damaged They can also be badly designed or constructed Power failures and surges can damage equipment
Natural hazards can lead to disasters
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 8: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/8.jpg)
McGraw-Hill
9-8
McGraw-Hill
9.2 Security Issues: Threats to Computers & Communications
Systems Computer Crimes
Two types of computer crime: Illegal act perpetrated against computers or
telecommunications Use of computers or telecommunications to accomplish an
illegal act
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 9: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/9.jpg)
McGraw-Hill
9-9
McGraw-Hill
9.2 Security Issues: Threats to Computers & Communications
Systems Computer Crimes (continued)
Theft of hardware Theft of software Theft of online music and videos (piracy) Theft of time and services Theft of information: e.g., medical info, credit card info Internet-related fraud Taking over your PC: zombies, botnets, and blackmail Crimes of malice: crashing entire systems
Attacks on power-control systems and attacks on the internet
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 10: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/10.jpg)
McGraw-Hill
9-10
McGraw-Hill
9.2 Security Issues: Threats to Computers & Communications
Systems Computer criminals may include:
Individuals or small groups who Use fraudulent email and websites Steal peoples’ identities for monetary gains Show off their power for bragging rights
Employees who Have a grudge against their current or former employers Have a grudge against another employee Sell their company’s secrets for personal profit
Outside partners and company suppliers
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 11: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/11.jpg)
McGraw-Hill
9-11
McGraw-Hill
9.2 Security Issues: Threats to Computers & Communications
Systems Computer criminals (continued):
Corporate spies Organized crime Cyberwar fighters
Computer criminals do not include your employer, who is legally allowed to monitor the computers at work Check your company’s computer usage policy Make sure you follow the rules Know that any data you store in the computer at work –
including emails – is company property
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 12: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/12.jpg)
McGraw-Hill
9-12
McGraw-Hill
9.3 Security: SafeguardingComputers &
Communications Security is a system of safeguards for protecting
information technology against disasters, system failures, and unauthorized access that can result in damage or loss
Computer security’s five components: Deterrence of computer crime Identification and access Encryption Protection of software and data Disaster recovery plans
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 13: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/13.jpg)
McGraw-Hill
9-13
McGraw-Hill
9.3 Security: SafeguardingComputers &
Communications Deterrents to computer crime
Enforcing laws CERT: The Computer Emergency Response Team
Provides round-the-clock information on international computer security threats
Tools to fight fraudulent and unauthorized online uses Rule-based detection software Predictive-statistical-model software Employee internet management software Internet filtering software Electronic surveillance
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 14: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/14.jpg)
McGraw-Hill
9-14
McGraw-Hill
9.3 Security: SafeguardingComputers &
Communications Deterrents to computer crimes (continued)
Identification and access Verify legitimate right of access by what you have, what you
know, and who you are What you have: cards, keys, signatures, badges What you know: PINs and passwords; callback provision Who you are: biometrics
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 15: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/15.jpg)
McGraw-Hill
9-15
McGraw-Hill
9.3 Security: SafeguardingComputers &
Communications Deterrents to computer crimes (continued)
Encryption The process of altering readable data into unreadable form
to prevent unauthorized access Advantage: encrypting data that is available over the
internet keeps thieves and crackers from reading it Disadvantage: encrypting data may prevent law-
enforcement officials from reading the data criminals are sending to one another
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
Discussion Questions: Does information privacy outweigh law enforcement’s needs to track down and prosecute criminals? Should we all encrypt our information to
prevent crackers and criminals from stealing it?
![Page 16: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/16.jpg)
McGraw-Hill
9-16
McGraw-Hill
9.3 Security: SafeguardingComputers &
Communications Deterrents to computer crimes (continued)
Protection of software and data Restrict access to online files; use transaction logs Use audit controls to track who used what programs and
servers, which files were opened, and so on Use people controls--screen applicants; do background
checks; monitor internet, email, and computer usage; use shredders for discarded documents and materials
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 17: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/17.jpg)
McGraw-Hill
9-17
McGraw-Hill
9.3 Security: SafeguardingComputers &
Communications Deterrents to computer crimes (continued)
Disaster-recovery plans Method of restoring information-processing operations that
have been halted by destruction or accident Back up everything; put mainframes in different locations Plans range in price and complexity Automatically store data redundantly in two or more places Have an off-site computer-based data storage center with
independent power supply
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 18: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/18.jpg)
McGraw-Hill
9-18
McGraw-Hill
9.4 Quality-of-Life Issues
Environmental Problems Manufacturing computers and circuits can cause pollution
Hazardous toxins are involved in computer manufacture Wireless devices can interfere in hospital activities and with
medical devices Used computers/monitors contain chromium, cadmium, lead,
mercury, PVC, and brominated flame retardants – all toxic substances that must be disposed of properly
Visual pollution is created by the forest of wireless towers, roof antennas, satellite dishes, etc.; birds and bats, other wildlife, and vegetation are affected
Nanotechnology carries possible risks on the molecular level
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 19: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/19.jpg)
McGraw-Hill
9-19
McGraw-Hill
9.4 Quality-of-Life Issues
Mental-Health Problems Isolation: computer gamers may substitute online games for
interpersonal interaction; videogame and internet addiction Online gambling is too easy Many users find computers stressful and anger-inducing
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 20: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/20.jpg)
McGraw-Hill
9-20
McGraw-Hill
9.4 Quality-of-Life Issues
Protecting Children Pornography
The internet has allowed the widespread distribution of sexually explicit material
Online pornographers use pop-up ads, internet search engines to troll for new customers
This means that children may be exposed to porn when involved in innocent online searches
Parents may use online blocking software such as Cybersitter, Cyber Patrol, or Net Nanny to prevent this
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 21: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/21.jpg)
McGraw-Hill
9-21
McGraw-Hill
9.4 Quality-of-Life Issues
Protecting Children (continued) They can also use DVD filters Videogame rating systems The V-chip “xxx” web addresses
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 22: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/22.jpg)
McGraw-Hill
9-22
McGraw-Hill
9.4 Quality-of-Life Issues
Online Sexual Predators Prevention Strategies
Monitor children’s internet use Be candid to children about the threats Caution children about revealing too much information Tell them not to engage in sexting (online information and
images NEVER go away; they are there forever)
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 23: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/23.jpg)
McGraw-Hill
9-23
McGraw-Hill
9.4 Quality-of-Life Issues
Cyberbullies Another example of how information technology can
negatively affect children When it happens:
Save the evidence Block messages Contact an attorney or the police Cyberbullying can also occur in the workplace
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 24: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/24.jpg)
McGraw-Hill
9-24
McGraw-Hill
9.4 Quality-of-Life Issues
Workplace Problems Misuse of technology
Playing online games, shopping, writing personal emails, etc. interfere with workers’ productivity and can get them fired
Fussing with computers Dealing with hardware, software, and network connections
can waste a lot of time, as can dealing with spam and the like
Information overload With so much available technology, people tend to work
more hours and get swamped by too much information© 2011 The McGraw-Hill Companies, Inc. All rights reserved.
![Page 25: Uit9 ppt ch09_au_rev](https://reader033.vdocuments.us/reader033/viewer/2022042714/555b0da1d8b42a64398b5549/html5/thumbnails/25.jpg)
McGraw-Hill
9-25
McGraw-Hill
9.5 Economic & Political Issues
Technology may affect the gap between the rich and the poor (“digital divide”) Most jobs require employees who are tech-savvy People who are not tech-savvy won’t qualify for those jobs Technology is being used to replace employees in traditional
jobs, traditionally filled by untrained workers Not everyone can afford computers and internet connectivity
Many governments censor internet content available in their countries but they can’t control all internet political activism Internet is only loosely policed, so criminals take advantage
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.