Chapter 4 and 5
Chapter 4 and 5
Information privacy
● Information privacy refers to the right of
individuals and companies to deny or restrict the
collection, use, and dissemination of information
about them
● Huge databases store data online
● Websites often collect data about you, so that
they can customize advertisements and send
you personalized email messages
Wireless Security ● Some employers monitor your computer usage
● Wireless access poses additional security risks and email messages
● Some perpetrators connect to other’s wireless
networks to gain free Internet access or ● Information about you can be stored in a
confidential data database when you:
Fill out a printed or online form
Ethics and Society Create a profile on an online social network
● Technology ethics are the moral guidelines Register a product warranty
that govern the use of computers, mobile ● A cookie is a small text file that a web server
devices, information systems, and related stores on your computer
technologies ● Websites use cookies for a variety of reasons:
● Information accuracy is a concern Allow for personalization
– Not all information on the Internet is correct Store user names and/or passwords
Assist with online shopping
● Intellectual property refers to unique and Track how often users visit a site
original works such as ideas, inventions, art, Target advertisements
writings, processes, company and product ● Phishing is a scam in which a perpetrator sends
names, and logos an official looking email message that attempts
● Intellectual property rights are the rights to to obtain your personal and/or financial
which creators are entitled to their work information
● A copyright protects any tangible form of ● With clickjacking, an object that can be tapped
expression or clicked on a website contains a malicious
● Digital rights management (DRM) is a strategy program
designed to prevent illegal distribution of movies, ● Spyware is a program placed on a computer or
music, and other digital content mobile device without the user’s knowledge that
secretly collects information about the user and
then communicates the information it collects to
some outside source while the user is online
● Adware is a program that displays an online
advertisement in a banner or pop-up window on
webpages, email messages, or other Internet
services
● Social engineering is defined as gaining
unauthorized access to or obtaining confidential
information by taking advantage of the trusting
human nature of some victims and the naivety of
others
● The concern about privacy has led to the
enactment of federal and state laws regarding
the storage and disclosure of personal data
● Employee monitoring involves the use of
computers, mobile devices, or cameras to
observe, record, and review an employee’s use
of a technology, including communications such
as email messages, keyboard activity (used to
measure productivity), and websites visited
● Many programs exist that easily allow employers
to monitor employees. Further, it is legal for
employers to use these programs
● Content filtering is the process of restricting
access to certain material
– Many businesses use content filtering
● Web filtering software restricts access to
specified websites
Summary
● Risks and safeguards associated with Internet
and network attacks, unauthorized access and
use, software theft, information theft, and
hardware theft, vandalism, and failure
● Variety of digital security risks
● Cybercrime and cybercriminals
● Various backup strategies and methods of
securing wireless communications
● Ethical issues in society and various ways to
protect the privacy of personal information