Anda di halaman 1dari 11

Ethics, Privacy, and Security

TEAP 1313- Office Application

Yvonne Hernandez

Table of Contents
Privacy Online Identity and the major privacy laws Security Computer Crimes Virus Worm Trojan Horses Protecting security Ethics Copyright Plagiarism Resources 3 4 5 5 6 6 7 7 8 8 9 10

Privacy
What are the threats to personal privacy and how can we protect ourselves? Privacy relates to the collection and use of personal information. Privacy laws exist, but privacy remains primarily an ethical issue. Large organizations are constantly compiling information about us. Every day, data is gathered about us and stored in large databases. A vast industry of data gatherers known as information resellers or information brokers now exists that collects and sells such personal data. Using publicly available databases and in many cases nonpublic databases, information resellers create electronic profiles or highly detailed and personalized descriptions of individuals. There generally is little concern about email privacy on the Web due to the illusion of anonymity. Browsers record visited pages and Web sites often employ programs called cookies to record times and pages visited, as well as credit card numbers.

Online Identity and the major privacy laws


An online identity, internet identity, or internet persona is a social identity that an Internet user establishes in online communities and websites. It can also be considered as an actively constructed presentation of oneself. An online identity may even be determined by a user's relationship to a certain social group they are a part of online. Regulation or statute that protects a person's right to be left alone, and governs collection, storage, and release of his or her financial, medical, and other personal information. The difference between online identity and the major privacy laws is that the online they could get all of your information that you post in your profile just for example in Facebook, twitter, and other Web-site. In privacy laws is that no one could give away your personal information to anyone it doesnt matter if its your brother, daughter, parents, or to anyone.

Security
In the computer industry, the term security or the phrase computer security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

Computer Crimes
Computer crime is an illegal action involving special knowledge of computer technology. Like traditional crime, cybercrime can take many shapes and can occur nearly anytime or anyplace. Criminals committing cybercrime use a number of methods, depending on their skill-set and their goal. Cybercrime has surpassed illegal drug trafficking as a criminal moneymaker.*

Every 3 seconds an identity is stolen. Without security, your unprotected PC can become infected within four minutes of connecting to the internet.

Virus
A virus is a program that spreads malicious code by copying itself and infecting host computers. Although some viruses are latent, others can corrupt data or impede system performance. The term is specific, distinguished by how viruses are distributed (through downloads, email attachments, or removable media such as CDs, DVDs, or USB drives).

Worm
A worm is a self-replicating computer program that penetrates an operating system with the intent of spreading malicious code. Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email. Worms can also install backdoors on computers.

Trojan Horses
A Trojan horse is a type of malware designed to provide unauthorized, remote access to a users computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator. The term gets its name from the Greek story of the Trojan War, when the Greeks offered the Trojans a peace offering in the form of a large wooden horse.

Protecting security
Security is one of the concerns with keeping hardware, software, data, and programs safe. Data encryption is indispensable for communications and is useful for protecting the media used to store files, but it does not address the general computer security problem. Few of the penetration techniques used by various tiger teams charged with finding security holes in systems would be thwarted by encryption. The primary problem with file encryption is that it does nothing to increase the level of trust in the operating system; and if you do not trust your

operating system to protect your files, you cannot trust it to encrypt your files at all the right times or to protect the encryption keys properly. Some service can be defined as a temporary reduction in system performance, a system crash requiring manual restart, or a major crash with permanent loss of data. Although reliable operation of the computer is a serious concern in most cases, denial of service has not traditionally been a topic of computer security research.

Ethics
Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.

Copyright
Copyright refers to a Federal law that protects work created by you or anyone else from being copied, changed, or used without permission. In other words, when you create something like a story,

photograph, poem, song, or drawing, it belongs to you and others have to get your permission to use it.

Plagiarism
Plagiarism is the illegal and unethical representation of some other persons work and ideas as your own without giving credit to the original source. As we all should know plagiarism is not allowed in any kind of form. We should be able to understand and get your own credit. We should not get credit on what other person had made and they were just sharing their ideas of report. Is like if your stealing someones personal information and they are just giving you some ideas on what they thought or they try to understand.

Resources
o o o o

Chapter Book http://web.cecs.pdx.edu/~harry/cs105/slides/Chapter10.pdf https oncourse.iu.edu access ... eary ns ch .doc

http://instructional1.calstatela.edu/dfrankl/curr/ntrs455/ntrs455ch09_not es.html

o o o o o o o o o o o

http://en.wikipedia.org/wiki/Online_identity http://www.businessdictionary.com/definition/privacy-law.html http://www.webopedia.com/TERM/S/security.html http://us.norton.com/cybercrime-definition http://www.pctools.com/security-news/what-do-computer-viruses-do/ http://www.pctools.com/security-news/what-is-a-computer-worm/ http://www.pctools.com/security-news/what-is-a-trojan-virus/ http://www.cse.psu.edu/~tjaeger/cse544-s10/papers/gasser_ch1-2.pdf http://www.techterms.com/definition/computerethics http://gjismyp.files.wordpress.com/2012/03/bart-simpson-plagiarize.png http://www.knowabutyou.com/wp-content/uploads/2013/08/ujyhgtf300x300.jpg

o o

http://library.queensu.ca/webeng/images/computer_ethics.JPG http://www.digitaltrends.com/wp-content/uploads/2010/10/internetsocial-networking-computer-monitor-privacy-monitoring.jpg

10

o o

http://ronnie05.files.wordpress.com/2010/01/090110-online-identity1.jpg http://www.purevpn.com/blog/wp-content/uploads/2011/09/HITECHTightens-Health-Care-Data-Privacy-Laws.gif

http://www.ago.state.ms.us/wp-content/uploads/2013/08/Cyber-Crimeimage.jpg

http://www.tranquilnet.com/uploads/tranquilnet-The-Danger-ofContracting-Computer-Viruses-blog.jpg

http://www.slate.com/content/dam/slate/archive/2009/03/1_123125_212 6996_2208023_2212799_090330_tech_confickerwormtn.jpg.CROP.ori ginal-original.jpg

http://ithepro.com/wp-content/uploads/2013/08/trojan-horse-attack-virus268x300.jpg

11

Anda mungkin juga menyukai