Notes
Slide Show
Outline
1
Chapter 11 Computers and Society, Security, Privacy, and Ethics
2
Chapter 11 Objectives
3
Computer Security Risks
  • What is a computer security risk?
4
Computer Viruses, Worms, and Trojan Horses
  • What are viruses, worms, and Trojan horses?
5
Computer Viruses, Worms, and Trojan Horses
  • How can a virus spread through an e-mail message?
6
Computer Viruses, Worms, and Trojan Horses
  • How can you protect your system from a macro virus?
7
Computer Viruses, Worms, and Trojan Horses
  • What is an antivirus program?
8
Computer Viruses, Worms, and Trojan Horses
  • What is a virus signature?
9
Computer Viruses, Worms, and Trojan Horses
  • How does an antivirus program inoculate a program file?
10
Computer Viruses, Worms, and Trojan Horses
  • What is a recovery disk?
11
Computer Viruses, Worms, and Trojan Horses
  • What are some tips for preventing virus, worm, and Trojan horse infections?
12
Unauthorized Access and Use
  • What is unauthorized access and how is it achieved?
13
Unauthorized Access and Use
  • What is a firewall?
14
Unauthorized Access and Use
  • What is a personal firewall?
15
Unauthorized Access and Use
  • What are other ways to protect your personal computer?
16
Unauthorized Access and Use
  • How can companies protect against hackers?
17
Unauthorized Access and Use
  • What is a user name?
18
Unauthorized Access and Use
  • How can you make your password more secure?
19
Unauthorized Access and Use
  • What is a possessed object?
20
Unauthorized Access and Use
  • What is a biometric device?
21
Unauthorized Access and Use
  • What is a callback system?
22
Hardware Theft and Vandalism
  • What are hardware theft and hardware vandalism?
23
Software Theft
  • What is software theft?
24
Software Theft
  • What is a license agreement?
25
Software Theft
  • What are some other safeguards against software theft?
26
Information Theft
  • What is encryption?
27
Information Theft
  • What does an encrypted file look like?
28
System Failure
  • What is a system failure?
29
System Failure
  • What is a surge protector?
30
Backing Up — The Ultimate Safeguard
  • What is a backup?
31
Internet Security Risks
  • What is a denial of service attack?
32
Internet Security Risks
  • How do Web browsers provide secure data transmission?
33
Internet Security Risks
  • What is a certificate authority (CA)?
34
Internet Security Risks
  • What is Secure Sockets Layer (SSL)?
35
Internet Security Risks
  • What are methods for securing e-mail messages?
36
Ethics and Society
  • What are computer ethics?
37
Ethics and Society
  • What is an IT code of conduct?
38
Information Privacy
  • What is information privacy?
39
Information Privacy
  • What are some ways to safeguard personal information?
40
Information Privacy
  • What is an electronic profile?
41
Information Privacy
  • What is a cookie?
42
Information Privacy
  • How do cookies work?
43
Information Privacy
  • What is a cookie manager?
44
Information Privacy
  • What are spyware and spam?
45
Information Privacy
  • How can you control spam?






46
Information Privacy
  • What privacy laws have been enacted?
47
Information Privacy
  • What privacy laws have been enacted? (cont’d)
48
Information Privacy
  • What is content filtering?
49
Health Concerns of Computer Use
  • What are some health concerns of computer use?
50
Health Concerns of Computer Use
  • What precautions can prevent tendonitis or carpal tunnel syndrome?
51
Health Concerns of Computer Use
  • How can you ease eyestrain
    when working at the computer?
52
Health Concerns of Computer Use
  • What is ergonomics?
53
Health Concerns of Computer Use
  • What is green computing?
54
Summary of Computers and Society, Security, Privacy, and Ethics