Chapter 11 Computers and Society, Security, Privacy, and Ethics

Chapter 11 Objectives

Computer Security Risks

Computer Viruses, Worms, and Trojan Horses

Computer Viruses, Worms, and Trojan Horses

Computer Viruses, Worms, and Trojan Horses

Computer Viruses, Worms, and Trojan Horses

Computer Viruses, Worms, and Trojan Horses

Computer Viruses, Worms, and Trojan Horses

Computer Viruses, Worms, and Trojan Horses

Computer Viruses, Worms, and Trojan Horses

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Unauthorized Access and Use

Hardware Theft and Vandalism

Software Theft

Software Theft

Software Theft

Information Theft

Information Theft

System Failure

System Failure

Backing Up — The Ultimate Safeguard

Internet Security Risks

Internet Security Risks

Internet Security Risks

Internet Security Risks

Internet Security Risks

Ethics and Society

Ethics and Society

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Information Privacy

Health Concerns of Computer Use

Health Concerns of Computer Use

Health Concerns of Computer Use

Health Concerns of Computer Use

Health Concerns of Computer Use

Summary of Computers and Society, Security, Privacy, and Ethics