Chapter 11 Computers and Society, Security, Privacy, and Ethics

Chapter 11 Objectives

Computer Security Risks
What is a computer security risk?

Computer Viruses, Worms, and Trojan Horses
What are viruses, worms, and Trojan horses?

Computer Viruses, Worms, and Trojan Horses
How can a virus spread through an e-mail message?

Computer Viruses, Worms, and Trojan Horses
How can you protect your system from a macro virus?

Computer Viruses, Worms, and Trojan Horses
What is an antivirus program?

Computer Viruses, Worms, and Trojan Horses
What is a virus signature?

Computer Viruses, Worms, and Trojan Horses
How does an antivirus program inoculate a program file?

Computer Viruses, Worms, and Trojan Horses
What is a recovery disk?

Computer Viruses, Worms, and Trojan Horses
What are some tips for preventing virus, worm, and Trojan horse infections?

Unauthorized Access and Use
What is unauthorized access and how is it achieved?

Unauthorized Access and Use
What is a firewall?

Unauthorized Access and Use
What is a personal firewall?

Unauthorized Access and Use
What are other ways to protect your personal computer?

Unauthorized Access and Use
How can companies protect against hackers?

Unauthorized Access and Use
What is a user name?

Unauthorized Access and Use
How can you make your password more secure?

Unauthorized Access and Use
What is a possessed object?

Unauthorized Access and Use
What is a biometric device?

Unauthorized Access and Use
What is a callback system?

Hardware Theft and Vandalism
What are hardware theft and hardware vandalism?

Software Theft
What is software theft?

Software Theft
What is a license agreement?

Software Theft
What are some other safeguards against software theft?

Information Theft
What is encryption?

Information Theft
What does an encrypted file look like?

System Failure
What is a system failure?

System Failure
What is a surge protector?

Backing Up — The Ultimate Safeguard
What is a backup?

Internet Security Risks
What is a denial of service attack?

Internet Security Risks
How do Web browsers provide secure data transmission?

Internet Security Risks
What is a certificate authority (CA)?

Internet Security Risks
What is Secure Sockets Layer (SSL)?

Internet Security Risks
What are methods for securing e-mail messages?

Ethics and Society
What are computer ethics?

Ethics and Society
What is an IT code of conduct?

Information Privacy
What is information privacy?

Information Privacy
What are some ways to safeguard personal information?

Information Privacy
What is an electronic profile?

Information Privacy
What is a cookie?

Information Privacy
How do cookies work?

Information Privacy
What is a cookie manager?

Information Privacy
What are spyware and spam?

Information Privacy
How can you control spam?

Information Privacy
What privacy laws have been enacted?

Information Privacy
What privacy laws have been enacted? (cont’d)

Information Privacy
What is content filtering?

Health Concerns of Computer Use
What are some health concerns of computer use?

Health Concerns of Computer Use
What precautions can prevent tendonitis or carpal tunnel syndrome?

Health Concerns of Computer Use
How can you ease eyestrain
when working at the computer?

Health Concerns of Computer Use
What is ergonomics?

Health Concerns of Computer Use
What is green computing?

Summary of Computers and Society, Security, Privacy, and Ethics