Chapter 11 Computers and
Society, Security, Privacy, and Ethics
Chapter 11 Objectives
Computer Security Risks
|
|
|
What is a computer security risk? |
Computer Viruses, Worms,
and Trojan Horses
|
|
|
What are viruses, worms, and Trojan
horses? |
Computer Viruses, Worms,
and Trojan Horses
|
|
|
How can a virus spread through an
e-mail message? |
Computer Viruses, Worms,
and Trojan Horses
|
|
|
How can you protect your system from a
macro virus? |
Computer Viruses, Worms,
and Trojan Horses
|
|
|
What is an antivirus program? |
Computer Viruses, Worms,
and Trojan Horses
|
|
|
What is a virus signature? |
Computer Viruses, Worms,
and Trojan Horses
|
|
|
How does an antivirus program inoculate
a program file? |
Computer Viruses, Worms,
and Trojan Horses
Computer Viruses, Worms,
and Trojan Horses
|
|
|
What are some tips for preventing
virus, worm, and Trojan horse infections? |
Unauthorized Access and
Use
|
|
|
What is unauthorized access and how is
it achieved? |
Unauthorized Access and
Use
Unauthorized Access and
Use
|
|
|
What is a personal firewall? |
Unauthorized Access and
Use
|
|
|
What are other ways to protect your
personal computer? |
Unauthorized Access and
Use
|
|
|
How can companies protect against
hackers? |
Unauthorized Access and
Use
Unauthorized Access and
Use
|
|
|
How can you make your password more
secure? |
Unauthorized Access and
Use
|
|
|
What is a possessed object? |
Unauthorized Access and
Use
|
|
|
What is a biometric device? |
Unauthorized Access and
Use
|
|
|
What is a callback system? |
Hardware Theft and
Vandalism
|
|
|
What are hardware theft and hardware
vandalism? |
Software Theft
Software Theft
|
|
|
What is a license agreement? |
Software Theft
|
|
|
What are some other safeguards against
software theft? |
Information Theft
Information Theft
|
|
|
What does an encrypted file look like? |
System Failure
|
|
|
What is a system failure? |
System Failure
|
|
|
What is a surge protector? |
Backing Up — The Ultimate
Safeguard
Internet Security Risks
|
|
|
What is a denial of service attack? |
Internet Security Risks
|
|
|
How do Web browsers provide secure data
transmission? |
Internet Security Risks
|
|
|
What is a certificate authority (CA)? |
Internet Security Risks
|
|
|
What is Secure Sockets Layer (SSL)? |
Internet Security Risks
|
|
|
What are methods for securing e-mail
messages? |
Ethics and Society
|
|
|
What are computer ethics? |
Ethics and Society
|
|
|
What is an IT code of conduct? |
Information Privacy
|
|
|
What is information privacy? |
Information Privacy
|
|
|
What are some ways to safeguard
personal information? |
Information Privacy
|
|
|
What is an electronic profile? |
Information Privacy
Information Privacy
Information Privacy
|
|
|
What is a cookie manager? |
Information Privacy
|
|
|
What are spyware and spam? |
Information Privacy
|
|
|
How can you control spam? |
|
|
|
|
|
|
|
|
|
|
Information Privacy
|
|
|
What privacy laws have been enacted? |
Information Privacy
|
|
|
What privacy laws have been enacted?
(cont’d) |
Information Privacy
|
|
|
What is content filtering? |
Health Concerns of
Computer Use
|
|
|
What are some health concerns of
computer use? |
Health Concerns of
Computer Use
|
|
|
What precautions can prevent tendonitis
or carpal tunnel syndrome? |
Health Concerns of
Computer Use
|
|
|
How can you ease eyestrain
when working at the computer? |
Health Concerns of
Computer Use
Health Concerns of
Computer Use
Summary of Computers and
Society, Security, Privacy, and Ethics