Chapter 9 Privacy, Security, and Ethics
To prevent copyright violations, corporations often use:
DRM
Data Manipulation
Finding entry into someone's computer network and leaving a prankster's message may seem like fun, which is why hackers do it. It is still against the law. Moreover, even if the manipulation seems harmless, it may cause a great deal of anxiety and wasted time among network users.
Wireless network encryption
Restricts access to authorized users on wireless networks. WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home wireless networks. WPA2 is typically established for a wireless network through the network's wireless router. While the specifics vary between routers, WPA2 is usually set through the router's settings options.
Large database
The federal government alone has over 2,000 databases. Every day, data is gathered about us and stored in large databases. For example, telephone companies compile lists of the calls we make, the numbers called, locations from GPS-enabled smartphones, and so on. Credit card companies maintain user databases that track cardholder purchases, payments, and credit records. Supermarket scanners in grocery checkout counters record what we buy, when we buy it, how much we buy, and the price. Financial institutions, including banks and credit unions, record how much money we have, what we use it for, and how much we owe. Search engines record the search histories of their users including search topics and sites visited. Social networking sites collect every entry.
Programs that come into a computer system disguised as something else are called:
Trojan horses
The three primary privacy issues are accuracy, privacy, and:
access
Privacy concern that relates to the responsibility to ensure correct data collection
accuracy
trojan horses
appear harmless, however, contain malicious programs
denial of service
attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. The targets of these attacks are usually Internet service providers (ISPs) and specific websites. Once under attack, the servers at the ISP or the website become overwhelmed with these requests for service and are unable to respond to legitimate users. As a result, the ISP or website is effectively shut down.
A type of scanning device such as fingerprint and iris (eye) scanner
biometric
botnet/robot network
collection of zombie computers
cracker
computer criminal who creates and distributes malicious programs. They use web programs called malware that are specifically designed to damage or disrupt a computer system
ethics
computer ethics are guidelines for the morally acceptable use of computers in our society. Ethical treatment is critically important to us all, and we are all entitled to ethical treatment.
zombies
computers infected by a virus, worm, or Trojan horse than allows them to be remotely controlled for malicious purposes
privacy
concerns the collection and use of data about individuals There are three primary privacy issues: Accuracy relates to the responsibility of those who collect data to ensure that the data is correct. Property relates to who owns data. Access relates to the responsibility of those who have data to control who is able to use that data.
temporary files/browser cache
contain web page content and instructions for displaying this content
Small data files deposited on your hard disk from websites you have visited
cookies
Computer criminals who create and distribute malicious programs
crackers
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:
cyberbullying
Virtual private networks
encrypt connections between company networks and remote users such as workers connecting from home. This connection creates a secure virtual connection to a company LAN across the Internet.
Process of coding information to make it unreadable except to those who have a key
encryption
privacy mode
ensures browsing activity is not recorded on your hard disk
big data
ever-growing volume of digitally stored data
data manipulation
finding entry into someone's computer network and leaving a prankster's message
first party cookie
generated and read by the website you are currently visiting
encryption key
he process of coding information to make it unreadable except to those who have a special piece of information known as an
electronic profiles
highly detailed and personalized descriptions of individuals These profiles can reveal more than you might wish to make public and have an impact beyond what you might imagine. This raises many important issues, including Collecting public, but personally identifying, information: What if people anywhere in the world could view detailed images of you, your home, or your vehicle? Using detailed images captured with a specially equipped van, Google's Street View project allows just that. Street View makes it possible to take a virtual tour of many cities and neighborhoods from any computer with a connection to the Internet. (See Figure 9-2.) Although the images available on Street View are all taken in public locations, some have objected to the project as being an intrusion on their privacy.
Browsers store the locations of sites visited in a:
history file
history files
include locations of sites that you have recently visited
info. brokers/info. resellers
industry of data gatherers that collect, analyze, and sell personal data
online identity
info. that people voluntarily post about themselves online
Individuals who collect and sell personal data
information brokers
web bugs
invisible images of HTML code hidden within a web page
security
involves protecting individuals and organizations from theft and damage
Malicious programs that damage or disrupt a computer system
malware
The info. that people voluntarily post in social networking sites, blogs, and photo-and-video sharing sites is used to create their:
online identity
Used by scammers to trick Internet users with official-looking websites
phishing
An ethical issue relating to using another person's work and ideas as your own without giving credit to the original source
plagiarism
The browser mode that ensures your browsing activity is not recorded
privacy
Highly detailed and personalized descriptions of individuals are electronic:
profiles
viruses
programs that migrate through networks and operating systems and most attach themselves to different programs and databases
worms
programs that simply replicate themselves over and over again
Gramm-Leach-Bliley Act
protects financial info.
Health Insurance Policy and Accountability Act (HIPPA)
protects medical records
Security suites
provide a collection of utility programs designed to protect your privacy and security while you are on the web.
keystroke logger
records every activity and keystroke made on your computer system including credit card numbers, passwords, and e-mail messages.
Family Educational Rights and Privacy Act (FERPA)
restricts disclosure of educational records
Rogue Wi-Fi Hotspots
rogue networks operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to. Once connected, the rogue networks capture any and all information sent by the users to legitimate sites including user names and passwords.
cookies
small data files deposited on your hard disk from websites you have visited Although you will generally not be aware when a website generates a cookie, the personalized experiences you enjoy on the web are often a result of those cookies. While cookies are harmless in and of themselves, what makes them a potential privacy risk is that they can store information about you, your preferences, and your browsing habits. The information stored generally depends on whether the cookie is a first-party or a third-party cookie.
Wide range of programs that secretly record and report an individual's activities on the Internet
spyware
Special hardware and software used to control access to a corporation's private network is known as a(n):
spyware removal program
dictionary attack
uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account
third party cookies
usually generated by an advertising company that is affiliated with the website you are currently visiting. Often referred to as tracking cookies.
spyware
wide range of programs that are designed to secretly record and report an individual's activities on the Internet
Infected computers that can be remotely controlled
zombies