Chapter 9 Privacy, Security, and Ethics

Ace your homework & exams now with Quizwiz!

To prevent copyright violations, corporations often use:

DRM

Data Manipulation

Finding entry into someone's computer network and leaving a prankster's message may seem like fun, which is why hackers do it. It is still against the law. Moreover, even if the manipulation seems harmless, it may cause a great deal of anxiety and wasted time among network users.

Wireless network encryption

Restricts access to authorized users on wireless networks. WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home wireless networks. WPA2 is typically established for a wireless network through the network's wireless router. While the specifics vary between routers, WPA2 is usually set through the router's settings options.

Large database

The federal government alone has over 2,000 databases. Every day, data is gathered about us and stored in large databases. For example, telephone companies compile lists of the calls we make, the numbers called, locations from GPS-enabled smartphones, and so on. Credit card companies maintain user databases that track cardholder purchases, payments, and credit records. Supermarket scanners in grocery checkout counters record what we buy, when we buy it, how much we buy, and the price. Financial institutions, including banks and credit unions, record how much money we have, what we use it for, and how much we owe. Search engines record the search histories of their users including search topics and sites visited. Social networking sites collect every entry.

Programs that come into a computer system disguised as something else are called:

Trojan horses

The three primary privacy issues are accuracy, privacy, and:

access

Privacy concern that relates to the responsibility to ensure correct data collection

accuracy

trojan horses

appear harmless, however, contain malicious programs

denial of service

attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. The targets of these attacks are usually Internet service providers (ISPs) and specific websites. Once under attack, the servers at the ISP or the website become overwhelmed with these requests for service and are unable to respond to legitimate users. As a result, the ISP or website is effectively shut down.

A type of scanning device such as fingerprint and iris (eye) scanner

biometric

botnet/robot network

collection of zombie computers

cracker

computer criminal who creates and distributes malicious programs. They use web programs called malware that are specifically designed to damage or disrupt a computer system

ethics

computer ethics are guidelines for the morally acceptable use of computers in our society. Ethical treatment is critically important to us all, and we are all entitled to ethical treatment.

zombies

computers infected by a virus, worm, or Trojan horse than allows them to be remotely controlled for malicious purposes

privacy

concerns the collection and use of data about individuals There are three primary privacy issues: Accuracy relates to the responsibility of those who collect data to ensure that the data is correct. Property relates to who owns data. Access relates to the responsibility of those who have data to control who is able to use that data.

temporary files/browser cache

contain web page content and instructions for displaying this content

Small data files deposited on your hard disk from websites you have visited

cookies

Computer criminals who create and distribute malicious programs

crackers

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:

cyberbullying

Virtual private networks

encrypt connections between company networks and remote users such as workers connecting from home. This connection creates a secure virtual connection to a company LAN across the Internet.

Process of coding information to make it unreadable except to those who have a key

encryption

privacy mode

ensures browsing activity is not recorded on your hard disk

big data

ever-growing volume of digitally stored data

data manipulation

finding entry into someone's computer network and leaving a prankster's message

first party cookie

generated and read by the website you are currently visiting

encryption key

he process of coding information to make it unreadable except to those who have a special piece of information known as an

electronic profiles

highly detailed and personalized descriptions of individuals These profiles can reveal more than you might wish to make public and have an impact beyond what you might imagine. This raises many important issues, including Collecting public, but personally identifying, information: What if people anywhere in the world could view detailed images of you, your home, or your vehicle? Using detailed images captured with a specially equipped van, Google's Street View project allows just that. Street View makes it possible to take a virtual tour of many cities and neighborhoods from any computer with a connection to the Internet. (See Figure 9-2.) Although the images available on Street View are all taken in public locations, some have objected to the project as being an intrusion on their privacy.

Browsers store the locations of sites visited in a:

history file

history files

include locations of sites that you have recently visited

info. brokers/info. resellers

industry of data gatherers that collect, analyze, and sell personal data

online identity

info. that people voluntarily post about themselves online

Individuals who collect and sell personal data

information brokers

web bugs

invisible images of HTML code hidden within a web page

security

involves protecting individuals and organizations from theft and damage

Malicious programs that damage or disrupt a computer system

malware

The info. that people voluntarily post in social networking sites, blogs, and photo-and-video sharing sites is used to create their:

online identity

Used by scammers to trick Internet users with official-looking websites

phishing

An ethical issue relating to using another person's work and ideas as your own without giving credit to the original source

plagiarism

The browser mode that ensures your browsing activity is not recorded

privacy

Highly detailed and personalized descriptions of individuals are electronic:

profiles

viruses

programs that migrate through networks and operating systems and most attach themselves to different programs and databases

worms

programs that simply replicate themselves over and over again

Gramm-Leach-Bliley Act

protects financial info.

Health Insurance Policy and Accountability Act (HIPPA)

protects medical records

Security suites

provide a collection of utility programs designed to protect your privacy and security while you are on the web.

keystroke logger

records every activity and keystroke made on your computer system including credit card numbers, passwords, and e-mail messages.

Family Educational Rights and Privacy Act (FERPA)

restricts disclosure of educational records

Rogue Wi-Fi Hotspots

rogue networks operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to. Once connected, the rogue networks capture any and all information sent by the users to legitimate sites including user names and passwords.

cookies

small data files deposited on your hard disk from websites you have visited Although you will generally not be aware when a website generates a cookie, the personalized experiences you enjoy on the web are often a result of those cookies. While cookies are harmless in and of themselves, what makes them a potential privacy risk is that they can store information about you, your preferences, and your browsing habits. The information stored generally depends on whether the cookie is a first-party or a third-party cookie.

Wide range of programs that secretly record and report an individual's activities on the Internet

spyware

Special hardware and software used to control access to a corporation's private network is known as a(n):

spyware removal program

dictionary attack

uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account

third party cookies

usually generated by an advertising company that is affiliated with the website you are currently visiting. Often referred to as tracking cookies.

spyware

wide range of programs that are designed to secretly record and report an individual's activities on the Internet

Infected computers that can be remotely controlled

zombies


Related study sets

Chapter 17 Computer Crimes CJ 1340

View Set

Midterm Prep Weeks 1-7 -- CIST1220-Structured Query Language-SQL

View Set

Critical thinking questions ch. 1-10 and 44 - 47

View Set