Computer Security, Ethics and Privacy
- Internet and network attacks. Example: Viruses and worms
- Unathorized access and use
- Harware theft. Example: Stolen computer
- Software theft. Example: Piracy
- Information theft. Example: Stolen Identity
- Systen Failure: Example: Lightning striking computer
- Wireless security. Example: wi-fi tapping
How to avoid getting attacks:
- Use a firewall
- Keep anti virus software up to date
- STay alert and watch news
The use of a computer or network without permission. Such as using a University email address to send spam. It is important to protect your user name and password to ensure no one uses it unauthorized.
Software theft: Piracy
Where software is stolen from manufacturers. It is the unauhorized and illegal duplication of copyrighted software.
Use EULA (end user license agreement) you have to accept before you install. Using registration keys can help prevent this.
Hurts consumers and developers: Risk viruses, increases cost, could go to jail or pay fine.
Piracy in the news:
(insert news article)
Information Theft:
Stealing personal information.
Phishing:
spoofing: Alters heading of emails to make it look like it comes from somewhere else
pharming: Installing malicious code on a software to redirect users to a fake website.
Again: Keep personal information such as gatorlink and password confidential, to ensure only you have access.
wireless security:
Computer Ethics
Ethical issues about computers and information privacy
Computer forensics
=]
how to catch unauthorized disclosure of information.
industrial espionage
fraud and data recovery