DC17 Ch05
DC17 Ch05
DC17 Ch05
Chapter 5
Digital Security,
Ethics, and Privacy
Objectives Overview
Unethical
Corporate spies Cyberextortionist
employees
Cyberterrorist
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
Face
Fingerprint
recognition
reader
system
Hand Voice
geometry verification
system system
Signature Iris
verification recognition
system system
© 2017 Cengage Learning®. May not be scanned, copied
Pages 224 – 226 or duplicated, or posted to a publicly accessible website, 15
Figures 5-8 – 5-11 in whole or in part.
Unauthorized Access and Use
Information
Insurance
security
agencies
departments
© 2017 Cengage Learning®. May not be scanned, copied
Page 227 or duplicated, or posted to a publicly accessible website, 17
in whole or in part.
Software Theft
Illegally registers
Illegally copies a
and/or activates
program
a program
© 2017 Cengage Learning®. May not be scanned, copied
Page 228 or duplicated, or posted to a publicly accessible website, 18
in whole or in part.
Software Theft
Hardware vandalism
Hardware theft is
is the act of defacing
the act of stealing
or destroying digital
digital equipment
equipment
Cloud
Storage
© 2017 Cengage Learning®. May not be scanned, copied
Pages 233 - 234 or duplicated, or posted to a publicly accessible website, 27
in whole or in part.
Backing Up – The Ultimate Safeguard
– Cloud
Child
Pages 238 - 240 © 2017 Cengage Learning®. May not be scanned, copied
31
or duplicated, or posted to a publicly accessible website,
Figure 5-20
Ethics and Society
Pages 242 - 243 © 2017 Cengage Learning®. May not be scanned, copied
37
or duplicated, or posted to a publicly accessible website,
Figure 5-24
Information Privacy
Track how
Target
often users
advertisements
visit a site
© 2017 Cengage Learning®. May not be scanned, copied
Pages 243 - 244 or duplicated, or posted to a publicly accessible website, 38
in whole or in part.
Information Privacy
Pages 247 - 248 © 2017 Cengage Learning®. May not be scanned, copied
45
or duplicated, or posted to a publicly accessible website,
Figure 5-26
Summary
Chapter 5
Digital Security,
Ethics, and Privacy
Chapter 5 Complete