knowt logo

Ch 9 - The Personal and Social Impact of Computers

  • Computer Waste: inappropriate use of computer technology and resources

    • Computer related mistakes: errors, failures, and other computer problems that make computer output incorrect or not useful

  • Causes of computer waste: Improper management of information systems and resources

    • Discarding of old software/computer systems when they still have value

    • Building and maintaining complex systems that are not used to their fullest extent

    • Using corporate time/technology for personal use

    • Spam

  • Preventing computer release waste and mistakes:

    • Establishing policies and procedures (for proper waste disposal)

    • Implementing policies and procedures

    • Monitoring policies and procedures

    • Reviewing policies and procedures

  • Computer Crime: often defies detection, is the theft of intellectual property. Criminals require two tools to be able to commit computer crimes:

    1. Knowing how to access computer systems

    2. Manipulating the system to produce desired result

  • Examples:

    • Social engineering

    • Dumpster diving

    • Counterfeit and banking fraud using legitimate desktop publishing programs

  • Cyberterrorist: someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks

    • The goal is to gather all information stored in them

  • Identity Theft: imposter obtains key pieces of personal identification information to impersonate someone else

  • Illegal access and use of information:

    • Hacker: learns about and uses computer systems

    • Criminal hacker (cracker): gains unauthorised use or illegal access to computer systems

    • Script bunnies: automate the job of crackers

    • Insider: employee who compromises corporate systems

    • Malware: software programs that destroy or damage processing

    • Virus: computer program file capable of attaching to disks or other files and replicating itself repeatedly

      • without the owner’s permission

  • Worm: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network

    • Trojan horse: malicious program that disguises itself as a useful application and purposefully does something the user does not expect

    • Logic bomb: type of trojan horse that executes when specific conditions occur

    • Triggers for logic bombs include a change in a file by a particular series of keystrokes or at a specific time or date

  • Avoiding viruses and worms:

    • Installing antivirus software on your device

    • Update antivirus software regularly

    • Backup files regularly

    • Do not open suspicious files or links

  • Antivirus program: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files

    • Tips:

      • Run and update antivirus software

      • Scan all CD’s before using them

      • Only install softwares from well-known websites

      • Take immediate action if a virus is detected

  • Software Piracy: act of illegally duplicating software

  • Internet software piracy: illegally downloading software from the internet

    • Most rapidly expanding type of software piracy

    • Most difficult to combat

    • Can be served penalties

    • Examples: pirate Websites, auction sites that offer counterfeit software, peer-to-peer networks

  • Phishing: gaining access to personal information by redirecting user to fake site

  • Crime prevention by corporations:

    • Public key infrastructure (PKI): enables users of an unsecured public network such as the internet to securely and privately exchange data

    • Uses public and private cryptographic key pair that is obtained and shared through a trusted authority

    • Biometrics: measurement of one of a person's traits, whether physical or behavioural

  • Using intrusion detection software:

    • Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion

      • Intrusion activities: failed login attempts, suspicious behaviour

      • Can provide false alarms

      • Email or voice message alerts may be missed

    • Managed security service provider (MSSP): organisational that monitors, managers, and maintains network security for both hardware and software

      • Sifts through alarms and alerts from all monitoring systems

      • May provide scanning, blocking, and filtering capabilities

  • Platform for privacy preferences (P3P): Screening technology that shields users from websites that do not provide the level of privacy protection they desire

  • Ergonomics: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them

  • Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behaviour

Ch 9 - The Personal and Social Impact of Computers

  • Computer Waste: inappropriate use of computer technology and resources

    • Computer related mistakes: errors, failures, and other computer problems that make computer output incorrect or not useful

  • Causes of computer waste: Improper management of information systems and resources

    • Discarding of old software/computer systems when they still have value

    • Building and maintaining complex systems that are not used to their fullest extent

    • Using corporate time/technology for personal use

    • Spam

  • Preventing computer release waste and mistakes:

    • Establishing policies and procedures (for proper waste disposal)

    • Implementing policies and procedures

    • Monitoring policies and procedures

    • Reviewing policies and procedures

  • Computer Crime: often defies detection, is the theft of intellectual property. Criminals require two tools to be able to commit computer crimes:

    1. Knowing how to access computer systems

    2. Manipulating the system to produce desired result

  • Examples:

    • Social engineering

    • Dumpster diving

    • Counterfeit and banking fraud using legitimate desktop publishing programs

  • Cyberterrorist: someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks

    • The goal is to gather all information stored in them

  • Identity Theft: imposter obtains key pieces of personal identification information to impersonate someone else

  • Illegal access and use of information:

    • Hacker: learns about and uses computer systems

    • Criminal hacker (cracker): gains unauthorised use or illegal access to computer systems

    • Script bunnies: automate the job of crackers

    • Insider: employee who compromises corporate systems

    • Malware: software programs that destroy or damage processing

    • Virus: computer program file capable of attaching to disks or other files and replicating itself repeatedly

      • without the owner’s permission

  • Worm: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network

    • Trojan horse: malicious program that disguises itself as a useful application and purposefully does something the user does not expect

    • Logic bomb: type of trojan horse that executes when specific conditions occur

    • Triggers for logic bombs include a change in a file by a particular series of keystrokes or at a specific time or date

  • Avoiding viruses and worms:

    • Installing antivirus software on your device

    • Update antivirus software regularly

    • Backup files regularly

    • Do not open suspicious files or links

  • Antivirus program: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files

    • Tips:

      • Run and update antivirus software

      • Scan all CD’s before using them

      • Only install softwares from well-known websites

      • Take immediate action if a virus is detected

  • Software Piracy: act of illegally duplicating software

  • Internet software piracy: illegally downloading software from the internet

    • Most rapidly expanding type of software piracy

    • Most difficult to combat

    • Can be served penalties

    • Examples: pirate Websites, auction sites that offer counterfeit software, peer-to-peer networks

  • Phishing: gaining access to personal information by redirecting user to fake site

  • Crime prevention by corporations:

    • Public key infrastructure (PKI): enables users of an unsecured public network such as the internet to securely and privately exchange data

    • Uses public and private cryptographic key pair that is obtained and shared through a trusted authority

    • Biometrics: measurement of one of a person's traits, whether physical or behavioural

  • Using intrusion detection software:

    • Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion

      • Intrusion activities: failed login attempts, suspicious behaviour

      • Can provide false alarms

      • Email or voice message alerts may be missed

    • Managed security service provider (MSSP): organisational that monitors, managers, and maintains network security for both hardware and software

      • Sifts through alarms and alerts from all monitoring systems

      • May provide scanning, blocking, and filtering capabilities

  • Platform for privacy preferences (P3P): Screening technology that shields users from websites that do not provide the level of privacy protection they desire

  • Ergonomics: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them

  • Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behaviour

robot