Full Transcript

Ethics, Security & Privacy in Information Technology INTRODUCTION First step to handling information responsibly is understanding the following concepts: a. Ethics b. Privacy c. Security 1. Threats to information 2. Protection of information Lecture 1 2 A. ETHICS  Ethics (noun) – the principles and...

Ethics, Security & Privacy in Information Technology INTRODUCTION First step to handling information responsibly is understanding the following concepts: a. Ethics b. Privacy c. Security 1. Threats to information 2. Protection of information Lecture 1 2 A. ETHICS  Ethics (noun) – the principles and standards that guide our behavior towards other people. Ethics are rooted in history, culture, and religion.  Computer Ethics – a set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content) and privacy concerns. Lecture 1 3 A. ETHICS (cont.)  Intellectual Property (IP) – any intangible asset that is created from an original thought, such as an idea, name, content, design, invention or digital media.  Intellectual Property Rights refers to the rights of IP owners and authors. Lecture 1 4 A. ETHICS (cont.)  Copyright – the legal right of the owner of intellectual property. i.e. the original creator of a product and anyone he gives authorization to are the only ones with the exclusive right to reproduce the work.  Pirated software – the unauthorized use, duplication, distribution, or sale of copyrighted software. Lecture 1 5 B. Privacy Privacy is the right to:  Be left alone when you want to be  Have control over your own personal possessions  Not to be observed without your consent Lecture 1 6 B. Privacy (cont.)  Cookie – a small file that contains information about you and your Web activities, which a Web site places on your computer. You can handle cookies by using:  Web browser cookie management option  Buy a program that manages cookies Lecture 1 7 C. Security Security is protecting the information from unauthorized activities including access, use, disclosure, distribution, modification or destruction.  Security methods must be fast, reliable, and secure. E.g. PayPal payment, bank applications. Lecture 1 8 C. Security (cont.)  While Privacy is concerned about protecting your right to have control over your information, Security is concerned about protecting your information from being attacked.  To achieve Privacy you need Security. Lecture 1 9

Use Quizgecko on...
Browser
Browser