Using Information Technology - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Using Information Technology

Description:

9.1 Security Issues: Threats to Computers & Communications Systems ... 1996 Telecommunications Act. 1997 White House Plan for Internet Commerce. ICANN ... – PowerPoint PPT presentation

Number of Views:56
Avg rating:3.0/5.0
Slides: 21
Provided by: MARYANNMA7
Category:

less

Transcript and Presenter's Notes

Title: Using Information Technology


1
Using Information Technology
  • Chapter 9
  • The Challenges of the Digital Age

2
The Challenges of the Digital Age Society
Information Technology Today
  • 9.1 Security Issues Threats to Computers
    Communications Systems
  • 9.2 Security Safeguarding Computers
    Communications
  • 9.3 Quality-of-Life Issues The Environment,
    Mental Health, the Workplace
  • 9.4 Economic Issues Employment the
    Haves/Have-Nots
  • 9.5 The Digital Environment Is There a Grand
    Design?

3
9.1 Security Issues Threats to Computers
Communications Systems
  • Errors Accidents
  • Human errors
  • Procedural errors
  • Software errors
  • Electromechanical problems
  • Dirty data problems

4
Natural Other Hazards
  • Natural hazards
  • Civil strife and terrorism

5
Crimes Against Computers Communications
  • Theft of hardware
  • Theft of software and music
  • Theft of time and services
  • Theft of information
  • Crimes of malice and destruction

6
Crimes Using Computers Communications
  • Production of counterfeit money
  • Investment schemes
  • Child pornography
  • Steganography

7
Worms Viruses
  • Worm - a program that copies itself repeatedly
    into a computers memory or onto a disk drive
  • Virus - a deviant program, stored on a computer
    hard drive, that can cause unexpected and often
    undesirable effects, such as destroying or
    corrupting data
  • Anti-virus software - programs that scan a
    computers hard disk, floppy disks, and main
    memory to detect viruses and, sometimes, to
    destroy them

8
Computer Criminals
  • Employees - 80 of all computer criminals!
  • Outside users
  • Hackers
  • Crackers
  • Professional criminals

9
9.2 Security Safeguarding Computers
CommunicationsIdentification Access
  • What you have
  • What you know
  • Who you are
  • Cards
  • Keys
  • Signatures
  • Badges

10
Identification Access
  • What you have
  • What you know
  • Who you are
  • PIN (personal identification number) - the
    security number known only to you that is
    required to access the system
  • Password - a special word, code, or symbol
    required to access a computer system

11
Identification Access
  • What you have
  • What you know
  • Who you are
  • Biometrics - science of measuring individual body
    characteristics

Fingerprint check
Iris scan
12
Encryption
  • Encryption - the altering of data so it is not
    usable unless the changes are undone
  • PGP - Pretty Good Privacy, a practically
    unbreakable encryption program
  • DES - Data Encryption Standard, a federal
    standard adopted in 1976

13
Protection of Software Data
  • Control of access - restrict access to data files
    to those with a need to know
  • Audit controls - tracking which programs and
    servers have been used, which files have been
    opened, etc.
  • People controls - check resumé facts prevent
    employee wandering within work site shred
    papers etc.

14
Disaster-Recovery Plan
  • Disaster-recovery plan - a method of restoring
    information processing operations that have been
    halted by destruction or accident
  • Among the countless lessons that computer users
    have absorbed in the hours, days, and weeks after
    the 1993 World Trade Center bombing, the most
    enduring may be the need to have a
    disaster-recovery plan.
  • --New York Times reporter John Holusha

15
9.3 Quality-of-Life Issues The Environment,
Mental Health, the Workplace
  • Environmental problems
  • Manufacturing by-products
  • Disposal by-products
  • Electricity demand
  • Environmental blight

16
Mental-Health Problems
  • Isolation
  • Gambling
  • Stress
  • Internet addiction/dependency

17
Workplace Problems Impediments to Productivity
  • Misuse of technology
  • Fussing with computers
  • Information overload

18
9.4 Economic Issues Employment the
Haves/Have-Nots
  • Technology, the Job Killer?
  • Gap between Rich Poor

19
9.5 The Digital Environment Is There a Grand
Design?
  • The National Information Infrastructure
  • VBNS
  • Internet2

20
The Digital Environment Is There a Grand Design?
  • Next Generation Internet
  • 1996 Telecommunications Act
  • 1997 White House Plan for Internet Commerce
  • ICANN
Write a Comment
User Comments (0)
About PowerShow.com