Using Information Technology Chapter 9 The Challenges of the Digital Age.

Презентация:



Advertisements
Похожие презентации
Using Information Technology Chapter 1 Introduction to Information Technology.
Advertisements

© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Managing Cisco Devices.
The most popular professions in America. Statistics : In 2012, half of the popular professions were health workers. U.S. Bureau of Labor Statistics reports.
The advantages of computers the disadvantages of computers the advantages of computers the disadvantages of computers.
Using Information Technology Chapter 1 Introduction to Information Technology.
Copyright 2003 CCNA 4 Chapter 11 Scaling IP Addresses By Your Name.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
DISCUSSION PRESENTATION Prepared and held by 11A, School 5, Monastyrysche 2011.
COMPUTERS 1. Computers and computer equipment. screen/monitor CD-ROM drive printer floppy disc mouse mouse pad/mat modem floppy disc drive CD-ROMS keyboard.
Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. Trojans Viruses that pretend to be helpful programs.
"Cloud services" - what it is.. First of all – it is innovative online services. They provide an opportunity to use the enormous potential of the Internet.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Overview of the Paysonnel CE. Overview Paysonnel CE Go to URL- 1 Click [Login to Paysonnel CE] 2 How to Log-in to Paysonnel CE 1 2.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Connecting to Remote Networks Understanding WAN Technologies.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
© 2009 Avaya Inc. All rights reserved.1 Chapter Two, Voic Pro Components Module Two – Actions, Variables & Conditions.
Designing Enterprise Edge Connectivity © 2004 Cisco Systems, Inc. All rights reserved. Designing the Remote Access Module ARCH v
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Транксрипт:

Using Information Technology Chapter 9 The Challenges of the Digital Age

2 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. The Challenges of the Digital Age Society & Information Technology Today 9.1Security Issues: Threats to Computers & Communications Systems 9.2Security: Safeguarding Computers & Communications 9.3Quality-of-Life Issues: The Environment, Mental Health, & the Workplace 9.4Economic Issues: Employment & the Haves/Have- Nots 9.5The Digital Environment: Is There a Grand Design?

The Challenges of the Digital Age 3 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.1 Security Issues: Threats to Computers & Communications Systems Errors & Accidents: Human errors - humans cant assess own information needs - human emotions affect performance - humans act on their perceptions Software errors Procedural errors Electromechanical problems Dirty data problems

The Challenges of the Digital Age 4 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors – computer failures occur as a result of non-compliance of procedures Software errors Electromechanical problems Dirty data problems

The Challenges of the Digital Age 5 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors Software errors – software bugs Electromechanical problems Dirty data problems

The Challenges of the Digital Age 6 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors Software errors Electromechanical problems – failure of mechanical systems due to faulty construction, overheating, wearing out, or damage Dirty data problems

The Challenges of the Digital Age 7 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Errors & Accidents Human errors Procedural errors Software errors Electromechanical problems Dirty data problems - incomplete, outdated, or otherwise inaccurate data

The Challenges of the Digital Age 8 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Natural & Other Hazards Natural hazards Civil strife and terrorism

The Challenges of the Digital Age 9 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware - shoplifting an accessory Theft of software and data Theft of time and services Theft of information Crimes of malice and destruction

The Challenges of the Digital Age 10 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data - illegal copying of programssoftware Theft of time and services Theft of information Crimes of malice and destruction

The Challenges of the Digital Age 11 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data Theft of time and services – using employers computer time to play games Theft of information Crimes of malice and destruction

The Challenges of the Digital Age 12 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data Theft of time and services Theft of information – stealing confidential personal records Crimes of malice and destruction

The Challenges of the Digital Age 13 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Against Computers & Communications Theft of hardware Theft of software and data Theft of time and services Theft of information Crimes of malice and destruction – abusing or vandalizing computers

The Challenges of the Digital Age 14 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Crimes Using Computers & Communications Using information technology to assist in a crime Investment fraud Tools to detect fraud: Rule-based-detection software Predictive-statistical model software

The Challenges of the Digital Age 15 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Worms & Viruses Worm - a program that copies itself repeatedly into a computers memory or onto a disk drive Virus Virus - a deviant program, stored on a computer drive, that can cause unexpected and often undesirable effects, such as destroying or corrupting data Anti-virus software - scans a computers hard disk, floppy disks, and main memory to detect viruses and destroy them

The Challenges of the Digital Age 16 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Computer Criminals HackersHackers - gain unauthorized access to computer or telecommunications systems Crackers - illegally break into computers for malicious purposes Employees - more than 80% of all IT crime perpetrators Outside users - suppliers and clients Professional criminals - organized crime rings

The Challenges of the Digital Age 17 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.2 Security: Safeguarding Computers & Communications Security - system of safeguards for protecting information technology Identification & Access Encryption Protection of software and data Disaster-recovery plans

The Challenges of the Digital Age 18 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Identification & Access What you have - What you know Who you are Cards Keys Signatures Badges

The Challenges of the Digital Age 19 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Identification & Access What you have What you know… Who you are PIN (personal identification number) - the security number known only to you that is required to access the system Password - a special word, code, or symbol required to access a computer system

The Challenges of the Digital Age 20 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Identification & Access What you have What you know Who you are… Iris scan BiometricsBiometrics - science of measuring individual body characteristics

The Challenges of the Digital Age 21 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Encryption Encryption - the process of altering readable data into unreadable form to prevent authorized access Private key - same secret key used by both sender and receiver Public key - two keys are used

The Challenges of the Digital Age 22 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Protection of Software & Data Control of access - restricts access to data files to those with a need to know Audit controls – track which programs and servers were used, which files have been opened, etc. People controls - check resumé facts, separate employee functions, shred papers, etc.

The Challenges of the Digital Age 23 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Disaster-Recovery Plan Disaster-recovery plan - a method of restoring information-processing operations that have been halted by destruction or accident

The Challenges of the Digital Age 24 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.3 Quality-of-Life Issues: The Environment, Mental Health, & the Workplace Environmental problems: Manufacturing by-products - exposing semiconductor industry workers to a variety of hazardous toxins Disposal by-products Environmental blight Possible risks of nanotechnology

The Challenges of the Digital Age 25 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Environmental problems: Manufacturing by-products Disposal by-products - e-waste - obsolete or broken PCs, monitors, printers, cellphones, TVs and other electronics Environmental blight Possible risks of nanotechnology

The Challenges of the Digital Age 26 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Environmental problems: Manufacturing by-products Disposal by-products Environmental blight - visual pollution represented by wireless towers, roof antennas, satellite dishes, and all the utility poles topped with transformers and strung with electric, phone, cable-TV, and other wires Possible risks of nanotechnology

The Challenges of the Digital Age 27 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Environmental problems: Manufacturing by-products Disposal by-products Environmental blight Possible risks of nanotechnology - manipulating materials such as carbon, zinc, and gold at molecular level

The Challenges of the Digital Age 28 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Mental-Health Problems Isolation - going for days without actually speaking with or touching another person Gambling - information technology makes it almost unavoidable Stress - 83% of corporate network administrators reported abusive and violent behavior by employees toward computers

The Challenges of the Digital Age 29 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Workplace Problems: Impediments to Productivity Misuse of technology - computers may be costing U.S. companies tens of billions of dollars a year in downtime, maintenance and training costs, game playing, and information overload Fussing with computers - all the fussing that employees do with hardware, software, and online connections Information overload - employees tend to work longer hours under more severe deadline pressure

The Challenges of the Digital Age 30 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.4 Economic Issues: Employment & the Haves/Have-Nots Technology, the Job Killer? Hundreds of companies are replacing service representatives with voice software. Gap between Rich & Poor Employees with technology skills earn roughly 10–15% higher pay

The Challenges of the Digital Age 31 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. 9.5 The Digital Environment: Is There a Grand Design? Internet2 - a cooperative university/business education and research project that enables high-end users to quickly and reliably move huge amounts of data over high-speed networks The 1996 Telecommunications Act - designed to let phone, cable, and TV businesses compete and combine more freely

The Challenges of the Digital Age 32 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. The Digital Environment: Is There a Grand Design? ICANN – a private corporation that regulates the domain names that overlie IP addresses and identify the website type Whom Does the Internet Serve? In a World of Breakneck Change, Can You Still Thrive? upgrade your skills, specialize, and market yourself

The Challenges of the Digital Age 33 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the science of measuring individual body characteristics called? Biometrics

The Challenges of the Digital Age 34 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is an example of biometrics? Fingerprint, palm print, iris scan, retinal scan

The Challenges of the Digital Age 35 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What non-profit organization was established to regulate Internet domain names? ICANN (Internet Corporation for Assigned Names & Numbers)

The Challenges of the Digital Age 36 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the name for a person who illegally breaks into computers for malicious purposes? Cracker

The Challenges of the Digital Age 37 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the name for a program that copies itself repeatedly into a computers memory or onto a disk drive until no space is left? Worm

The Challenges of the Digital Age 38 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What are the two broad categories of computer crime? 1. Crimes against computers or telecommunications 2. Crimes using computers or telecommunications

The Challenges of the Digital Age 39 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What group makes up the largest group of computer criminals? Employees

The Challenges of the Digital Age 40 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for data which is incomplete, outdated, or otherwise inaccurate? Dirty data

The Challenges of the Digital Age 41 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for the gap between those with and without access to information technology? Digital divide

The Challenges of the Digital Age 42 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What type of software is used to alter data so that it is not usable unless the changes are undone? Encryption software

The Challenges of the Digital Age 43 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for an error in a program that causes it not to work properly? Software glitch or software bug

The Challenges of the Digital Age 44 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a deviant program that can cause unexpected and often undesirable effects? Virus

The Challenges of the Digital Age 45 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What are the two ways worms and viruses can be passed? By floppy disk By the Internet or some other network

The Challenges of the Digital Age 46 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a system of safeguards to protect information technology? Security

The Challenges of the Digital Age 47 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What scans a computers hard disk, floppy disks, and main memory to detect viruses and destroy them? Anti-virus software

The Challenges of the Digital Age 48 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a special word, code, or symbol required to access a system? Password

The Challenges of the Digital Age 49 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for the security number known only to the user and required to access the system? Personal identification number (PIN)

The Challenges of the Digital Age 50 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What are the two basic forms of encryption? Private-key or symmetric encryption Public-key encryption

The Challenges of the Digital Age 51 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for a method of restoring information- processing operations halted by destruction or accident? Disaster-recovery plan

The Challenges of the Digital Age 52 Copyright © Exclusive rights by The McGraw-Hill Companies, Inc. Concept Check What is the term for manipulating materials at the molecular level? Nanotechnology