Get Started. It's Free
or sign up with your email address
Chapter 8 by Mind Map: Chapter 8

1. Dimensions of privacy

1.1. Psychological: to have a sense of control

1.2. Legal: to be able to protect yourself

2. Hardware key logger

2.1. hardware device that captures keystrokes moving between keyboard and motherboard

3. – the right to left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

4. PRIVACY

4.1. Key logger software

4.1.1. a program that, when installed on a computer, records every keystroke and mouse click

5. Identity Theft

5.1. the forging of someone’s identity for the purpose of fraud

5.2. Phishing

5.2.1. a technique to gain personal information for the purpose of identity theft

5.3. Spear phishing

5.3.1. targeted to specific individuals with something in common—they work at the same company, bank at the same financial institution, attend the same college

5.4. Whaling

5.4.1. targeted to senior business executives and government leaders

6. Pharming

6.1. rerouting your request for a legitimate Web site

6.1.1. sending it to a slightly different Web address

6.1.2. redirecting you after you are already on the legitimate site

6.2. Reasons for Monitoring

6.2.1. Hire the best people possible

6.2.2. Ensure appropriate behavior on the job

7. Cookie

7.1. – a small file that contains information about you and your Web activities, which a Web site places on your computer

7.2. Handle by using:

7.2.1. Web browser cookie management option

7.2.2. Buy a program that manages cookies

8. Spam

8.1. unsolicited e-mail from businesses advertising goods and servicesl

9. Adware

9.1. – software to generate ads that installs itself when you download another program

10. Spyware (sneakware, stealthware)

10.1. software that comes hidden in downloaded software and helps itself to your computer resources

11. Ethics

11.1. the principles and standards that guide our behavior toward other people

12. Actions in ethical dilemmas determined by

12.1. Your basic ethical structure

12.1.1. Minor ethical violations

12.1.2. Serious ethical violations

12.1.3. Very serious ethical violations

12.2. The circumstances of the situation

12.2.1. Consequences

12.2.2. Society’s opinion

12.2.3. Time to consequences

12.2.4. Relatedness of people who will be affected

12.2.5. Reach of result

13. Intellectual Property

13.1. intangible creative work that is embodied in physical form

13.2. Copyright – legal protection afforded an expression of an idea

13.3. Fair Use Doctrine – may use copyrighted material in certain situations

13.4. Pirated software – the unauthorized use, duplication, distribution, or sale of copyrighted software

14. Trojan horse software

14.1. software you don’t want inside software you do want

14.2. some way to detect

14.2.1. AdAware at www.lavasoftUSA.com

14.2.2. The Cleaner at www.moosoft.com

14.2.3. Trojan First Aid Kit (TFAK) www.wilders.org

14.2.4. Check it out before you download www.spychecker.com

15. Web log

15.1. one line of information for every visitor to a Web site

16. Clickstream

16.1. records information about you such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.

17. Anonymous Web browsing (AWB)

17.1. hides your identity from the Web sites you visit

17.1.1. The Anonymizer at www.anonymizer.com

17.1.2. SuftSecret at www.surfsecret.com

18. Security and Outside Threats

18.1. Hackers – knowledgeable computer users who invade other people's computers

18.2. Computer virus (virus) – software that is written with malicious intent to cause annoyance or damage

18.3. Worm – virus that spreads itself from computer to computer usually via e-mail

18.4. Denial-of-service (DoS) attack – floods a Web site with so many requests for service that it slows down or crashes

19. Security Measures

19.1. Anti-virus software – detects and removes or quarantines computer viruses

19.2. Anti-spyware and anti-adware software Spam protection software – identifies and marks and/or deletes Spam

19.3. Anti-phishing software – lets you know when phishing attempts are being made

19.4. Firewall – hardware and/or software that protects a computer or network from intruders

19.5. Encryption – scrambles the contents of a file so that you can’t read it without the decryption key

19.6. Biometrics – the use of physiological characteristics for identification purposes