Beruflich Dokumente
Kultur Dokumente
Artificial Intelligence
Web Technology
Ecommerce
Security
Health Issues
Information Ethics
Artificial Intelligence
The science and engineering of making
intelligent machines, especially intelligent
computer programs
Specific Applications
Game playing
Speech recognition
Understanding natural language
Computer vision
Expert systems
Heuristic classification
Artificial Intelligence
Turing Test
Is designed to satisfactorily identify if the machine is
intelligent
To pass the test, the machine should possess the
following:
Natural language processing to enable it to communicate
successfully
Knowledge representation to store information provided before
or during the interrogation
Machine learning to adapt to new circumstances and to detect
and extrapolate patterns
Computer vision to perceive objects
Robotics to move about
Web Technology
Internet
Refers to a collection of computers and cables
forming a communications network
Is intended to carry computer data, similar to
telephone network which is intended to carry
conversations
Carries a various data, including e-mail,
videoconferences, instant messages, and
contents of Web pages
Web Technology
Intranet
Is a private network contained in an enterprise
that includes connections through one or more
gateway computers to the outside internet
Extranet
Is a private network that uses Internet
technology and the public telecommunication
system to securely share part of a business
information or operations with suppliers,
vendors, partners, customers, or other
businesses
Web Technology
Web browser
Is an application software allowing users to
access and view web pages
Web page
Is a page consisting of HTML documents stored
on a web server
Web site
Is a collection of connected web pages stored
on a web server
Web Technology
Hypertext
Is a computer system that could store literary
documents, link them according to logical
relationships, and permit readers to comment
and annotate what they read
HTML (Hypertext Markup Language)
Refers to plain text, or ASCII, document with
embedded HTML tags
Web Technology
Other Internet Services
Electronic Mail
File Transfer Protocol (FTP)
Newsgroup and Message Boards
Mailing Lists
Chat Rooms
Instant Messaging
Internet Telephony
Web Technology
Types of Web sites
Portal
News
Informational
Business/Marketing
Educational
Entertainment
Advocacy
Blog (Web Log)
Personal
Web Technology
Search Engine
Is a program that finds web sites and pages
Helps the user find particular information
about certain topics or locate particular web
pages for which they do not know the exact
web address
Is a search text box is available where you will
enter your topic or subject to research
Web Technology
Benefits to Consumers
Convenience
Informative
Value presented upfront: demo and free download
No long wait times
Easy flow and navigation
Search capabilities
Engaging presentation
Constant updates
Easy to buy
E-commerce
Disadvantages of E-commerce
Cost and Justification
Security and Privacy
Lack of trust and user resistance
Other limiting factors
E-commerce
Major Types
Market Relationships
Business-to-Consumers (B2C)
Business-to-Business (B2B)
Consumer-to-Consumer (C2C)
Technology-based
Peer-to-Peer (P2P)
Mobile Commerce (M-Commerce)
Security
Computer Crimes
Could reasonably include a wide variety of
criminal offenses, activities, or issues
Can be separated into two (2) categories
Crimes facilitated by a computer
Crimes where the computer is the target
Security
Threats to Security
Viruses and worms
Intruders
Insiders
Criminal organizations
Terrorists and information warfare
Security
Security Basics
Computer vs. Network Security
Computer security focuses on security aspects of
systems in isolation.
e.g. viruses, secure data storage, OS security
Network security focuses on security of data as it is
transmitted between networked systems.
e.g. authentication protocols, encryption of
transmitted data, firewalls
Security
The CIA of Security
Confidentiality information should not be
disclosed to unauthorized individuals
Integrity information should not be modified
except by individuals authorized to do so
Availability hardware, software, and data
should be accessible
Authentication
Nonrepudiation
Security
Three Ways an Organization can choose to
address the Protection of its Network
Ignore security issues
Provide host security
Takes a granular view of security by focusing on
protecting each computer and device individually instead
of addressing protection of the network as a whole
Approach security at a network level
Emphasis is placed on controlling access to internal
computers from external entities
Security
Least Privilege
Means that a subject (which may be a user,
application, or process) should have only the
necessary rights and privileges to perform its task
with no additional permissions
This concept applies to more network security
issues than just providing users with specific rights
and permissions
Another issue with this concept is the security
context in which an application runs
Security
Layered Security
Network security
Network security
Host security
Host security
Audit logs
(Detection)
Access controls
Intrusion detection systems (Detection)
Firewall (Prevention)
Security
Diversity of Defense
Is a concept that complements the idea of various
layers of security
Involves making different layers of security
dissimilar so that even if attackers know how to get
through a system making up one layer, they may
not know how to get through a different type of
layer that employs a different system for security
Security
Access Control
Discretionary Access Control
Is an access control mechanism in which the owner of an
object (such as a file) can decide which other subjects
(such as other users) may have access to the object, and
what access (read, write, execute) these subjects may
have
Mandatory Access Control
Is an access control mechanism in which the security
mechanism controls access to all objects (files), and
individual subjects (processes or users) cannot change
that access
Security
Equipment Checklist
Buying Tips
Ask for equipment that meets American National Standards
Institute (ANSI) standards
Try equipment out before purchasing whenever possible
Computer Terminal
Easy to use brightness and control knobs
No perceptible screen flicker
Detachable keyboard
Reduced electromagnetic fields (EMF) emissions
Tiltable screen
Character size at least 3/16"
Health Issues
Chair
Back provides firm lower and mid-back support
Adjustable arm rests, if needed to prevent shoulder fatigue
Seat and back easily adjustable for height and tilt from seated
position without use of tools
Seat upholstered and padded, curves down at front edge
5 casters for stability
Table
Adjustable easily from seated position without use of tools
Bi-level to allow independent adjustment of screen and keyboard
Adequate leg room
Adequate table top space for required tasks
Health Issues
Privacy
Refers to the right of people not to reveal
information about them
Is the right to keep personal information, such as
personal e-mail messages, medical histories,
student records, and financial information from
getting into the wrong hands
Information Ethics
Privacy at Work
Some experts believe that there will be a collision
between workers who want their privacy and
companies that demand to know more about their
employees
Computer-monitoring systems tie directly into
computerized workstations; specialized computer
programs can track every keystroke made by user
Information Ethics
Property
Many networks have audit controls to track which
files opened, which programs and servers were
used, and so on
This creates an audit trail, a record of how a
transaction was handled from input through
processing and output
Information Ethics
Computer Crime
Computer Crime Laws
Fair Credit Reporting Act of 1970 (FCRA)
Freedom of Information Act of 1970
Tax Reform Act of 1976
Rights to Financial Privacy Act of 1978
Electronic Funds Transfer Act of 1979
Information Ethics
Data Alteration/Thef
Is the intentional use of illegal and destructive
programs to alter or destroy data is as much a
crime as destroying tangible goods
Most common of these types of programs are viruses
and worms
There are more than 53,000 known computer viruses
today, with more than 6,000 new viruses and worms
being discovered each year
Information Ethics
Malicious Access
Are crimes involving illegal system access and use of
computer services are a concern to both
government and business
Federal, state, and local government computers are
sometimes left unattended over weekends without
proper security
University computers are often used for commercial
purposes under the pretense of research or other
legitimate academic pursuits
Information Ethics
Computer Viruses
Application Virus
infects executable application files such as word processing
programs
infects the computer system
can often be detected by checking the length or size of the
file
System Virus
typically infects operating system programs or other systems
files
usually infects the system as soon as the computer is started
Information Ethics
Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other
people.
2. Thou shalt not interfere with other peoples
computer work.
3. Thou shalt not snoop around in other peoples files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
Information Ethics
6. Thou shalt not use or copy software for which you have
not paid.
7. Thou shalt not use other peoples computer resources
without authorization.
8. Thou shalt not appropriate other peoples intellectual
output.
9. Thou shalt think about the social consequences of the
program you write.
10. Thou shalt use a computer in ways that show
consideration and respect.