13 privacy n health.ppt compatibility mode copy

Upload: bagus-fatkhurrozi

Post on 13-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    1/30

    Pertemuan 13

    Understanding ComputersPrivacy & Health Concerns

    1

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    2/30

    Learning Outcomes

    Pada akhir pertemuan ini, diharapkan mahasiswa

    akan mampu :

    menunjukkan pentingnya privasi informasi

    serta kesehatan pengguna komputer

    2

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    3/30

    Outline Materi

    System Failure & Backup

    Ethics and Society

    Information Privacy

    Health Concerns of Computer Use

    3

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    4/30

    System Failure

    What is a system failure?

    4

    Undervoltagedrop

    in electrical supply

    Overvoltage orpower surge

    significant increase

    in electrical power

    Noiseunwanted

    electrical signal

    Caused by aging hardware,Caused by aging hardware,

    natural disasters, or electricalnatural disasters, or electrical

    power disturbancespower disturbances

    Can cause loss of hardware,Can cause loss of hardware,

    software, or datasoftware, or data

    Prolonged malfunctionProlonged malfunction

    of computerof computer

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    5/30

    System Failure

    What is a surge protector?

    5

    Protects computer and

    equipment from electrical power

    disturbances

    Uninterruptible power supply(UPS) is surge protector that

    provides power during power loss

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    6/30

    Backing Up The Ultimate

    Safeguard

    What is a backup?

    6

    Duplicate of file, program, or disk

    Full backupFull backup

    all files in

    computer

    Full backupFull backup

    all files in

    computer

    Selective backupSelective backup

    select which files

    to back up

    Selective backupSelective backup

    select which files

    to back up

    ThreeThree--generationgeneration

    backupbackup

    preserves

    three copies of

    important files

    ThreeThree--generationgeneration

    backupbackup

    preserves

    three copies of

    important files

    In case of system failure or corrupted files,

    restore files by copying to original location

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    7/30

    Internet Security Risks

    What is a denial of service attack?

    7

    Computer Emergency

    Response Team Coordination

    Center (CERT/CC) assistswith DDoS attacks

    Hacker uses unsuspecting

    computer, called zombie, to

    execute attack on other systems

    Distributed DoS (DDoS) attack

    is more devastating DoS attack

    in which multiple computersattack multiple networks

    Also called DoS attack

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    8/30

    Internet Security Risks

    How do Web browsers provide secure datatransmission?

    8

    Secure siteSecure siteis Web site that uses

    encryption to secure data

    Digital certificateDigital certificate is notice that

    guarantees Web site is legitimate

    Many Web browsers

    use encryption

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    9/30

    Internet Security Risks

    What is a certificate authority (CA)?

    9

    Authorized person

    or company that

    issues and verifies

    digital certificates Users apply for

    digital certificate

    from CA

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    10/30

    Internet Security Risks

    What is Secure Sockets Layer (SSL)?

    10

    Provides encryption of all data that passes between

    client and Internet server

    Web addresses

    beginning withhttps indicate

    secure connections

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    11/30

    Internet Security Risks

    What are methods for securing e-mailmessages?

    11

    Digital signature

    is encrypted

    code attached to

    e-mail message

    to verify identity

    of sender

    Freeware for

    personal, non-

    commercial use

    Pretty Good

    Privacy (PGP)

    is popular

    e-mail encryption

    program

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    12/30

    Ethics and Society

    What are computer ethics?

    12

    Information privacyInformation privacy

    Intellectual property

    rightsrights to which

    creators are entitled for

    their work

    Intellectual property

    rightsrights to which

    creators are entitled for

    their work

    Software theftSoftware theft Information accuracyInformation accuracy

    Codes of conductCodes of conduct

    Unauthorized use of

    computers andnetworks

    Unauthorized use of

    computers andnetworks

    Moral guidelines that govern use of computers and information systemsMoral guidelines that govern use of computers and information systems

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    13/30

    Ethics and Society

    What is an IT code of conduct?

    13

    Written guideline that helps determine whether

    computer action is ethical

    Employers can distribute to employeesIT CODE OF CONDUCT

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    14/30

    Information Privacy

    What is information privacy?

    14

    Legal for employers to use

    monitoring software programs

    Difficult to maintain today

    because data is stored online

    Employee monitoring is using

    computers to observe employee

    computer use

    Right of individuals and

    companies to restrict collection

    and use of information about them

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    15/30

    Information Privacy

    What are some ways to safeguard personal

    information?

    15

    Fill in necessary information

    on rebate, warranty, and

    registration forms

    Avoid shopping cluband buyers cards

    Install a cookie manager

    to filter cookies

    Inform merchants that you

    do not want them to distribute

    your personal information

    Limit the amount of information

    you provide to Web sites; fill

    in only required information

    Clear your history file when

    you are finished browsing

    Set up a free e-mail account;

    use this e-mail address for

    merchant forms

    Turn off file and print sharing

    on your Internet connection

    Install a personal firewall

    Sign up for e-mail

    filtering through your

    Internet service provider or

    use an antispam program,

    such as Brightmail

    Do not reply to spam

    for any reason

    Surf the Web anonymously

    with a program such asFreedom Web Secure or

    through an anonymous

    Web site such as

    Anonymizer.com

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    16/30

    Information Privacy

    What is an electronic profile?

    16

    Data collected when you fill out form on Web

    Merchants sell

    your electronic

    profile Often you can

    specify whether

    you want

    personal

    information

    distributed

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    17/30

    Information Privacy

    What is a cookie?

    17

    Set browser to

    accept cookies,

    prompt you to

    accept cookies,

    or disable

    cookies

    Some Web sites

    sell or trade

    informationstored in your

    cookies

    Small file on

    your computer

    that contains

    data about you

    User

    preferences

    Interests

    andbrowsing

    habits

    How

    regularly

    you visit

    Web sites

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    18/30

    Information Privacy

    How do cookies work?

    18

    Step 1. When you type Web

    address of Web site in your

    browser window, browser

    program searches your hard

    disk for a cookie associated

    with Web site.

    Step 2. If browser finds a

    cookie, it sends information in

    cookie file to Web site.

    Step 3. If Web site does not receive

    cookie information, and is expecting it,

    Web site creates an identification number

    for you in its database and sends thatnumber to your browser. Browser in turn

    creates a cookie file based on that number

    and stores cookie file on your hard disk.

    Web site now can update information in

    cookie files whenever you access the site.

    Web server for

    www.company.com

    http://www.company.com/http://www.company.com/
  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    19/30

    Information Privacy

    What is a cookie manager?

    19

    Software program that selectively

    blocks cookies

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    20/30

    Information Privacy

    What are spyware and spam?

    20

    Spyware is program

    placed on computer

    without users

    knowledge Secretly collects

    information about user Spam is unsolicited

    e-mail message sent

    to many recipients

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    21/30

    Information Privacy

    How can you control spam?

    21

    Collects spam in

    central locationthat you can

    view any time

    Service that

    blocks e-mail

    messages fromdesignated

    sources

    EE--mail filteringmail filtering

    Sometimes

    removes valid

    e-mail messages

    Attempts to

    remove spam

    AntiAnti--spam programspam program

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    22/30

    Information Privacy

    What privacy laws have been enacted?

    22

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    23/30

    Information Privacy

    What privacy laws have been enacted?(contd)

    23

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    24/30

    Information Privacy

    What is content filtering?

    24

    Process of restricting access to certain material

    Internet Content Rating

    Association (ICRA)

    provides rating systemof Web content

    Web filtering software

    restricts access to

    specified sites

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    25/30

    ea oncerns o ompu er

    Use

    What are some health concerns ofcomputer use?

    25

    Computer vision syndromeComputer vision syndrome

    (CVS)(CVS)eye and visioneye and vision

    problemsproblems

    Computer vision syndromeComputer vision syndrome

    (CVS)(CVS)eye and visioneye and vision

    problemsproblems

    Repetitive strain injury (RSI)Repetitive strain injury (RSI)Repetitive strain injury (RSI)Repetitive strain injury (RSI)

    Computer addictionComputer addictionwhenwhen

    computer consumes entirecomputer consumes entire

    social lifesocial life

    Computer addictionComputer addictionwhenwhen

    computer consumes entirecomputer consumes entire

    social lifesocial life

    TendonitisTendonitisinflammation ofinflammation of

    tendon due to repeated motiontendon due to repeated motion

    TendonitisTendonitisinflammation ofinflammation of

    tendon due to repeated motiontendon due to repeated motion

    Carpal tunnel syndromeCarpal tunnel syndrome(CTS)(CTS)inflammation of nerveinflammation of nerve

    that connects forearm to palmthat connects forearm to palm

    Carpal tunnel syndromeCarpal tunnel syndrome(CTS)(CTS)inflammation of nerveinflammation of nerve

    that connects forearm to palmthat connects forearm to palm

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    26/30

    ea oncerns o ompu er

    Use

    What precautions can prevent tendonitis orcarpal tunnel syndrome?

    26

    Take frequent breaks during computer session

    Use wrist rest

    Exercise handsand arms

    Minimize number

    of times you switch

    between mouse and

    keyboard

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    27/30

    ea oncerns o ompu er

    Use

    How can you easeeyestrain whenworking at the

    computer?

    27

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    28/30

    ea oncerns o ompu er

    Use

    What is ergonomics?

    28

    Applied science devoted to comfort, efficiency, and

    safety in workplace

    keyboard

    height: 23

    to 28

    feet flat on floor

    adjustable

    height chair

    with 5 legs

    for stability

    adjustable

    seat

    adjustable

    backrest

    elbows at 90

    and arms and

    hands parallel

    to floor

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    29/30

    ea oncerns o ompu er

    Use

    What is green computing?

    29

    Reducing electricity and environmental waste while

    using computer

  • 7/27/2019 13 Privacy n Health.ppt Compatibility Mode Copy

    30/30

    Source : Shelly, Gary B. DiscoveringComputers (2004/2005/2006). Thomson

    Course Technology. PPT for Chapter 11.

    30