SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
1




Arab Academy for Science &Technology & Maritime Transport
College of Computing and Information Technology
        Computer Science Department
2




• There	
  are	
  a	
  number	
  of	
  security	
  concerns	
  related	
  to	
  
 computers	
  that	
  users	
  should	
  be	
  aware	
  of,	
  including:	
  
  • Having	
  a	
  PC	
  stolen	
  
  • Losing	
  important	
  data	
  
  • Losing	
  contact	
  lists	
  
  • Pirated	
  or	
  counterfeited	
  products	
  
3
4




• Hardware	
  damage:	
  Can	
  be	
  accidental	
  or	
  inten>onal	
  
• System	
  failure:	
  The	
  complete	
  malfunc>on	
  of	
  a	
  computer	
  
 system	
  
  • Can	
  be	
  due	
  to	
  a	
  hardware	
  problem,	
  so?ware	
  problem,	
  or	
  
    computer	
  virus	
  
  • Can	
  be	
  due	
  to	
  a	
  natural	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
    disaster	
  or	
  planned	
  a@ack	
  
5




• Use	
  door	
  and	
  computer	
  equipment	
  locks	
  
  • Cable	
  locks	
  
  • Security	
  slots	
  
6




• Use	
  encryp7on	
  to	
  protect	
  data	
  
  • Increasingly	
  used	
  with	
  USB	
  flash	
  drives,	
  notebook	
  PCs,	
  
    hard	
  drives,	
  etc.	
  
  • Full	
  disk	
  encryp>on	
  (FDE):	
  Everything	
  on	
  storage	
  medium	
  
    is	
  encrypted	
  
  • Self-­‐encryp>ng	
  hard	
  drive:	
  A	
  hard	
  drive	
  using	
  FDE	
  
7




• Computer	
  tracking	
  so;ware:	
  Used	
  to	
  find	
  a	
  PC	
  a?er	
  it	
  is	
  
  lost	
  or	
  stolen	
  
   • Sends	
  out	
  iden>fying	
  data	
  via	
  the	
  Internet	
  
   • Law	
  enforcement	
  can	
  use	
  this	
  data	
  to	
  recover	
  the	
  PC	
  
   • Most	
  o?en	
  used	
  with	
  PCs	
  but	
  also	
  available	
  for	
  other	
  
     devices	
  
   • Kill	
  switch:	
  So?ware	
  used	
  to	
  destroy	
  sensi>ve	
  data	
  on	
  a	
  
     stolen	
  or	
  lost	
  PC	
  
• Other	
  precau>ons:	
  
   • Alarm	
  so;ware,	
  tamper	
  evident	
  labels,	
  etc.	
  
   • Common	
  sense	
  
8




• Proper	
  hardware	
  care:	
  Needed	
  to	
  prevent	
  damage	
  
  • Ruggedized	
  PCs:	
  Designed	
  	
  
  for	
  more	
  abuse	
  than	
  	
  
  conven>onal	
  hardware	
  	
  
9




• Surge	
  suppressor:	
  Protects	
  
  hardware	
  from	
  damage	
  due	
  
  to	
  electrical	
  fluctua>ons	
  
• Uninterrup7ble	
  power	
  
  supply	
  (UPS):	
  Provides	
  
  con>nuous	
  power	
  to	
  a	
  
  computer	
  system	
  for	
  a	
  
  period	
  of	
  >me	
  a?er	
  the	
  
  power	
  goes	
  off	
  
10




• Also:	
  
   • Watch	
  dust,	
  moisture,	
  
     sta7c,	
  heat,	
  etc.	
  
   • Avoid	
  head	
  crash	
  
   • Stop	
  USB	
  devices	
  
     before	
  removing	
  
   • Use	
  screen	
  protectors,	
  
     jewel	
  cases,	
  etc.	
  
11




• Backup	
  and	
  disaster	
  recovery	
  plans:	
  	
  
  • Both	
  businesses	
  and	
  individuals	
  should	
  use	
  appropriate	
  
    backup	
  procedures	
  
  • Con>nuous	
  data	
  protec>on	
  (CDP):	
  Enables	
  data	
  backups	
  
    to	
  be	
  made	
  on	
  a	
  con>nual	
  basis	
  
  • Backup	
  media	
  needs	
  to	
  be	
  secured	
  
     • Data	
  storage	
  companies	
  store	
  backup	
  media	
  at	
  secure	
  
       remote	
  loca>ons	
  
     • Online	
  backup	
  is	
  another	
  possibility	
  
  • Disaster-­‐recovery	
  plan:	
  Spells	
  out	
  what	
  an	
  organiza>on	
  
    will	
  do	
  to	
  prepare	
  for	
  and	
  recover	
  from	
  a	
  disrup>ve	
  event	
  
     • Hot	
  sites	
  
12




• So;ware	
  piracy:	
  Unauthorized	
  copying	
  of	
  a	
  computer	
  program	
  
  • Widespread,	
  global	
  problem	
  
  • Occurs	
  when:	
  
     • Individuals	
  make	
  illegal	
  copies	
  of	
  so?ware	
  to	
  give	
  to	
  friends	
  
     • Businesses	
  or	
  individuals	
  install	
  so?ware	
  on	
  more	
  than	
  the	
  
       number	
  of	
  computers	
  allowed	
  according	
  to	
  the	
  end-­‐user	
  
       license	
  agreement	
  (EULA)	
  
     • Sellers	
  install	
  unlicensed	
  copies	
  on	
  PCs	
  sold	
  to	
  consumers	
  
     • Large-­‐scale	
  opera>ons	
  in	
  which	
  programs	
  and	
  packaging	
  
       are	
  illegally	
  duplicated	
  and	
  sold	
  as	
  supposedly	
  legi>mate	
  
       products	
  
13




• Digital	
  counterfei7ng:	
  The	
  use	
  of	
  computers	
  to	
  make	
  illegal	
  
 copies	
  of	
  currency,	
  checks,	
  collec>bles,	
  and	
  other	
  items	
  
  • O?en	
  scanned	
  and	
  printed	
  or	
  color-­‐copied	
  
14
15




• Protec7ng	
  against	
  digital	
  counterfei7ng	
  
  • New	
  currency	
  designs	
  
    • Microprin>ng,	
  watermarks,	
  security	
  thread,	
  etc.	
  
    • Special	
  paper	
  is	
  used	
  with	
  U.S.	
  currency	
  
  • Iden>fying	
  technology	
  included	
  in	
  digital	
  imaging	
  
    hardware	
  
  • Digital	
  watermarks:	
  Subtle	
  altera>on	
  to	
  a	
  digital	
  item	
  that	
  
    is	
  not	
  no>ceable	
  but	
  that	
  can	
  be	
  retrieved	
  to	
  iden>fy	
  the	
  
    owner	
  of	
  the	
  item	
  
  • Also	
  can	
  use:	
  
     • Holograms,	
  RFID	
  tags,	
  and	
  other	
  hard-­‐to-­‐reproduce	
  
         content	
  
16




• Privacy:	
  State	
  of	
  being	
  concealed	
  or	
  free	
  from	
  
  unauthorized	
  intrusion	
  
• Informa7on	
  privacy:	
  Rights	
  of	
  individuals	
  and	
  companies	
  
  to	
  control	
  how	
  informa>on	
  about	
  them	
  is	
  collected	
  and	
  
  used	
  
• Computers	
  add	
  addi7onal	
  privacy	
  challenges	
  
   • Many	
  data	
  breaches	
  recently	
  due	
  to	
  lost	
  or	
  stolen	
  
     hardware,	
  carelessness	
  with	
  documents	
  containing	
  
     sensi>ve	
  data,	
  database	
  breaches,	
  etc.	
  
       • Businesses	
  need	
  to	
  be	
  concerned	
  with	
  the	
  expense,	
  
         damage	
  to	
  reputa>on,	
  and	
  possible	
  lawsuits	
  

Mais conteúdo relacionado

Mais procurados

Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Hardware Security
Hardware SecurityHardware Security
Hardware SecurityAkNirojan
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systemsaissa benyahya
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 

Mais procurados (20)

Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Notacd02
Notacd02Notacd02
Notacd02
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 

Destaque

Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 

Destaque (7)

Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 

Semelhante a Lect 07 computer security and privacy 1 4 q

Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15ayahye
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net PresenceEngineers Australia
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptxssuser666f98
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09ayahye
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfShahidMehmood285010
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxssuser666f98
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 

Semelhante a Lect 07 computer security and privacy 1 4 q (20)

Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Data security
Data securityData security
Data security
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptx
 
L49 slides
L49 slidesL49 slides
L49 slides
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Intro to computer.pdf
Intro to computer.pdfIntro to computer.pdf
Intro to computer.pdf
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdf
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptx
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 

Lect 07 computer security and privacy 1 4 q

  • 1. 1 Arab Academy for Science &Technology & Maritime Transport College of Computing and Information Technology Computer Science Department
  • 2. 2 • There  are  a  number  of  security  concerns  related  to   computers  that  users  should  be  aware  of,  including:   • Having  a  PC  stolen   • Losing  important  data   • Losing  contact  lists   • Pirated  or  counterfeited  products  
  • 3. 3
  • 4. 4 • Hardware  damage:  Can  be  accidental  or  inten>onal   • System  failure:  The  complete  malfunc>on  of  a  computer   system   • Can  be  due  to  a  hardware  problem,  so?ware  problem,  or   computer  virus   • Can  be  due  to  a  natural                                                                                                       disaster  or  planned  a@ack  
  • 5. 5 • Use  door  and  computer  equipment  locks   • Cable  locks   • Security  slots  
  • 6. 6 • Use  encryp7on  to  protect  data   • Increasingly  used  with  USB  flash  drives,  notebook  PCs,   hard  drives,  etc.   • Full  disk  encryp>on  (FDE):  Everything  on  storage  medium   is  encrypted   • Self-­‐encryp>ng  hard  drive:  A  hard  drive  using  FDE  
  • 7. 7 • Computer  tracking  so;ware:  Used  to  find  a  PC  a?er  it  is   lost  or  stolen   • Sends  out  iden>fying  data  via  the  Internet   • Law  enforcement  can  use  this  data  to  recover  the  PC   • Most  o?en  used  with  PCs  but  also  available  for  other   devices   • Kill  switch:  So?ware  used  to  destroy  sensi>ve  data  on  a   stolen  or  lost  PC   • Other  precau>ons:   • Alarm  so;ware,  tamper  evident  labels,  etc.   • Common  sense  
  • 8. 8 • Proper  hardware  care:  Needed  to  prevent  damage   • Ruggedized  PCs:  Designed     for  more  abuse  than     conven>onal  hardware    
  • 9. 9 • Surge  suppressor:  Protects   hardware  from  damage  due   to  electrical  fluctua>ons   • Uninterrup7ble  power   supply  (UPS):  Provides   con>nuous  power  to  a   computer  system  for  a   period  of  >me  a?er  the   power  goes  off  
  • 10. 10 • Also:   • Watch  dust,  moisture,   sta7c,  heat,  etc.   • Avoid  head  crash   • Stop  USB  devices   before  removing   • Use  screen  protectors,   jewel  cases,  etc.  
  • 11. 11 • Backup  and  disaster  recovery  plans:     • Both  businesses  and  individuals  should  use  appropriate   backup  procedures   • Con>nuous  data  protec>on  (CDP):  Enables  data  backups   to  be  made  on  a  con>nual  basis   • Backup  media  needs  to  be  secured   • Data  storage  companies  store  backup  media  at  secure   remote  loca>ons   • Online  backup  is  another  possibility   • Disaster-­‐recovery  plan:  Spells  out  what  an  organiza>on   will  do  to  prepare  for  and  recover  from  a  disrup>ve  event   • Hot  sites  
  • 12. 12 • So;ware  piracy:  Unauthorized  copying  of  a  computer  program   • Widespread,  global  problem   • Occurs  when:   • Individuals  make  illegal  copies  of  so?ware  to  give  to  friends   • Businesses  or  individuals  install  so?ware  on  more  than  the   number  of  computers  allowed  according  to  the  end-­‐user   license  agreement  (EULA)   • Sellers  install  unlicensed  copies  on  PCs  sold  to  consumers   • Large-­‐scale  opera>ons  in  which  programs  and  packaging   are  illegally  duplicated  and  sold  as  supposedly  legi>mate   products  
  • 13. 13 • Digital  counterfei7ng:  The  use  of  computers  to  make  illegal   copies  of  currency,  checks,  collec>bles,  and  other  items   • O?en  scanned  and  printed  or  color-­‐copied  
  • 14. 14
  • 15. 15 • Protec7ng  against  digital  counterfei7ng   • New  currency  designs   • Microprin>ng,  watermarks,  security  thread,  etc.   • Special  paper  is  used  with  U.S.  currency   • Iden>fying  technology  included  in  digital  imaging   hardware   • Digital  watermarks:  Subtle  altera>on  to  a  digital  item  that   is  not  no>ceable  but  that  can  be  retrieved  to  iden>fy  the   owner  of  the  item   • Also  can  use:   • Holograms,  RFID  tags,  and  other  hard-­‐to-­‐reproduce   content  
  • 16. 16 • Privacy:  State  of  being  concealed  or  free  from   unauthorized  intrusion   • Informa7on  privacy:  Rights  of  individuals  and  companies   to  control  how  informa>on  about  them  is  collected  and   used   • Computers  add  addi7onal  privacy  challenges   • Many  data  breaches  recently  due  to  lost  or  stolen   hardware,  carelessness  with  documents  containing   sensi>ve  data,  database  breaches,  etc.   • Businesses  need  to  be  concerned  with  the  expense,   damage  to  reputa>on,  and  possible  lawsuits