Computer Science 210: Introduction to Information Systems and Computer Applications

Study Guide

Unit 5 – Computer Security and Privacy

Learning Outcomes

When you have completed this unit, you should be able to

  1. Explain the importance of computer security for users.
  2. List and discuss risks to the physical security and integrity of computer systems and strategies for protection.
  3. Define and discuss software piracy and digital counterfeiting.
  4. Define and discuss the importance of information privacy.
  5. List and discuss specific concerns and threats relating to information privacy.
  6. Describe and discuss electronic surveillance.
  7. Discuss the status of computer security and information privacy legislation.

Required Reading

eText Chapter 5, including Summary

Review Activities

Complete the Self-Quiz at the end of the chapter.

Assessment

See Unit 0 for more details about the following activities: