Issues for Computer Users, Electronic Devices, Computer and Safety.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Protecting Your Identity: What to Know, What to Do.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Unethical use of Computers and Networks
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Robert Crawford, MBA West Middle School.  Identify techniques that intruders use to attack computer systems.  Discuss different types of cybercrime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Add video notes to lecture
IT Security  .
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
HOW DO I KEEP MY COMPUTER SAFE?
INFS 452 – Computer Ethics & Society
Privacy, Security, and Ethics
Presentation transcript:

Issues for Computer Users, Electronic Devices, Computer and Safety

Objectives  Internet.  Summarize the dangers of sharing personal information on the Internet.  Explain how cookies and global unique identifiers endanger privacy.  Identify techniques that intruders use to attack computer systems.  Discuss different types of cybercrime.  Summarize how computer crime costs businesses money.

Objectives   Describe ways criminals obtain passwords.  Discuss ways to protect your computer from being accessed by others.   Explain the criteria of a strong password.  Summarize ways to stay safe online.  Cyber Bullying  Computer Ethics You Tube Video

Key Terms   Global Unique Identifier (GUID)   Computer Crime  Cybercrime  Downtime  Identity Theft  Phishing

Key Terms  Scanning  Software Piracy   Spoof  Virus   Worm  Trojan Horse

Key Terms  Time Bomb  Computer Crime and Intellectual Property Section (CCIPS)   Computer Hacking and Intellectual Property Project (CHIP)  National Infrastructure Protection Center (NIPC)

Introduction Computers are tools and, like other tools, they are controlled by the person using them. People can use computers to learn, to communicate, and to have fun. However, people can also use computers to snoop into another person’s private life or to commit crimes.

Privacy Online Privacy in Cyberspace Many consumers share personal information about themselves, their habits, and their finances. Sometime, however, such information is gathered without a person’s knowledge or approval.

Privacy Online Privacy in Cyberspace New Technology and Your Privacy Cookies is a small file that is saved to your hard drive when you visit some Web sites. Cookies gives Web sites a way of storing information about you in return. bal Unique Identifiers is a unique identification Global Unique Identifiers is a unique identification number that is generated by a piece of hardware or by a program.

Used to set the level of your Internet Security

All About Cybercrime Cybercrime Techniques Many cybercrimes are based on the ability of people to tap illegally into computer networks. They may create a virus, worm, or Trojan Horse program to infiltrate computers and damage or delete data. Viruses are destructive computer programs that can move from one operating system to another.

All About Cybercrime Cybercrime Techniques Scanning - intruders develop programs that try many different passwords until one works. However, networks can be blocked from scanners by limiting the number of failed attempts to log onto the system. After three password failures, for instance, the network can refuse access.

All About Cybercrime Spoofing – intruders use a false Internet Protocol (IP) or address to gain access. Intruders assume the IP address of a trusted source to enter a secure network and distribute s contain Viruses.

All About Cybercrime Phishing – criminals use an official-looking to lure victims into giving personal data such as user name, passwords, bank account numbers, or credit card details. Time Bombs – are malicious programs is activated by an event or set of circumstances.

All About Cybercrime Types of Cybercrime Fraud – When someone steals your personal information, he or she can impersonate you and make credit card purchases in your name or access your bank accounts. This is called Identity theft. Software piracy – is the illegal copying of computer programs. Software piracy affects software publishers. They lose money when people use illegal copies of programs to avoid paying for legitimate copies

All About Cybercrime Types of Cybercrime Cyber-bullying – is the use of the Internet and related technologies to harm or harass other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it.

The High Cost of Computer Crimes The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Cyber Crimes involves Internet. using the Internet. Computer crime is any act that violates state or federal laws and involves using a computer. Computer crime causes businesses to lose money in the following ways.

The High Cost of Computer Crimes Downtime – workers cannot work because a network is temporarily not available. A company can lose business if customers are affected by downtime.

Fighting Cybercrimes There are several government organizations that assist in fighting Cybercrimes. Computer Crime and Intellectual Property section c (CCIPS) – The Department of Justice created a s special group to advise and train federal prosecutors and local law enforcement on Cybercrime.

Fighting Cybercrimes Computer Hacking and Intellectual Property a section (CHIP) – law enforcement officials and utors work together to pursue cybercrime. prosecutors work together to pursue cybercrime. National Infrastructure Protection Center (NIPC) – ensures that the nation’s computer system could continue to operate in the case of an attack.

Avoiding Cybercrime Password Theft Many computer crimes start when an unauthorized user hacks, or gains unauthorized entry, into a computer network. This often happens when the intruder learns the password to access the victim’s computer and the network. Following are ways such criminals learn passwords. such criminals learn passwords. Packet sniffers – a method of finding another’s passwords and card numbers.

Protecting Your Personal Data Using Strong Password – Whenever you create a password, don’t use things like family names, four letter nicknames, or birth dates. You should use a combination of at least six to ten Upper - and l, numbers, and symbols (*, #, $, lowercase letters, numbers, and symbols (*, #, $, %, or &).

Protecting Your Personal Data Avoid Site Registration – do not fill out a registration form unless the site clearly says that the data will not be shared with other people without your approval.

Cyber Etiquette for Students