Technology in society, safety & ethics

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Unit 10 Communication, Collaboration, and Safety.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
INTERNET SAFETY FOR KIDS
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technical Implementation: Security Risks
Internet Safety.
Managing Windows Security
Malware and Computer Maintenance
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
Unit 12 Searching the Internet & Safety
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Information Technology
Unit 11 Using the Internet & Browsing the Web
Unit 4 IT Security.
Unit 12 Using the Internet & Browsing the Web
How to build a good reputation online
Unit 10 Communication, Collaboration, and Safety
Unit 11 Communication & Collaboration
Unit 4 IT Security.
Topic 6: Issues Press F5 to view!
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
G061 - Network Security.
Presentation transcript:

Technology in society, safety & ethics Unit 15 5 days including project, review and test.

Objectives Describe how devices are commonly used in daily life Identify security risks and protect data Restrict access to devices and protect against viruses Confirm e-commerce safety Protect your privacy on the Internet Maintain a healthy computing environment Explain why it’s important to use computers legally and responsibly

Computers in Everyday Life What is e-commerce? Business/Shopping online What does the cashier do with your food at Shop Rite? Scan it with optical laser What is the cashier’s computer system called? POS System- Point of Sale System When you use the ATM or a credit card, what does the machine read on your card? Magnetic strip or chip What do you call people who work from home? Telecommuting

Addressing Security Risks Avoid Data Loss Battery backup UPS Backup files Restrict Access Use firewall Use strong passwords Protect Against Malware Use anti-virus software Use Secure Websites

Network Security Solutions Be careful who you hire People who don’t follow rules Back up data off-site Biometric security Fingerprint reader Voice pattern Retina scan

Passwords Don’t use easy, common words Mistakes:

Strong Password Checker from Microsoft Password Tips Most common password is…password Also 123456 Tips & Advice: Top 25 worst passwords of 2015 Strong Password Checker from Microsoft Students should name some tips. Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it much easier for someone to guess your password. Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least twelve characters (if the site allows it). If you need to write down your passwords, keep them in a secure place. It's even better if you "encrypt" your passwords or just write down hints for them that others won't be able to understand. Don't use the same password for each account. If someone does discover your password for one account, all of your other accounts will be vulnerable. Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it). Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very weak password. Random passwords are the strongest. Use a password generator instead of trying to think of your own. Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize.

Viruses Program written to cause disruption Attached to a file or email Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software Update regularly Be careful opening emails Scan attachments first

Virus Protection Prevents virus install & helps remove it Enable auto-update New virus’ made everyday Be careful what you download AV might not catch them all Name some AV software

Unwanted Email Spam Unsolicited ads Don’t reply to junk emails Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.

Spam Spammers collect email addresses from: Spam: Chatrooms, websites, customer lists, viruses getting them from your address book, other spammers that sell lists Spam: Advertises products & services that may not be real Collects email addresses to sell to other spammers May put malware on your PC One of the problems with spam, and the reason why there is so much of it, is that it is so easy to create. ­ You could easily become a spammer yourself. Let's say that you have a recipe from your grandmother for the best blueberry muffins ever created. A friend suggests that you sell the recipe for $5. You decide that your friend might be on to something, so you send an e-mail to the 100 people in your personal e-mail address book with the subject line, "These Blueberry Muffins Have Been Described as Heaven -- You Can Have the Recipe for $5!" Your e-mail contains a link to your blueberry muffin Web site. As a result of your 100 e-mails, you get two orders and make $10. ­ "Wow!" you think, "It cost me nothing to send those 100 e-mails, and I made $10. If I sent 1,000 e-mails I could make $100. If I sent a million e-mails I could make $100,000! I wonder where I could get a million e-mail addresses..."

Spam Facts- FYI 1978 - An e-mail spam is sent to 600 addresses 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day 2013- 97 billion per day 90% of email sent is spam!

Spam Be careful giving out your email Check privacy statements Do not publish it online Check privacy statements They may share your email address DO NOT reply to junk mails They’ll know they have a valid email address You’ll get more junk! Use the junk email filter

Phishing Steals your personal info Spoofed sites & emails Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info

Spam vs. Phishing How does it arrive? How does it make its offer? Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something /steal email Phishing: Tries to steal information/identity from you

Review What’s worse, spam or phishing? Let’s Play Phishing Scams- Avoid the Bait Spam Scam Slam Follywood Squares Phishing IQ Test

Secure Sites- TLS & SSL Password DOES NOT mean secure Secure Socket Layer (SSL) Encrypts the data (credit card #’s, etc.) URL will begin with https:// Log Off after leaving site Why? TSL- Transport Layer Security; newer SSL- Secure Socket Layer; older Both used for encryption & authentication to server

Secure Sites

Online Buying Advice Use a PC you know is secure Make sure firewalls & anti-virus software are enabled Make sure AutoComplete is on if you are not using your PC Buy from reputable websites Make sure store is secure Review the privacy policy so you know what they do with your personal information Log off at end of session AutoComplete fills in your info in forms. Setting for this are in Internet Options.

Safe Guidelines Virus program scan all emails (in & out) Virus program subscription Schedule scan Review emails & IMs before sending ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails Remember the “paper trail” Follow laws

Review T or F. Email paper trails cannot be used as legal documents. Junk email is also called _______. ______ refers to good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying! F Spam Netiquette Phishing

Cookies Many sites require cookies Contains customer id info Small text file Stored on your HD Contains customer id info Personalizes your web visit When you visit the site, the ID# in cookie is sent to web site to look up history of your past visits Profiles are formed from your activities

Cookie Example- Good Cookie

Cookie Example- Third Party Cookie Hosting the banner on servers and using third-party cookies, an advertising company is able to track the browsing of users across these two sites. Means other people (other sites) are tracking your browsing history. As an example, suppose a user visits www.example.org. This web site contains an advertisement from ad.foxytracking.com, which, when downloaded, sets a cookie belonging to the advertisements's domain (ad.foxytracking.com). Then, the user visits another website, www.foo.com, which also contains an advertisement from ad.foxytracking.com/, and which also sets a cookie belonging to that domain (ad.foxytracking.com). Eventually, both of these cookies will be sent to the advertiser when loading their advertisements or visiting their website. The advertiser can then use these cookies to build up a browsing history of the user across all the websites that have ads from this advertiser.

Cookie Example Play Video

Cookie Options in Browser Tools, Internet Options, Privacy Tab Delete: Tools, Internet Options, Browsing History, Delete

Review- 4Q Where are cookies stored? Why are 3rd party cookies bad? On your HD Why are 3rd party cookies bad? The ads follow you What is contained in cookies? Customer ID # Where can you delete cookies in IE? Tools, Internet Options, Browsing History

Injuries Repetitive Strain Injury (RSI)/Carpal Tunnel Repeated motions of joints Game players, constant users Take breaks, walk around, stretch Use ergonomic furniture Eye strain (lighting, breaks)

Techniques to Avoid Injury Sit straight Feet flat on floor Wrist up- not resting on keyboard Don’t look at keyboard Elbows bent at 90 degree angle Sit about arm’s length from monitor Show the Disney Ergonomics Poster

Exercising Ethical Behavior Proper behavior Follow rules & consider how your actions will affect others Use software legally Follow EULA

Extra Stuff 1- Traceroute Traceroute (tracert) A test to show the path data travels through routers Also confirms connectivity

Extra Stuff 2- IP Address What’s your IP Address? At Command Prompt, type ipconfig In Windows, go to Network & Sharing Center, click name of your network in “View Your Active Networks” and click Details

Extra Stuff 3- Twitter Tweeps Twitterati Tweetup Twitter followers Twitter users who attract thousands of followers Tweetup Meetup of people who use Twitter

Technology in society, safety & ethics Unit 15 5 days including project, review and test.