Technology in society, safety & ethics Unit 15 5 days including project, review and test.
Objectives Describe how devices are commonly used in daily life Identify security risks and protect data Restrict access to devices and protect against viruses Confirm e-commerce safety Protect your privacy on the Internet Maintain a healthy computing environment Explain why it’s important to use computers legally and responsibly
Computers in Everyday Life What is e-commerce? Business/Shopping online What does the cashier do with your food at Shop Rite? Scan it with optical laser What is the cashier’s computer system called? POS System- Point of Sale System When you use the ATM or a credit card, what does the machine read on your card? Magnetic strip or chip What do you call people who work from home? Telecommuting
Addressing Security Risks Avoid Data Loss Battery backup UPS Backup files Restrict Access Use firewall Use strong passwords Protect Against Malware Use anti-virus software Use Secure Websites
Network Security Solutions Be careful who you hire People who don’t follow rules Back up data off-site Biometric security Fingerprint reader Voice pattern Retina scan
Passwords Don’t use easy, common words Mistakes:
Strong Password Checker from Microsoft Password Tips Most common password is…password Also 123456 Tips & Advice: Top 25 worst passwords of 2015 Strong Password Checker from Microsoft Students should name some tips. Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it much easier for someone to guess your password. Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least twelve characters (if the site allows it). If you need to write down your passwords, keep them in a secure place. It's even better if you "encrypt" your passwords or just write down hints for them that others won't be able to understand. Don't use the same password for each account. If someone does discover your password for one account, all of your other accounts will be vulnerable. Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it). Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very weak password. Random passwords are the strongest. Use a password generator instead of trying to think of your own. Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize.
Viruses Program written to cause disruption Attached to a file or email Spreads Worm- copies itself across network & slows it down Time Bomb- damage at certain time/date Trojan Horse- looks like something good, but isn’t Protect with Antivirus software Update regularly Be careful opening emails Scan attachments first
Virus Protection Prevents virus install & helps remove it Enable auto-update New virus’ made everyday Be careful what you download AV might not catch them all Name some AV software
Unwanted Email Spam Unsolicited ads Don’t reply to junk emails Typically, an e-mail message is sent to multiple recipients who did not ask to receive it. E-mail messages are not considered spam if a user has signed up to receive them.
Spam Spammers collect email addresses from: Spam: Chatrooms, websites, customer lists, viruses getting them from your address book, other spammers that sell lists Spam: Advertises products & services that may not be real Collects email addresses to sell to other spammers May put malware on your PC One of the problems with spam, and the reason why there is so much of it, is that it is so easy to create. You could easily become a spammer yourself. Let's say that you have a recipe from your grandmother for the best blueberry muffins ever created. A friend suggests that you sell the recipe for $5. You decide that your friend might be on to something, so you send an e-mail to the 100 people in your personal e-mail address book with the subject line, "These Blueberry Muffins Have Been Described as Heaven -- You Can Have the Recipe for $5!" Your e-mail contains a link to your blueberry muffin Web site. As a result of your 100 e-mails, you get two orders and make $10. "Wow!" you think, "It cost me nothing to send those 100 e-mails, and I made $10. If I sent 1,000 e-mails I could make $100. If I sent a million e-mails I could make $100,000! I wonder where I could get a million e-mail addresses..."
Spam Facts- FYI 1978 - An e-mail spam is sent to 600 addresses 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of people. 2005 - 30 billion per day 2006 - 55 billion per day 2013- 97 billion per day 90% of email sent is spam!
Spam Be careful giving out your email Check privacy statements Do not publish it online Check privacy statements They may share your email address DO NOT reply to junk mails They’ll know they have a valid email address You’ll get more junk! Use the junk email filter
Phishing Steals your personal info Spoofed sites & emails Emails that appear to come from original source Asks you to change password Link takes you to copied site User collects your info
Spam vs. Phishing How does it arrive? How does it make its offer? Spam: Sneaks in the back door Phishing: Walks in the front door How does it make its offer? Spam: Looks bad, seems far-fetched Phishing: Looks plausible, seems credible What is it trying to do? Spam: Tries to sell you something /steal email Phishing: Tries to steal information/identity from you
Review What’s worse, spam or phishing? Let’s Play Phishing Scams- Avoid the Bait Spam Scam Slam Follywood Squares Phishing IQ Test
Secure Sites- TLS & SSL Password DOES NOT mean secure Secure Socket Layer (SSL) Encrypts the data (credit card #’s, etc.) URL will begin with https:// Log Off after leaving site Why? TSL- Transport Layer Security; newer SSL- Secure Socket Layer; older Both used for encryption & authentication to server
Secure Sites
Online Buying Advice Use a PC you know is secure Make sure firewalls & anti-virus software are enabled Make sure AutoComplete is on if you are not using your PC Buy from reputable websites Make sure store is secure Review the privacy policy so you know what they do with your personal information Log off at end of session AutoComplete fills in your info in forms. Setting for this are in Internet Options.
Safe Guidelines Virus program scan all emails (in & out) Virus program subscription Schedule scan Review emails & IMs before sending ISP can filter emails as well Understand netiquette & company rules Encrypt emails with private info Save & backup your emails Remember the “paper trail” Follow laws
Review T or F. Email paper trails cannot be used as legal documents. Junk email is also called _______. ______ refers to good manners when communicating electronically. ______ tries to get/steal your private info. ______ is just annoying! F Spam Netiquette Phishing
Cookies Many sites require cookies Contains customer id info Small text file Stored on your HD Contains customer id info Personalizes your web visit When you visit the site, the ID# in cookie is sent to web site to look up history of your past visits Profiles are formed from your activities
Cookie Example- Good Cookie
Cookie Example- Third Party Cookie Hosting the banner on servers and using third-party cookies, an advertising company is able to track the browsing of users across these two sites. Means other people (other sites) are tracking your browsing history. As an example, suppose a user visits www.example.org. This web site contains an advertisement from ad.foxytracking.com, which, when downloaded, sets a cookie belonging to the advertisements's domain (ad.foxytracking.com). Then, the user visits another website, www.foo.com, which also contains an advertisement from ad.foxytracking.com/, and which also sets a cookie belonging to that domain (ad.foxytracking.com). Eventually, both of these cookies will be sent to the advertiser when loading their advertisements or visiting their website. The advertiser can then use these cookies to build up a browsing history of the user across all the websites that have ads from this advertiser.
Cookie Example Play Video
Cookie Options in Browser Tools, Internet Options, Privacy Tab Delete: Tools, Internet Options, Browsing History, Delete
Review- 4Q Where are cookies stored? Why are 3rd party cookies bad? On your HD Why are 3rd party cookies bad? The ads follow you What is contained in cookies? Customer ID # Where can you delete cookies in IE? Tools, Internet Options, Browsing History
Injuries Repetitive Strain Injury (RSI)/Carpal Tunnel Repeated motions of joints Game players, constant users Take breaks, walk around, stretch Use ergonomic furniture Eye strain (lighting, breaks)
Techniques to Avoid Injury Sit straight Feet flat on floor Wrist up- not resting on keyboard Don’t look at keyboard Elbows bent at 90 degree angle Sit about arm’s length from monitor Show the Disney Ergonomics Poster
Exercising Ethical Behavior Proper behavior Follow rules & consider how your actions will affect others Use software legally Follow EULA
Extra Stuff 1- Traceroute Traceroute (tracert) A test to show the path data travels through routers Also confirms connectivity
Extra Stuff 2- IP Address What’s your IP Address? At Command Prompt, type ipconfig In Windows, go to Network & Sharing Center, click name of your network in “View Your Active Networks” and click Details
Extra Stuff 3- Twitter Tweeps Twitterati Tweetup Twitter followers Twitter users who attract thousands of followers Tweetup Meetup of people who use Twitter
Technology in society, safety & ethics Unit 15 5 days including project, review and test.