Electronic Communications

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Issues Raised by ICT.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
Any criminal action perpetrated primarily through the use of a computer.
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Security Risks Todays Lesson Security Risks Security Precautions
Internet Safety.
Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
An Introduction to Phishing and Viruses
MALWARE Autumn Mattis.
2.02 Remember the rules of online safety.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Digital Citizenship by Jeremy Head.
COMPUTER VIRUSES Computer Technology.
How to build a good reputation online
Digital Citizenship By: John Beverly.
Remember the rules of online safety.
Protecting your personal information and privacy
Topic 6: Issues Press F5 to view!
Protect Your Computer Against Harmful Attacks!
2.02 Remember the rules of online safety.
Risk of the Internet At Home
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety and The Digital Divide
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Electronic Communications Objective 3

Uses of Computing Pros Cons Made tasks such as clerical work and computing easier and faster Buying, banking, and paying bills can be done from home Easy access to useful information New forms of entertainment Cons Computers are still quite expensive Developing software is time consuming and expensive Once developed, it is difficult to make changes to software Excessive use of the computer has changed our society and relationships.

Computers – Work Place Used in every job Payroll, accounts, bookkeeping Operations Communications

Computers - Social Cell phones iPads Skype Social media Teleconferencing Twitter

Computers - Government Tracking Gov’t websites Affordable Care Act! Yeah! Military Computers got their start in the military Surveillance equipment Administrative purposes Data repositories

Computers - Entertainment Netflix/Amazon/Hulu Gaming Social interaction Youtube/videos

What is Ethics? Principals that guide behavior Is it illegal to be unethical? What is the relationship between law and ethics?

Using Computers Safely, Ethically, and Legally Rules Not usually illegal In writing Consequences are specific to the entity that made the rules Laws Illegal Consequences more severe from fines to jail time Ethics Not usually illegal, but can be Set by the society you live in About “doing the right thing” Consequences change the person you are

Ethics Law Rule 1. Don’t smoke in front of children 2. Don’t fill your mind with images you can’t erase 3. Don’t steal work resources, even if you won’t get caught 4. Don’t use the internet to bully, intimidate, or destroy the reputation of yourself or others0 5. Don’t share copyrighted material you have purchased with others Ethics 1. Don’t smoke in public buildings 2. Don’t look at child pornography 3. Don’t use work resources to make money for someone else 4. Don’t use slander or libel against others in the public domain 5. Don’t post copyrighted pictures on the internet or published works Law 1. Don’t smoke in the house 2. Don’t look at inappropriate images on the internet 3. Don’t use work computers for personal stuff 4. Don’t post compromising pictures of yourself on the internet 5. Don’t use a copyrighted picture without permission for personal projects Rule

Protecting your Identity Malware – Software that is intended to damage or disable computers and computer systems Virus - piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Spyware – Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from another hard drive. Adware – Software that automatically displays or downloads advertising material (often unwanted) when a user is online Trojan Horse – a hacking program that is non self-replicating, which appears to perform a desirable function but instead causes harm.

Protecting your Identity Cookies – a small piece of data sent from a website and stored in a user’s web browser while the user is browsing the website. Not necessarily malicious. Can store passwords and user information You can clear out your cookies periodically. Sometimes required to run certain websites Firewall – Establishes a barrier between a trusted, secure internal network and another network that is not necessarily secure or trusted. Virus Protection Software – Software designed to seek out and destroy computer viruses. Must be updated each year or it will not find new viruses. Cannot guarantee to work every time.

Tips for Securing your Identity Choose good passwords and pins Don’t use passwords that are too long or too short Don’t include any personal info (name, birthdate, family names, nickname) Use punctuation and upper and lowercase letters Use made up words or words made up from a line from your favorite song Keep your virus protection up to date Beware of scams Don’t give out identity details Never answer unsolicited or unwanted emails (spam)

Ergonomics The study of people’s efficiency in their working environment Invest in a good office chair Move regularly Position monitor correctly Position keyboard correctly Organize and clean your office or area

Joe Vs. The Volcano Having an unhealthy office environment can be dangerous to workers. Nerve damage, spinal injury, and illness. Watch this video and look for things that are unhealthy in the work environment. Watch Video