BCT 2.00 Analyze Technology Issues Discuss security, confidentiality and ethical issues as related to computer usage.
ETHICS Conforming to the accepted professional standards of conduct What is right and wrong using computers (morals)
Privacy Concerns Public Data – Information that is available ethically to any user (phone numbers, addresses, etc) Private Data – Information that is confidential and only ethically available to selected individuals (credit card #s, social security numbers, email)
Computer Crimes
Computer Crimes A criminal act committed through the use of a computer. Can also involve the theft of a computer and any equipment associated with the computer.
Types of Computer Crimes Computer Fraud Conduct that involves the manipulation of a computer or computer data to obtain money, property, or value dishonestly or to cause loss. Examples: stealing money from bank accounts stealing information from other people’s computers for gain
Types of Computer Crimes Hacking Involves invading (breaking into) someone else’s computer, usually for personal gain or just the satisfaction of invasion. Data Diddling Changing data before it is entered into the computer or after is has been entered into the computer.
Types of Computer Crimes Software Piracy Illegally copying and distributing software Making and/or selling “bootlegged” copies of software
Other Computer Crimes Theft of computer time An employee uses a company’s computer for personal use such as running a small business keeping records of an outside organization keeping personal records shopping on the Internet
SOFTWARE LICENSES
License The instructions telling you exactly what you are allowed to do as far as copying and loading software on machines
Single Use License Installation of the program purchased under a Single-User License is restricted to one single personal computer owned by or under control of the licensee plus one additional computer also owned by the licensee
Multi-User License The license permits you to install the program on the specific numbers of PCs entirely within your family, organizations and corporation within one particular specified location (e.g. school).
Site License A type of software licensing agreement that grants the purchaser permission to use the software on a network on a single site, with an unlimited number of end users. There may be a maximum specified number of simultaneous end users.
Types of Software Licenses Single Use License One computer Multi-User License A specified number of computers Site License Computers within one building
TYPES OF SOFTWARE
Public Domain Material that is not copyrighted. These computer programs can legally be used for free, shared, and copied.
Freeware A copyrighted program that you do not have to pay for Examples: Netscape Internet Explorer Instant Messenger
Shareware Software you can use for free for a specified period to try it out. If you decide that you like it and it meets your needs, you are suppose to pay for it. Demo
Commercial Software Copyrighted software that must be purchased Word Microtype Math Blaster SIM City
TYPES OF SOFTWARE Public Domain – free to use and distribute; not copyrighted Freeware – copyrighted, but you do not have to pay for it Shareware – use it on a trial basis and pay for it if you want to keep it Commercial Software – you have to pay for it
VIRUSES
Computer Viruses A destructive computer program that can make your computer perform incorrectly WORMS, BOMBS, TROJAN HORSES
WORM Bores its way through your computer attaching itself to files Makes copies of itself Slows your computer down
BOMB Sits in your computer and waits for something to happen Does not cause damage until a certain date or until the system has been booted a certain number of times.
TROJAN HORSE Masquerades as (looks like) a piece of useful software but it is not Does something different than what it is expected to do
HOAX A program that tricks users into thinking they have a virus
SECURITY MEASURES
Security Measures Passwords Selective hiring process DO use a random sequence of numbers, letters and symbols. DO NOT use words that could be easily guessed by others DO NOT share your passwords with others Selective hiring process carefully screen employees before hiring them
Other Security Measures Firewalls Computer software used to keep someone from breaking into your network or computer Antivirus software Software used to protect you computer from being infected by a virus
Security Measures Passwords Firewalls Antivirus software Protects your network or computer from intruders Antivirus software Software used to protect your computer from being infected by a virus
THE END