BCT 2.00 Analyze Technology Issues

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Chapter 11 Security and Privacy: Computers and the Internet.
Unethical use of Computers and Networks
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Computer Crimes Career & Technology Education Department.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Task 1B By Rachael Shepherd. ContentGenerator Software Products -Penalty Shootout -On Target? -Walk the Plank -HoopShoot -Hole in One -En Garde -Interactive.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Computer Safety and Ethics
Add video notes to lecture
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
3.6 Fundamentals of cyber security
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Computer Basics Technology’s Impact.
Fundamentals of Information Systems
Computing Issues that Affect Us All
Related to data, hardware, and software
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
Five Unethical Uses of Computers
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Computer Ethics.
UNIT 18 Data Security 1.
Societal Issues in Computing (COMP466)
Unit 6 Digital Literacy Study S3 Obj 2-2
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Unit 6 Digital Literacy Study S3 Obj 2-2
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Identity Theft Samuel H. Slater.
Presentation transcript:

BCT 2.00 Analyze Technology Issues Discuss security, confidentiality and ethical issues as related to computer usage.

ETHICS Conforming to the accepted professional standards of conduct What is right and wrong using computers (morals)

Privacy Concerns Public Data – Information that is available ethically to any user (phone numbers, addresses, etc) Private Data – Information that is confidential and only ethically available to selected individuals (credit card #s, social security numbers, email)

Computer Crimes

Computer Crimes A criminal act committed through the use of a computer. Can also involve the theft of a computer and any equipment associated with the computer.

Types of Computer Crimes Computer Fraud Conduct that involves the manipulation of a computer or computer data to obtain money, property, or value dishonestly or to cause loss. Examples: stealing money from bank accounts stealing information from other people’s computers for gain

Types of Computer Crimes Hacking Involves invading (breaking into) someone else’s computer, usually for personal gain or just the satisfaction of invasion. Data Diddling Changing data before it is entered into the computer or after is has been entered into the computer.

Types of Computer Crimes Software Piracy Illegally copying and distributing software Making and/or selling “bootlegged” copies of software

Other Computer Crimes Theft of computer time An employee uses a company’s computer for personal use such as running a small business keeping records of an outside organization keeping personal records shopping on the Internet

SOFTWARE LICENSES

License The instructions telling you exactly what you are allowed to do as far as copying and loading software on machines

Single Use License Installation of the program purchased under a Single-User License is restricted to one single personal computer owned by or under control of the licensee plus one additional computer also owned by the licensee

Multi-User License The license permits you to install the program on the specific numbers of PCs entirely within your family, organizations and corporation within one particular specified location (e.g. school).

Site License A type of software licensing agreement that grants the purchaser permission to use the software on a network on a single site, with an unlimited number of end users. There may be a maximum specified number of simultaneous end users.

Types of Software Licenses Single Use License One computer Multi-User License A specified number of computers Site License Computers within one building

TYPES OF SOFTWARE

Public Domain Material that is not copyrighted. These computer programs can legally be used for free, shared, and copied.

Freeware A copyrighted program that you do not have to pay for Examples: Netscape Internet Explorer Instant Messenger

Shareware Software you can use for free for a specified period to try it out. If you decide that you like it and it meets your needs, you are suppose to pay for it. Demo

Commercial Software Copyrighted software that must be purchased Word Microtype Math Blaster SIM City

TYPES OF SOFTWARE Public Domain – free to use and distribute; not copyrighted Freeware – copyrighted, but you do not have to pay for it Shareware – use it on a trial basis and pay for it if you want to keep it Commercial Software – you have to pay for it

VIRUSES

Computer Viruses A destructive computer program that can make your computer perform incorrectly WORMS, BOMBS, TROJAN HORSES

WORM Bores its way through your computer attaching itself to files Makes copies of itself Slows your computer down

BOMB Sits in your computer and waits for something to happen Does not cause damage until a certain date or until the system has been booted a certain number of times.

TROJAN HORSE Masquerades as (looks like) a piece of useful software but it is not Does something different than what it is expected to do

HOAX A program that tricks users into thinking they have a virus

SECURITY MEASURES

Security Measures Passwords Selective hiring process DO use a random sequence of numbers, letters and symbols. DO NOT use words that could be easily guessed by others DO NOT share your passwords with others Selective hiring process carefully screen employees before hiring them

Other Security Measures Firewalls Computer software used to keep someone from breaking into your network or computer Antivirus software Software used to protect you computer from being infected by a virus

Security Measures Passwords Firewalls Antivirus software Protects your network or computer from intruders Antivirus software Software used to protect your computer from being infected by a virus

THE END