Computer Ethics, Viruses, and Copyrights

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Let’s Talk About Cyber Security
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
IT security By Tilly Gerlack.
D. Beecroft Fremont High School VIRUSES.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Computer Viruses.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Types of Electronic Infection
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
history, hardware, software, safety, and computer ethics
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
Ethics. Ethics are the principles and standards we use to decide how to act.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Security and Ethics Safeguards and Codes of Conduct.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Computer Security Keeping you and your computer safe in the digital world.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Computer Ethics, Viruses, and Copyrights
Viruses & Destructive Programs
Computer Safety and Ethics
Managing Windows Security
Misuses of ICT Malpractice and crime © Folens 2008.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Ethics, Viruses, and Copyrights
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Computer Ethics, Viruses, and Copyrights
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Viruses Standard A-4 (Safety Unit)
What is Information Security?
King Saud University- College OF Applied Studies
Student User Agreement and Policy 2022
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Web Page Design and Development I Standards
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Computer Ethics, Viruses, and Copyrights

Ethical Computer Use Using computers for positive purposes New technologies Medical cures Increased knowledge

Unethical Computer Use Using computers for negative purposes Stealing information Creating viruses Pirating videos, music, and software

Computer Viruses Designed to cause harm to computers Three categories of viruses Worms Hoaxes Malicious Programs

Worms Usually copy themselves automatically Spread through e-mail and networks Often designed to jam networks Typically do not damage the computer Usually an annoyance

Hoaxes Usually spread through e-mail Instructions to delete a file that is not harmful and supposed to be on your computer

Malicious Programs Cause damage to the computer May delete files, erase hard drive, make computer unusable

Virus Protection Many available virus protection programs Norton and MacAfee are most popular Regular updates and scanning necessary to protect computer Never open e-mail attachments that look suspicious or are from an unknown sender

Copyright Law Denotes that someone is owner of the item Applies to books, artwork, music, software, movies, and other original creations Provides for “fair use”

Software Protected by Copyright Law Must have license for each computer Site licenses and multi-user licenses available for reduced rates Specifics outlined in the End User License Agreement (EULA)

Software (cont.) Copying for re-sale is illegal Backup copying permitted by some companies Downloading through file-sharing programs is illegal

Sources Computer Concepts BASICS, Second Edition by Wells and Ambrose. 2004 Course Technology.