Announcements Project 3a due Friday -- use eTurnin by clicking on link, following instructions Upcoming lectures: Friday, Grace Whiteaker, on Privacy Monday,

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Viruses.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Santa’s s By Morgan Johnson. Sending an attachment to Santa  Explain how you attached the . Just click attach and click the folder I.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
Topic 5: Basic Security.
Santa’s s By Jack Carr. Sending an attachment to Santa Explain how you attached the . New message, insert, attachment Explain why you.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Computers & Society Computers long ago entered our social world … they can be used crudely or skillfully © 2004 Lawrence Snyder.
 Be careful-emotions are not easily conveyed  address should be used at end of for signature  Be brief  Space between lines enhances readability.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Computer virus Done: Aaesha Mohammed ID: H
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Computer Viruses Author: Alyse Allen.
Chapter 40 Internet Security.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Viruses & Destructive Programs
What they are and how to protect against them
Computer Viruses Standard A-4 (Safety Unit)
DIGITAL CITIZENSHIP What You Should Know!.
links and attachments: Help stop malware from spreading
Computer Viruses Latifah alabdulkarim
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Internet Safety.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
Viruses and Virus Protection
Unit 6 Digital Literacy Study S3 Obj 2-2
Viruses.
Follow safety rules so that YOU: Avoid getting HURT.
Follow safety rules so that YOU: Avoid getting HURT.
Santa’s s By……..
in Business.
Computer Viruses Standard A-4 (Safety Unit)
Unit 6 Digital Literacy Study S3 Obj 2-2
Chap 10 Malicious Software.
Phishing 101.
Presentation transcript:

Announcements Project 3a due Friday -- use eTurnin by clicking on link, following instructions Upcoming lectures: Friday, Grace Whiteaker, on Privacy Monday, Martin Tompa, on Security Tip of the Day: When setting up a relationship, a key field will always be in a “1” relationship

Computers & Society Computers long ago entered our social world … they can be used crudely or skillfully © 2004 Lawrence Snyder

The Problem With Email Email is part of our lives … but it’s not good for everything Poor for emotion, alternating interactions, most broadcast, sarcasm, … Email has (n)etiquette 1 topic messages; include context w/ reply Use ‘vacation’ auto-reply Answer aging email in reverse arrival order Get sender’s permission before forwarding

Virus And Worms A virus embeds in SW & travels with it, worms move around net on their own Both can do damage like erasing your files or taking information, but they may not Best defense is practicing “safe” computing All computers should have virus protection software -- many vendors You are responsible for protecting your computer!

Example: Melissa Melissa virus (Friday 3/26/99) embeds in MS Word docs attached to email Would this make sense coming from a friend? From: <name of infected user> Subj: Important Message From <infected user> To: <50 names from infected user’s email address book> Here is that document you asked for … don’t show anyone else ;-) Attachment: LIST.DOC Its still out there!

What Happens w/Melissa When users open the attachment, initializing code runs (often macros) That code is the virus/worm and can do harm or setup to do harm It also propagates itself, e.g. getting the email address book and sending copies of itself to those people David L. Smith pleaded guilty to creating and propagating Melissa

MyDoom.b This month’s species is MyDoom.b Like Melissa … MyDoom.b is a worm Spreads by attachments Virus software began checking for it within 24 hours MyDoom.b is a mutant of MyDoom Unlike Melissa … it’s harmful

MyDoom.b

Be Cautious Viruses/worms are serious, be cautious Have virus software running on any machine connected to the Internet Don’t ever get “trigger happy” at opening attachments Be careful where you get your SW from! - Commercial SW, Shareware, Freeware Keep your files “backed up” Be alert to “phony” viruses

Expect The Unexpected Be alert for odd behavior, weird events … think about it, “What’s happenin’?” [It’s hard to teach/learn this topic] In physical world, many cues alert us, but for synthetic world of IT, we must use reasoning When something is odd, can you explain it? Even if you can’t, does your understanding of it suggest some action? Dying software is often gimpy before crashing

Copyright Basic facts about copyright Since 1989 the © has not been needed Creating “intellectual property” automatically creates a copyright Most information is owned by someone, but if you get a copy legally you can use it personally- read it, play it, etc. - but no copy “Fair Use” allows copying for “socially valuable purposes,” like reviews, education www3.utsystem.edu/ogc/IntellectualProperty/copypol2.htm

Hard Facts About SW It is virtually impossible to create bug-free software Software engineers know this (better than anyone) and make huge efforts to write quality programs and test them carefully Expect quality, but be alert for bugs Try other products if bugs/errors numerous Be wary of SW in “safety critical” situations Life is uncertain … eat dessert first!