Privacy, Security, and Ethics

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Security, Privacy, and Ethics Online Computer Crimes.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By: Catherine Tingle. What is it?  Netiquette refers to appropriate and safe interactions online.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
By Cheryl Costantino, M.A. June  Teachers, students and parents have responsibilities when it comes to the use of technology.  There are national.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Digital Citizenship By Lori Gray.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Digital Citizen Project By: Frances Murphey Technology and Education.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
Privacy, Security and Ethics
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Technical Implementation: Security Risks
Topic 4: E-safety, Health and Safety
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Lesson 3 Safe Computing.
National Cyber Security Month
Cyber Security By: Pratik Gandhi.
The Best Way To Secure U R Self
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Scams, Identity Theft, and Viruses Kelly & Caitlin
BCT 2.00 Analyze Technology Issues
Chapter 10: Privacy, Security, and Ethics
Prepared By : Binay Tiwari
Chapter9.
Philip Nichilo Vincent Carestia
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Computer Security By: Muhammed Anwar.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Privacy, Security, and Ethics Soren Caudill & Allie Clark

What is Privacy, Security, and Ethics? General Idea: Protects computer systems from theft or damage Protects software or electronic data Teaches you the appropriate way to act online

Computer Privacy Privacy and security level of personal data Protects sensitive and private data Credit card numbers SSID Passwords Concerns the collection and use of data about individuals Three main privacy issues: Accuracy Property Access

How to Protect your Computer Privacy Use preventative software applications Anti-virus (prevents virus) Anti-malware (prevents malware) Firewalls (blocks unauthorized access) Avoid using unreliable websites Use very strong passwords including: Numerals Letters Special characters Never repeat the same password

Computer Security Protects your personal data Hardware Software Protects computer from unofficial use Prevents damage Hacking Sabotage

Computer Security Awareness Part 1 Trojan Horses- program that appear harmless but contain malicious programs that could possibly carry viruses Zombies- infected computers used for hostile reasons Scams- tricks computer users into spending money and time on unrealistic deals/programs Identity theft- using someone else's personal information/identity as your own Worms- programs that replicate themselves over and over

Computer Security Awareness Part 2 Ransomware- a software that threatens to publish the victims data unless a ransom is paid Cookies- store and track information Cyber heist- when a large amount of information is stolen in a short period of time Phishing- sending emails as companies to get personal information such as passwords and credit card numbers Crackers- someone who creates malicious software

Computer Ethics Moral conduct Element that controls how computers are utilized today How to respectively act on your computer Guidelines for the appropriate use of computer Plagiarism Do not use other peoples work without proper permission Quote their work

Being Ethical on Computers How to be ethical on the computer: Not plagiarizing Keeping information private (yours and other computer users) Respect the privacy of others

Questions?

Cites https://365itsolutions.com/what-is-internet-privacy-and-what-does-it-mean-to-you/ https://webreference.com/internet/security/index.html https://www.studyblue.com/notes/note/n/privacy-security-and-ethics-chapter- 9/deck/20851258 https://www.knowbe4.com/ https://whatis.techtarget.com/definition/cyberheist https://sis.binus.ac.id/2018/02/22/papa-privacy-accuracy-property-and- accessibility/