Computer Tech. What is an unsolicited e-mail message sent to many recipients Adware Spam Spyware Phishing here here Want to know how email spam really.

Slides:



Advertisements
Similar presentations
Security Objectives Describe the types of computer security risks
Advertisements

Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Security Issues and Ethics in Education
Discovering Computers 2010
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 11 Computer Security and Safety, Ethics, and Privacy.
Chapter 11 Computer Security, Ethics and Privacy
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Computer Security, Ethics and Privacy
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Security, Ethics and Privacy Chapter 11.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter TIK XII Science. DATABASE MANAGEMENT.
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 11 Objectives Describe the types of computer security risks
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Internet safety By Suman Nazir
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Security Issues & Ethics in Education By Maud Mushayamunda.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Protect Your Computer Against Harmful Attacks!
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy
Chapter 13 Security and Ethical Challenges.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Chapter 11 Computer Security, Ethics and Privacy
Networking for Home and Small Businesses – Chapter 8
Chapter 11 Computer Security, Ethics and Privacy
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Tech

What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really works. Click here and read the article completely! It is full of great information.here

A security system consisting of hardware and/or software that prevents unauthorized intrusion Phishing Spam Firewall Denial of Service

Hides within or looks like legitimate program until triggered Worm Trojan Horse Virus Spam To learn more about how a Trojan Horse works, read the article and then scroll down to watch the video from “How Stuff Works” (brought to you by the “Lab Rats”. Click here.here

An illegal duplication of copyrighted software Software Encryption Ergonomics Software Phishing Software Software Piracy

When you buy a computer software program, what does the software license agreement let you do? Right to use software – (you don’t own the software, you only have a license to use it.) Right to sell software – after you buy the software you can sell it to as many people as you want. Right to change the software – (after you buy it, you can edit it any way you want.)

A scam in which a perpetrator sends an official looking that attempts to obtain your personal and financial information Phishing Scamming Spying Adwaring Learn more about Phishing by watching the video from “How Stuff Works.watching the video

What are moral guidelines that govern the use of computers and information systems Computer Ergonomics Computer Ethics Computer Intellectual Rights Computer Privacy Guidelines

An applied science devoted to comfort, efficiency, and safety in the work place Relaxation Encrypting Ergonomics Slacking

A potentially damaging computer program Virus Worm Trojan Horse Spam To learn more about how computer viruses work, read the article from “How Stuff Works”. It’s a great article!article

This software program identifies and removes viruses Firewall Software Anti Piracy Software Ergonomics Software Anti Virus Software

What is a small file that is put on your computer that contains data about you? Cookie Trojan Horse Worm Virus To understand better how cookies work, read this article from “How Stuff Works”.this article

Watch this video on Internet cookies!

What copies itself repeatedly, using up computer resources and can possibly shut your computer & network down? Virus Trojan Horse Worm Cookie

The process of converting plaintext (readable data)into ciphertext (unreadable characters) Scrambling Phishing Spamming Encryption

What is it called when a computer consumes your entire social life? Computer addiction Computer ethics Computer ergonomics Computer spamming

Reducing electricity and environmental waste while using computers Salvaging Reprocessing Reclaiming Green computing