Module 2.2 Security, legal and ethical issues Theme: Finding solutions
Computer crime Computer crime involves the use of ICT to commit a crime or to assist in the commission of a crime.
Computer crime Examples –Data theft –Identity theft –Pornographic exploitation –Paedophile ‘rings’ –Piracy –Theft of computer resources –Theft from companies and bank accounts
Computer crime Containing and preventing is difficult because –no specially trained police officers –budget not big enough –laws unclear –crime committed across international boundaries.
Activity EXPLORE Activity 1 p 68 1
Security risks –Malware –Unauthorised access –Unauthorised use –Hardware theft –Software theft –Data theft –System failure Security in ICT
TERMINOLOGY Activity 2 p 69 2 Activity
Security in ICT Precautions – Control access Lockable cases Kensington lock cables Key control
Security in ICT Precautions – Backups
APPLY Activity 3 P 71 3 Activity
Precautions – Install malware detection and removal tools Anti-virus software Spyware prevention software Firewall software Security in ICT
EXPLORE Activity 4 p 74 4 Activity
Security in ICT Precautions – Safeguard against system failure UPS
APPLY Activity 5 p 75 5 Activity
Legal issues What rights do you have as worker or employee? What right do you have as consumer of –Hardware –Software EULA
EXPLORE Activity 6 p 77 6 Activity
Ethical issues Ten Commandments of Computer Ethics PLAGIARISM
EXPLORE Activity 7 p 78 7 Activity
CHECKLIST I can Activity