Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Internet Safety Rockingham County Public Schools
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
SECURITY CHECK Protecting Your System and Yourself Source:
INTERNET SAFETY.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Using internet and cell phones safely
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Viruses & Destructive Programs
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Training and Development Safety Online English & Exams Young Learner Classroom Practice Using ICT.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Let’s talk about Internet Safety!
A Student’s Guide to Proper and Safe Web Behavior
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Internet Safety Tips.
What is Spam? d min.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Cybersecurity Test Review Introduction to Digital Technology.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Protect Your Computer Against Harmful Attacks!
Appropriate Use of Technology
Internet Safety Tips for Parents.
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Personal Safety Online
Presentation transcript:

Computer Ethics Ms. Scales

Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate Internet use and to protect the user. Also use to delegate general computer usage. Code of Conduct  The way we conduct ourselves in society

Computer Conduct Netiquette  A new term the refers to how you present yourself and treat others when online Privacy  The ability to keep yourself and your information private from others

Protecting Your Computer Online Safety  Precautions taken to protect personal information and images from being misused by others. Security Protection  of computer, computer files, or a computer network form use without permission of the owners

Password A Code for the security protection to allow access to a computer or the computer programs. Tips for Passwords:  Mix of caps, lower case, numbers, symbols  At least 8 character long  Change it on a regular basis  NEVER share your passwords with ANYONE

Malicious Conduct  Intentional destruction of another’s property with disregard of consequences to others Vandalism  The intentional act of destroying computer files or computer networks

Examples… Identity Theft  Claiming someone else’s identity through their personal information, such as SS#, bank account #, etc… Hacker  An unauthorized person who secretly gains access to other’s computers/ computer files. Software Piracy  Illegally copying software, distributing, and/or selling it.

Most Common Dangers Virus  A file that is meant to cause malicious harm to your computer These use to be really obvious when your computer is infected, but these days the creator of these viruses have more sneaky plans sometimes Worms  These are files that replicate themselves from one machine to another with out the need to be downloaded from the internet.  Typically are sent as attachments in s

More dangers Trojans  These act like another type of file, but are really opening a backdoor on your computer to allow a hacker to gather information or to use your computer for other malicious activity, such as spamming, or hacking Spyware  A generic term for malicious software that ends up on your computer to gather information about you and other files on your computer such as personal information, credit card information, websites you have visited

More dangers Backdoor  A way into your computer, bypassing the normal authentication procedures, this allows hackers to use your computer as they see fit Downloaders  This allows someone to download files from your computer to their computer

More dangers Hijackers  These take control of various parts of your web browser to redirect you to other websites that you were not trying to go to Keyloggers  This a malware that captures the keystrokes you use from your keyboard and save them to send to a hacker later on.  Typically they are trying to find credit card numbers, social security numbers, pin numbers, usernames, and passwords

More dangers Spybot  These send information from your computer to interested parties about your activities to gather info about you Adbots  These deliver unwanted advertisements to your computers, think pop up! Though not usually harmful, can usually indicated more issues

Use of Social Networking sites Profile should be set to “Private” Never accept a friend request from someone you don’t know, even if you have mutual friends. Never give someone information about yourself unless you know them Beware of predators

Internet Safety Never open a program or file downloaded from the internet unless the source is trusted. Beware of Malware Malware infiltrates your computer without your knowledge Often steals information from the user (passwords, etc.) Have an anti-malware program (Norton Antivirus, etc.)

A few facts 19% of teens feel safer on line than in the real world 39% of students say they trust who they are chatting with online 24% of students say they see nothing wrong with chatting with a stranger online 10% of students have been asked to keep a relationship online a secret Children between 8 and 18 spend over an hour a day online 74% have a computer with internet access

Personal Information Full name Age Address Phone number Parent’s names School Work info Passwords Usernames Mother’s Maiden nam Once you have given it out, you can never take it back You should only trust your parents online with personal info Avoid putting personal photos online

Usernames and Profiles Make them unique and generic Provide only the required information Resist the temptation to revel personal information through usernames and profiles

Online Friends Don’t ever meet people you only know online in person You have NO idea who the person you are talking to online really is Online friends are still strangers

Cyber bullying More likely to occur online than in person (42% of students have been cyber bullied) Avoid cyber bullying:  Being kind to others online as well as in person  Don’t type in ALL CAPS  Don’t send messages with angry Always tell an adult if you are being cyber bullied (58% of students don’t report it)

Free Stuff Online Nothing is “free” on the internet Usually your personal information is at risk in these situations Typically there are long term hidden costs Can lead to identity theft, viruses, having your personal info sold

Attachments These are added files to s Sometimes can be real or legit stuff Could be a method to infect your computer with a virus Only open an attachment from a address you and know and if the looks ok (sometimes people’s s get hacked)] NEVER EVER open an.exe attachment (watch for these type of links too)

Online Protection Use Antivirus software Use Adware and spyware software Update these programs regularly Run scans of your computer at least weekly