Unauthorized Online Usage of Music Files  Streaming on Personal Websites  Downloading From Illegal Websites.

Slides:



Advertisements
Similar presentations
Peer-to-Peer (P2P) Software Risks Standardized Consumer Disclosures Solution To Be Universally Applied By Complying P2P Software Suppliers Developed by.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Woodland Hills School District Computer Network Acceptable Use Policy.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
And how you can handle it.  Trojan horses  Spyware  Adware  Rootkits  Viruses  Worms Software that works without the victim’s permission.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
A Computer is a machine that… Receives inputs Processes info. Gives outputs.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
DIGITAL Download Sharing and Copying. Digital Download Process of downloading content or materials with the elimination of physical media. (dvd/cdrom)
Viruses & Destructive Programs
Quiz Anti Piracy 101.
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
P2P file sharing Know the risks. Peer-to-peer (P2P) file sharing convenient way to share public-domain: – music – audio – images – documents – software.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Viruses.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Computer Ethics Christina McCorkle.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Unethical use of Computers and Networks
I’m Only Sharing... It’s not hurting anyone.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
AS Level ICT Selection and use of appropriate software: Utilities and file management.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Hackers And Hacking.
Software Piracy By: B. Kaniecki.
IBook Rules:. iBook Do’s: Use your iBook when under direction by a teacher or staff member. Keep all passwords secret. Charge your iBook every night!
Concepts of Video and File/Sharing System Reporters: Ma. Raizza M. Cantara Mary Jane Eule Richard Ravalo Maika Laguartilla.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
E-Safety A Guide for Parents and Carers. Three Main Points Young people can be very tech savvy Young people do not necessarily have experience to judge.
Woodland Hills School District Computer Network Acceptable Use Policy.
Cybersecurity Test Review Introduction to Digital Technology.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Learning Outcomes 1. Know software installation processes 2. Be able to prepare for software installation 3. Be able to install and configure software.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Acceptable Use Policy
The Disadvantages of ICT
GCSE ICT SECURITY THREATS.
CYBER SECURITY...
Malware aka- malicious software By: Ken Fogel
Using a Computer Network
Five Unethical Uses of Computers
PART 2.
Copyright, Designs and Patents Act 1988
HOW DO I KEEP MY COMPUTER SAFE?
Online software and backups
Client/Server and Peer to Peer
Woodland Hills School District
Presentation transcript:

Unauthorized Online Usage of Music Files  Streaming on Personal Websites  Downloading From Illegal Websites

Dangers of P2P  Indiscriminate Sharing of All Files Found in a Computer  Distribution of Computer Viruses  Unmonitored and Automatic Sharing of Files Once Computer Is Switched On  P2P Programs Hard to Remove

Dangers of P2P  Unintentional Installation of Spywares  Allows Other P2P Users to Use Computer’s Storage Space  Allows Users to Engage in Illegal Activities (E.G. Downloading & Re- Sharing of Music Files, Pornography Etc.)

Legal Consequences of Uploading / Downloading  Civil Offence: Damages & Injunctive Relief  Criminal Offence: Fine of up to S$100,000 or Imprisonment of up to 5 Years, or Both

What Parents Can Do  Remove Any P2P Programs on Your Computer. Visit  Do Not Allow P2P Software Internet Access  Purge Any Files on Any Machines Which May Have Been Obtained Over a P2P Network