Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Unit 18 Data Security 1.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
The Internet = A World of Opportunities
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Copyright © 2003 Pearson Education, Inc. Slide 2-1.
1 2/9/05CS120 The Information Era CS120 The Information Era Chapter 2 – Personal Safety Online TOPICS: Acceptable Use Policies, Security, Protection, Piracy.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
Data Security.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
IT security By Tilly Gerlack.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Types of Electronic Infection
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
VIRUS.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Protect Your Computer Against Harmful Attacks!
Presentation transcript:

Privacy & Other Issues

Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules and restrictions. Your use privileges can be suspended or terminated if the rules are broken. If you didnt read the AUP when you signed up, you can always find it on their Web site. You cant plead ignorance on not knowing of the AUP.

Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program written using a macro language for a specific program that executes when a document is opened. Trojan horse - a program that slips into the system using a disguise (a game, screen saver) Worm - like a virus, but it reproduces and works over networks Some are harmless, but many are destructive.

Avoiding Viruses, Worms, etc. Use antivirus software and update it regularly Keep floppy disks out of your floppy drive unless you are working on them. Consider disabling Java and Javascript capabilities on your Web browser Back up files Disconnect your computer from Net when done. Do not open strange attachments

Avoiding Viruses, Worms, etc. Viruses and –You cannot get a virus from a plain text message. –Attachments can carry viruses or be a trojan horse Save attachments to the hard drive before you open it. See p. 62 for helpful tips for setting up mailer programs to save files automatically Do not take the filename by face value. Delete unexpected attachments

Information Online Information about you = $$$ Advertisers love to know about you and what you like and buy Web Pages can be customized to your tastes Information can be maintained in databases and made available to others

Information Gathering A lot of information is voluntarily given by you Other information can be gathered via search engines and other resources.

Security Who cares? What can you do? –Make passwords hard to figure out –Log out of your account –Do not give out unnecessary personal info –Beware of scams –Shop and use auctions safely

Libel, Threats, Professionalism Libel- written or pictoral statement that damages a person/organization ($ or other). Posting libelous statements online can result in a lawsuit against the poster. Private individuals have more rights than public ones (i.e. politicians) Remember that can easily become publicly viewable.

Libel, Threats, Professionalism Do not take threats casually. A flame is an or newsgroup message where the author attacks another person with high intensity. A flame war is an exchange of flames between 2 or more people. In the workplace you may be monitored and harassment is taken seriously. Use your head.

Software Piracy and Infringement SW Piracy - the willful reproduction or distribution of 1+ copies of a program/work. Read your programs license agreement to see what you can do with the program. The Internet and CD-R has made piracy of software and music easier for people. A good way to get a virus.

More Security Secure Web Documents –Where Web documents reside on a secure server (that uses encryption schemes) –Making sure that the right people get access to documents Firewalls –software/hardware that restricts access to the LAN to trusted users (controlling traffic in both directions)