OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Part I: Making Good Online Choices
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Breaking Trust On The Internet
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Internet Safety/Cyber Ethics
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Issues Raised by ICT.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Digital Citizenship By Lori Gray.
By: Asfa Khan and Huda Mukhtar
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Society & Computers PowerPoint
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
Any criminal action perpetrated primarily through the use of a computer.
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
Electronic Communications
Remember the rules of online safety.
HOW DO I KEEP MY COMPUTER SAFE?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

OBJECTIVE 3 ELECTRONIC COMMUNICATIONS

USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying bills can be done from home Easy access to useful information New forms of entertainment Cons Computers are still quite expensive Developing software is time consuming and expensive Once developed, it is difficult to make changes to software Excessive use of the computer has changed our society and relationships.

COMPUTERS – WORK PLACE Used in every job Payroll, accounts, bookkeeping Operations Communications

COMPUTERS - SOCIAL Cell phones iPads Skype Social media Teleconferencing Twitter

COMPUTERS - GOVERNMENT Tracking Gov’t websites Affordable Care Act! Yeah! Military Computers got their start in the military Surveillance equipment Administrative purposes Data repositories

COMPUTERS - ENTERTAINMENT Netflix/Amazon/Hulu Gaming Social interaction Youtube/videos

WHAT IS ETHICS? Principals that guide behavior Is it illegal to be unethical? What is the relationship between law and ethics?

USING COMPUTERS SAFELY, ETHICALLY, AND LEGALLY Rules Not usually illegal In writing Consequences are specific to the entity that made the rules Laws IllegalIn writing Consequences more severe from fines to jail time Ethics Not usually illegal, but can be Set by the society you live in About “doing the right thing” Consequences change the person you are

1. Don’t smoke in front of children 2. Don’t fill your mind with images you can’t erase 3. Don’t steal work resources, even if you won’t get caught 4. Don’t use the internet to bully, intimidate, or destroy the reputation of yourself or others0 5. Don’t share copyrighted material you have purchased with others Ethics 1. Don’t smoke in public buildings 2. Don’t look at child pornography 3. Don’t use work resources to make money for someone else 4. Don’t use slander or libel against others in the public domain 5. Don’t post copyrighted pictures on the internet or published works Law 1. Don’t smoke in the house 2. Don’t look at inappropriate images on the internet 3. Don’t use work computers for personal stuff 4. Don’t post compromising pictures of yourself on the internet 5. Don’t use a copyrighted picture without permission for personal projects Rule

PROTECTING YOUR IDENTITY Malware – Software that is intended to damage or disable computers and computer systems Virus - piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Spyware – Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from another hard drive. Adware – Software that automatically displays or downloads advertising material (often unwanted) when a user is online Trojan Horse – a hacking program that is non self- replicating, which appears to perform a desirable function but instead causes harm.

PROTECTING YOUR IDENTITY Cookies – a small piece of data sent from a website and stored in a user’s web browser while the user is browsing the website. Not necessarily malicious. Can store passwords and user information You can clear out your cookies periodically. Sometimes required to run certain websites Firewall – Establishes a barrier between a trusted, secure internal network and another network that is not necessarily secure or trusted. Virus Protection Software – Software designed to seek out and destroy computer viruses. Must be updated each year or it will not find new viruses. Cannot guarantee to work every time.

TIPS FOR SECURING YOUR IDENTITY Choose good passwords and pins Don’t use passwords that are too long or too short Don’t include any personal info (name, birthdate, family names, nickname) Use punctuation and upper and lowercase letters Use made up words or words made up from a line from your favorite song Keep your virus protection up to date Beware of scams Don’t give out identity details Never answer unsolicited or unwanted s (spam)

ERGONOMICS The study of people’s efficiency in their working environment Invest in a good office chair Move regularly Position monitor correctly Position keyboard correctly Organize and clean your office or area

JOE VS. THE VOLCANO Having an unhealthy office environment can be dangerous to workers. Nerve damage, spinal injury, and illness. Watch this video and look for things that are unhealthy in the work environment. Watch Video