Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Lecturer: Fadwa Tlaelan
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Unit 18 Data Security 1.
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Security, Privacy, and Ethics Online Computer Crimes.
Life in the Information Age
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
Computer Viruses and Threats Section 1.03: Identify best practices for computer security and privacy Essential Question: What are the threats to your computer?
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Chapter 11 Security and Privacy: Computers and the Internet.
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
Lesson 27 Communications and Collaboration
VIRUSES and DESTRUCTIVE PROGRAMS
Understand applications and issues of technology. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Objective 2.04 Understand applications and issues of technology. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Understand the nature of business. 1. Understand applications and issues of technology. 2.
First Look at Security and Privacy Jeremiah Burleson.
Computer Crimes Career & Technology Education Department.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
 Understand the nature of business. 1.  Understand applications and issues of technology. 2.
Essential Standard 2.00 Understand the nature of business. 1.
Topic 5: Basic Security.
Essential Standard 2.00 Understand the nature of business. 1.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Technical Implementation: Security Risks
Understand the nature of business.
COMPUTER VIRUSES Computer Technology.
Computer Basics Technology’s Impact.
Fundamentals of Information Systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Analyzing Technology Issues
Computer Viruses.
BCT 2.00 Analyze Technology Issues
Telecommunications Tele – distant; at a distance; over a distance
Understand the nature of business.
Understand the nature of business.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A

The Impact of Technology on Education  Education Internet Internet Distance Learning Distance Learning Computer-Based Learning Computer-Based Learning Simulations Simulations 2.01

The Impact of Technology on Science  Science Artificial Intelligence Artificial Intelligence Genetic Engineering Genetic Engineering Virtual Reality Virtual Reality 2.01

 Multinational Economy  Electronic Commerce The Impact of Technology on Work 2.01

 Clothes that fight odor and bacteria  The flying car  Voice recognition  Space travel  Smart shoes and smart seats  Smart houses  Electronic shopping The Impact of Technology on Our Lives 2.01

Exploring Technology Careers  Business and Office Administrative Assistant Administrative Assistant Desktop Publisher/Graphic Designer Desktop Publisher/Graphic Designer  Network Support and Administration PC Support Specialist PC Support Specialist Manager of Information Systems Manager of Information Systems  Web-Based Web Developer Web Developer Web Master Web Master 2.01

Computer Crimes  A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer. 2.02

Types of Computer Crimes  Computer fraud Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss.  Computer hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion. Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion. 2.02

Other Computer Crimes  Theft of computer time An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records.  Data diddling Changing data before it is entered into the computer or after is has been entered into the computer. Changing data before it is entered into the computer or after is has been entered into the computer. 2.02

Computer Viruses A virus is a program that has been written to cause corruption of data on a computer. 2.02

Types of Computer Viruses WormWorm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. Time bombTime bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. Logic bombLogic bomb Virus triggered by the appearance or disappearance of specified data.Virus triggered by the appearance or disappearance of specified data. Trojan horseTrojan horse Virus that does something different from what it is expected to do.Virus that does something different from what it is expected to do. 2.02

Privacy and Security Issues  Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. 2.02

Security Measures Maintain and Enforce Security Measures such as:  Passwords  Electronic identification cards  Firewalls  Antivirus software  Selective hiring process 2.02

Advantages and Uses of Telecommunications  Telecommunication involves electronically transferring data. Distance learning Distance learning Allows the user to take classes without being physically present.Allows the user to take classes without being physically present. Teleconferencing Teleconferencing Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel.Provides conferencing capabilities from several locations without leaving the office, reduces costs for time and travel. 2.03