SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Let’s Talk About Cyber Security
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Boyertown Area School District Acceptable Use Policy.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Unit 18 Data Security 1.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Viruses.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Your Interactive Guide to the Digital World Discovering Computers 2012.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Your Interactive Guide to the Digital World Discovering Computers 2012.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
For more notes and topics visit: eITnotes.com.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Skills and Applications Computer Security.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Managing Windows Security
Discovering Computers 2012: Chapter 8
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Presentation transcript:

SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins Brock Williams William Cravey Amber Couch Erin Lynn Mullins

COMPUTER SECURITY: RISKS AND SAFETY GUARDS 2

VIRUS – a potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works. oIllegal computer code oCan alter programs or destroy data oCan copy itself onto programs to spread its effects 3

VIRUS PAYLOAD -the symptom or damage caused by a virus - Can be harmless or can cause significant damage 4

BOOT SECTOR VIRUS – replaces the boot program used to start the computer with a modified, infected version of the boot program -When the computer runs the infected boot program, it loads the virus into the computer’s memory -This causes it to spread to any storage media inserted into the computer 5

FILE VIRUS – inserts virus code into program files -Spreads to any program that accesses the infected file 6

MACRO VIRUS – uses the macro language of an application to hide virus codes -If a document with an infected macro is opened, the virus loads into memory -Certain actions, such as saving the document activate the virus -Often are part of templates 7

TWO COMMON VARIATIONS OF COMPUTER VIRUSES - Worm – program that copies itself repeatedly in a computer’s memory or on a network -Uses up resources and can potentially shut down a computer or network -Creators of worms make them appealing to people so they’ll download them - Trojan Horse – malicious software program that hides within or is designed to look like a legitimate program 8

LOGIC BOMBS AND TIME BOMBS Logic bomb – a program that activates when it detects a certain condition. Time bomb – a type of logic bomb that activates on a particular date. -Michelangelo virus – destroys data on your hard disk on March 6, the date of Michelangelo’s birthday. 9

SAFE COMPUTING TIPS 10

SAFE COMPUTING TIPS - Purchase and install reliable antivirus software - Scan all removable media - Scan all files downloaded from the internet - Scan all attached files before opening them - Turn off preview - Scan all software before using it, even if it is shrink-wrapped - Do not use pirated, illegal copies of copyrighted software - Never start your computer with removable media in the drives - Install a personal firewall program to help protect against unwanted incoming attacks - Back up your files often - Set your antivirus program to scan automatically 11

ANTIVIRUS PROGRAMS - Using an antivirus program is one of the more effective ways to protect against computer viruses. - An antivirus program is designed to detect, disinfect, and protect computers and networks from viruses. - The programs work by looking for programs that attempt to modify the boot programs that normally are read from but not written to. - Antivirus programs can be installed on personal computers and networks. - A popular choice of software by most schools is Norton. 12

RESCUE DISC A rescue disc is normally a CD-ROM that contains an uninfected copy of key operating system commands and start-up information that enables the computer to restart correctly. 13

UNAUTHORIZED ACCESS AND USE - Unauthorized access is the use of a computer or network without permission. - Individuals who tries to access a computer or network illegally is called a Hacker - These individuals goal is to break into computers by logging into a server as a user and not only corrupt files but gain access to them. - Unauthorized use is the use of a computer or data for unapproved or possibly illegal activities. - Unauthorized users range from employee’s using a company computer for personal needs to someone gaining access to a bank system and completing an unauthorized transfer of funds. 14

PERSONAL SETTINGS/ PARENTAL CONTROLS - Block unwanted sites from popping up. - Regulate what material (age appropriate) is viewed under certain users. - Deny access to guest users of personal files and private material or information. - Set up daily scans for antivirus programs to run while your not on the computer. 15

ACCESS CONTROL - One way to prevent unauthorized access to and use of computers is to implement access controls, which are security measures that define who can access a computer, when they can success it, and what actions they can take while using the computer. - Most schools and businesses provide authorized users with unique user identifications (often called User ID and Password that allows them to log on to the network). - Most home or personal computers offer this same security. 16

FIREWALLS - Despite efforts to protect the data on your computer’s hard disk, it still is vulnerable to attacks from hackers. - A firewall is a security system consisting of hardware and software that prevents unauthorized access to data and information on a network. - Many schools route all communications through a proxy server which screens all incoming and outgoing messages. - Windows Vista/XP or Mac OS X already have personal firewall. - Most routers have a firewall as well. 17

HARDWARE/SOFTWARE THEFT - Places with multiple computers and devices are susceptible to theft. - Chain computers to desks. - Lock up unused equipment and software. - Software theft is a growing crime in America. - Piracy is number 1 software thief in the world. 18

ETHICS AND THE INFORMATION AGE 19

ETHICS Ethics are standards that determine whether an actions is good or bad. Computer ethics: 1. Unauthorized use of computers 2. Hardware, software, and information theft. 3. Information privacy 4. Copyright 5. Existence of liable materials on the internet 20

INFORMATION PRIVACY Information privacy is the right of individuals and organizations to deny or restrict the collection and use of information about them. 21

UNAUTHORIZED COLLECTION AND USE OF INFORMATION - Electronic profile - Phishing - Spam - Spim - Split - filtering - Antispam program 22

PRIVACY LAWS - Collected data about individuals limits the information that one can store. - Data is restricted to only those who need it to perform their job duties. - Release of personal information can be released after getting permission. - Individual collected has to be given an opportunity for the person to determine accuracy. 23

EMPLOYEE AND STUDENT MONITORING - What is employee monitoring? - What does Acceptable Use Policy mean? 24

COPYRIGHT LAWS - What is copyright? - Three areas of copyright in today’s classroom: - Illegal copying - Use of printed and copyrighted materials via internet. - Copyrighted materials on teacher and student Web pages. 25

FAIR USE - What is fair use? - What all does fair use guidelines apply to? 26

TEACHER AND STUDENT WEB PAGES - Web publishing - Public domain 27

INTERNET ETHICS AND OBJECTIONABLE MATERIALS 28

OBJECTIONABLE MATERIAL -Pornographic Material -Controversial Subjects -Inappropriate Material for K-12 Students 29

CHILDREN’S INTERNET PROTECTION ACT -Passed in 2000 to protect children from obscene, pornographic, and other information considered harmful to minors. - Required Filtering Systems -Only a very small percentage of the internet is able to be accessed through K-12 computers. 30

CYBERBULLYING -The posting or sending of detrimental or cruel text or images using the Internet or other digital devices. -Students, Teachers, and Faculty can all be victims. 31

PARENTAL CONTROLS -Parental Controls are available in Windows Vista/XP and Mac Operating Systems. -Parental Options - Web Filter - Time Limits - Games - Allow and Block Specific Programs -Internet Filtering Software, such as ‘Net Nanny’, are also available online -Communication with your children is still the key to safety. 32

EDUCATIONAL CONTROLS -Filtering Software – Schools install these and constantly update them to keep them as current as possible. -Acceptable Use Policies- Many schools require for parents or guardians to print, sign, and mail or deliver them to the school. -Curriculum Pages -Teacher Observation 33