Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security Objectives Describe the types of computer security risks
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Viruses & Destructive Programs
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
Viruses.
Computer Security, Ethics and Privacy
1 Pertemuan 11 Understanding Computers Privacy & Health Concerns Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Security, Ethics and Privacy Chapter 11.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
Chapter 11 Objectives Describe the types of computer security risks
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education.
Chapter 8 Security Issues, Ethics, and Emerging Technologies in Education.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Ch. 9&10 RAP SarahBeth Walker. Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Security Issues & Ethics in Education By Maud Mushayamunda.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Chapter 40 Internet Security.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Information Technology
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 10 Computer Security, Ethics, and Privacy
BCT 2.00 Analyze Technology Issues
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Presentation transcript:

Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans

With the growing use of technology, it is important to ensure that computers and software are protected from loss, damage, and misuse. This chapter helps identify risks to computers and software, and what you can do to minimize these risks.

 Computer security risk – any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability.  One of these risks, such as viruses, are a result of deliberate acts that are against the law. Any illegal act involving a computer, such as this, is referred to as a computer crime.

VIRUSES  A virus is a potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works.  Viruses spread systematically from one file to another.  Viruses do not generate by chance. Creators of viruses write them to spread from file to file to cause damage. This damage is called the virus payload. It can be harmless or it can cause significant damage.

There are 3 main types of viruses: boot sector virus, file virus, and macro virus.  Boot sector viruses replace the boot program used to start the computer with a modified infected version.  File viruses insert virus codes into program files. The virus then spreads to any program that accesses the infected file.  Macro viruses use the macro language of an application, such as word processing or a spreadsheet program, to hide virus codes.

Malicious software Programs  There are 2 common variations of computer viruses, also known as malicious software programs.  These 2 programs are known as worms and trojan horses.

Worms and Trojan Horses  A worm is a program that copies itself repeatedly in a computer’s memory or on a network. This can possibly shut down the computer or network.  A trojan horse is a malicious software program that hides within or is designed to look like a legitimate program. It is named after the Greek myth.

Virus detection and removal  There is no completely effective way to keep a computer or network safe from viruses.  Viruses are normally spread between computers by inserting an infected storage medium into a computer, or downloading an infected file from the internet or an attachment.  Using an antivirus program is one of the more effective ways to protect against viruses. Antivirus programs are designed to detect, disinfect, and protect computers and networks.

Unauthorized access and use  Unauthorized access is the use of a computer or network without permission.  Cracker- an individual who tries to access a computer or network illegally.  Hacker- a person who tries to break into a computer, often intending to steal or corrupt its data.  One way to prevent unauthorized access is to implement access controls. This can be done with user IDs and passwords. The best passwords are at least 8 digits long, a combination of letters and numbers, and something that can be typed without looking at the keyboard. The more creative the better.

 Unauthorized use – is the use of a computer or data for unapproved or possibly illegal activities. This can be something as simple as an employee using a work computer to send personal .

Firewalls  A firewall is a security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network.  Schools use firewalls to deny internet to outsiders and to restrict both student and teacher access to sensitive date.  Many schools route all communications through a proxy server, which screens all incoming and outgoing messages.  Computer Vandalism takes many forms. Schools usually have written policies for handling various types of vandalism.

Software Theft  Software piracy – the unauthorized and illegal duplication of copyrighted software. This is the most common form of software theft.  Software license – an agreement that provides specific conditions for use of the software, which users must accept before using the software. The most common is a single-user license agreement or end-user license agreement (EULA). Users may install the software on one computer, or one computer and one laptop. The software can not be installed on a network.

Shareware and Freeware  Shareware and Freeware are two additional types of software that require a license agreement.  Shareware is software that is distributed for a trial period. If you want to use the shareware beyond the trial period, the developer expects you to send a small fee.  Freeware is software provided at no cost to a user by an individual company.

Network and Community/State site license  A network site license allows network users to share a single copy of the software, which resides on the network server. Prices are based on a fixed fee for an unlimited number of users.  A community/state site license gives an entire region or state the right to install an unlimited number of educational copies of a particular software program on individual computers or a network.

System Failure  System failure is a malfunction of the computer. They occur because of electrical power problems, hardware component failure, or software error.  The most common cause is an abrupt variation in electrical power.  Two more common electrical power variations are undervoltages (power supply drops) and overvoltages (power surge over 120 volts) A surge protector is a device that smoothes out minor voltage errors to provide a stable current flow.

Computer Ethics Computer ethics are the moral guidelines that govern the use of computer, networks, and information systems. There are five areas of computer ethics. 1.Unauthorized use of computers 2.Hardware, software, and information theft 3.Information privacy 4.Copyright 5.The existence of objectionable materials on the internet.

Objectionable Material and Children’s Internet Protection Act Objectionable material includes: racist literature, obscene pictures and videos, gambling, and age-restricted items. The Children’s Internet Protection Act is used to protect children from obscene, pornographic, and harmful information. This act requires that all public computers install filtering software to block this kind of information. Parental controls can be used on personal home computers to prevent the same information from being accessed at home.

Computers and health issues Computer related heath issues include tendonitis and carpal tunnel syndrome  Tendonitis is inflammation of a tendon due to repeated motion or stress on the tendon.  Carpal tunnel syndrome is inflammation of the nerve that connects the forearm to the palm of the wrist. This, like tendonitis, can be caused by repeated or forceful bending of the wrist.

Ergonomics Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.  Viewing angle should be 20 degrees from eye to the center of the screen. The distance should be 18 – 28 inches.  Elbows should be at 90 degrees and arms and hands should be parallel to the floor.  The chair height should be adjustable and have 4 – 5 legs for stability.  Keyboard placement should be 20 – 28 inches depending on the height of the user.