Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin
Home Work School Computers Every Day Is the Classroom at Risk?
A virus is a potentially damaging computer program designed to affect your computer negatively without your Knowledge. A virus spreads from one computer to another. It even spreads through: Cell Phones, Flash drives, e- mail, or I-pads. A virus acts instantly when it comes in contact with other software or storage devices. There are different types of viruses and each one has a different Virus Payload or symptom. What Is A Virus?
Boot Sector Virus- replaces the boot program that starts the computer File Virus- inserts a virus code into files and spreads to any program that accesses the file. Macro Virus- uses word processor or language programs to hide virus codes. Malicious Software Programs- these include Worm and Trojan horse viruses which hide as legitimate programs and copy repeatedly. Logic Bomb- activates when it detects certain conditions. Time Bomb- activates on a particular date. (most common time bomb is the Michelangelo Virus.) Rootkit- allows someone from a remote location to take full control of a computer. Some different types of Viruses
Purchase and install reliable antivirus software. (most antivirus software will scan automatically) Turn off preview. Do not use pirated, illegal copies of copyrighted software. Never start your computer with removable media in the drives. Install a personal firewall program. Always back up your files often. (Save often) Safe Computing Tips
Unauthorized Access is the process in which an individual illegally gains access to a computer or network. Unauthorized Use is the use of a computer to perform unapproved, or even illegal activities. One way to prevent either situation from happening is to implement Access Controls. Access controls are security measures that define who can access a computer. Unauthorized Access and Use
Another precaution to take in order to prevent unauthorized access and use is to designate a Possessed Object. A possessed object is any item, such as a badge, key, or card that grants the holder access to a computer facility or computer. Many facilities, including schools, are using Biometric Devices, which takes a personal characteristic, such as a fingerprint, and translates it into a digital code to be verified for authenticity. Possessed Objects and Biometric Devices
Firewalls are another great way to protect your computer from hackers. A firewall is a security system that prevents unauthorized access to data and personal information. Both Windows and Mac come with a personal firewall. Routers also come with a hardware firewall pre-installed. Firewalls
System Failure also poses a major threat when it comes to data loss. A system failure is a result of electrical problems (overvoltage, power surges), as well as hardware and software errors. One way to prevent system failures is to use a surge protector. A surge protector is not only useful for your computer, but for your modem, telephone lines, DSL lines, etc. System Failure
To prevent data loss, many schools and businesses back up their important files by placing them on flash drives, disc, or portable hard drives. A secondary back up is also helpful if the original disc is lost, or destroyed. As an extra precaution, it would be wise to store backup copies at an off-site location. This simple precaution prevents a single disaster, such as a fire, from destroying the primary and backup copies. Backing Up
Information privacy is the right of individuals and organizations to deny or restrict the collection and use of information about them. Information Privacy and it’s Impacts on Schools
Copyright means the original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distributes the creative work. 3 areas of copyright directly impact todays class room 1) illegal copying or using copyrighted materials. 2)copyrighted materials accessible on the internet. 3)use of copyrighted materials on teacher and student web pages. Copyright and the Impact on school
Computer ethics are the moral guidelines that govern the use of computers, networks, and information systems. 1)Phishing a scam in which a perpetrator sends an official looking that attempts to obtain personal and financial information from the recipient. 2) spam is unsolicited message or newsgroup pasting sent to many recipients newsgroups at once. Privacy laws are laws regarding storing and disclosing personal data and other computer related issues. Employee and student monitoring uses computers to observe, record, and review an individual’s use of a computer. (Communications, keyboard use, and internet sites visited. Filtering software Acceptable use policies- set of rules for school and school district computers Teacher observation- permits teachers to monitor their students’ activity. Ethical Issues on the internet and how schools are dealing with them
Ergonomics applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the work place. Viewing angle of screen is 20 degrees from eye to center of screen with a distance of inches. Elbows at about 90 degrees and arms and hands approximately parallel to floor. Chair height should be adjustable and should have 4-5 legs for stability Keyboard 23 to 28 depending on height of user. Feet on the floor. Safe and healthy uses of Technology use.