Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
POSSIBLE THREATS TO DATA
Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
THE INTERNET: NAVIGATING THE WORLD WIDE WEB SAFELY AND RESPONSIBLY Student Orientation.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Discovering Computers 2010
Viruses & Destructive Programs
Issues Raised by ICT.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Internet safety By Lydia Snowden.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Your Interactive Guide to the Digital World Discovering Computers 2012.
BUSINESS B1 Information Security.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 11 Objectives Describe the types of computer security risks
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Security Issues & Ethics in Education By Maud Mushayamunda.
Managing Windows Security
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Lecture 8. Cyber Security, Ethics and Trust
Computer Ethics.
Presentation transcript:

Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

 Home  Work  School Computers Every Day Is the Classroom at Risk?

 A virus is a potentially damaging computer program designed to affect your computer negatively without your Knowledge.  A virus spreads from one computer to another.  It even spreads through: Cell Phones, Flash drives, e- mail, or I-pads.  A virus acts instantly when it comes in contact with other software or storage devices.  There are different types of viruses and each one has a different Virus Payload or symptom. What Is A Virus?

Boot Sector Virus- replaces the boot program that starts the computer File Virus- inserts a virus code into files and spreads to any program that accesses the file. Macro Virus- uses word processor or language programs to hide virus codes. Malicious Software Programs- these include Worm and Trojan horse viruses which hide as legitimate programs and copy repeatedly. Logic Bomb- activates when it detects certain conditions. Time Bomb- activates on a particular date. (most common time bomb is the Michelangelo Virus.) Rootkit- allows someone from a remote location to take full control of a computer. Some different types of Viruses

 Purchase and install reliable antivirus software. (most antivirus software will scan automatically)  Turn off preview.  Do not use pirated, illegal copies of copyrighted software.  Never start your computer with removable media in the drives.  Install a personal firewall program.  Always back up your files often. (Save often) Safe Computing Tips

 Unauthorized Access is the process in which an individual illegally gains access to a computer or network.  Unauthorized Use is the use of a computer to perform unapproved, or even illegal activities.  One way to prevent either situation from happening is to implement Access Controls. Access controls are security measures that define who can access a computer. Unauthorized Access and Use

 Another precaution to take in order to prevent unauthorized access and use is to designate a Possessed Object. A possessed object is any item, such as a badge, key, or card that grants the holder access to a computer facility or computer.  Many facilities, including schools, are using Biometric Devices, which takes a personal characteristic, such as a fingerprint, and translates it into a digital code to be verified for authenticity. Possessed Objects and Biometric Devices

 Firewalls are another great way to protect your computer from hackers. A firewall is a security system that prevents unauthorized access to data and personal information.  Both Windows and Mac come with a personal firewall. Routers also come with a hardware firewall pre-installed. Firewalls

 System Failure also poses a major threat when it comes to data loss. A system failure is a result of electrical problems (overvoltage, power surges), as well as hardware and software errors.  One way to prevent system failures is to use a surge protector. A surge protector is not only useful for your computer, but for your modem, telephone lines, DSL lines, etc. System Failure

 To prevent data loss, many schools and businesses back up their important files by placing them on flash drives, disc, or portable hard drives.  A secondary back up is also helpful if the original disc is lost, or destroyed.  As an extra precaution, it would be wise to store backup copies at an off-site location. This simple precaution prevents a single disaster, such as a fire, from destroying the primary and backup copies. Backing Up

 Information privacy is the right of individuals and organizations to deny or restrict the collection and use of information about them. Information Privacy and it’s Impacts on Schools

 Copyright means the original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distributes the creative work.  3 areas of copyright directly impact todays class room 1) illegal copying or using copyrighted materials. 2)copyrighted materials accessible on the internet. 3)use of copyrighted materials on teacher and student web pages. Copyright and the Impact on school

 Computer ethics are the moral guidelines that govern the use of computers, networks, and information systems.  1)Phishing a scam in which a perpetrator sends an official looking that attempts to obtain personal and financial information from the recipient. 2) spam is unsolicited message or newsgroup pasting sent to many recipients newsgroups at once.  Privacy laws are laws regarding storing and disclosing personal data and other computer related issues.  Employee and student monitoring uses computers to observe, record, and review an individual’s use of a computer. (Communications, keyboard use, and internet sites visited.  Filtering software  Acceptable use policies- set of rules for school and school district computers  Teacher observation- permits teachers to monitor their students’ activity. Ethical Issues on the internet and how schools are dealing with them

 Ergonomics applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the work place.  Viewing angle of screen is 20 degrees from eye to center of screen with a distance of inches.  Elbows at about 90 degrees and arms and hands approximately parallel to floor.  Chair height should be adjustable and should have 4-5 legs for stability  Keyboard 23 to 28 depending on height of user.  Feet on the floor. Safe and healthy uses of Technology use.