Computers & Society Computers long ago entered our social world … they can be used crudely or skillfully © 2004 Lawrence Snyder.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Let’s Talk About Cyber Security
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
W15D3. Protection (recap) Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in s received  Use search.
By Laura Trawin.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Society & IT Computers: not just for dorks sitting alone in front of glowing display monitors CSE/INFO Mar Presented by Sandra B. Fan, with.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Basics 4 By: Mr. Stanford. Computer Foundations Although it may be hard to imagine, not too long ago, personal computers did not exist. Since.
Computer Viruses.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Santa’s s By Morgan Johnson. Sending an attachment to Santa  Explain how you attached the . Just click attach and click the folder I.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Santa’s s By Jack Carr. Sending an attachment to Santa Explain how you attached the . New message, insert, attachment Explain why you.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
 Be careful-emotions are not easily conveyed  address should be used at end of for signature  Be brief  Space between lines enhances readability.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Computer virus Done: Aaesha Mohammed ID: H
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,
Computer Viruses Author: Alyse Allen.
COMPUTER VIRUSES Computer Technology.
Chap 10 Malicious Software.
Follow safety rules so that YOU: Avoid getting HURT.
Announcements Project 3a due Friday -- use eTurnin by clicking on link, following instructions Upcoming lectures: Friday, Grace Whiteaker, on Privacy Monday,
Santa’s s By……..
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Computers & Society Computers long ago entered our social world … they can be used crudely or skillfully © 2004 Lawrence Snyder

The Problem With is part of our lives … but it’s not good for everything Poor for emotion, alternating interactions, most broadcast, sarcasm, … has (n)etiquette 1 topic messages; include context w/ reply Use ‘vacation’ auto-reply Answer aging in reverse arrival order Get sender’s permission before forwarding

Virus And Worms A virus embeds in SW & travels with it, worms move around net on their own Both can do damage like erasing your files or taking information, but they may not Best defense is practicing “safe” computing All computers should have virus protection software -- many vendors You are responsible for protecting your computer!

Example: Melissa Melissa virus (Friday 3/26/99) embeds in MS Word docs attached to Would this make sense coming from a friend? From: Subj: Important Message From To: Here is that document you asked for … don’t show anyone else ;-) Attachment: LIST.DOC Its still out there!

What Happens w/Melissa When users open the attachment, initializing code runs (often macros) That code is the virus/worm and can do harm or setup to do harm It also propagates itself, e.g. getting the address book and sending copies of itself to those people David L. Smith pleaded guilty to creating and propagating Melissa

MyDoom.b This month’s species is MyDoom.b Like Melissa …  MyDoom.b is a worm  Spreads by attachments  Virus software began checking for it within 24 hours  MyDoom.b is a mutant of MyDoom Unlike Melissa … it’s harmful

MyDoom.b

Be Cautious Viruses/worms are serious, be cautious Have virus software running on any machine connected to the Internet Don’t ever get “trigger happy” at opening attachments Be careful where you get your SW from! - Commercial SW, Shareware, Freeware Keep your files “backed up” Be alert to “phony” viruses

Expect The Unexpected Be alert for odd behavior, weird events … think about it, “What’s happenin’?” [It’s hard to teach/learn this topic] In physical world, many cues alert us, but for synthetic world of IT, we must use reasoning When something is odd, can you explain it? Even if you can’t, does your understanding of it suggest some action? Dying software is often gimpy before crashing

Copyright Basic facts about copyright Since 1989 the © has not been needed Creating “intellectual property” automatically creates a copyright Most information is owned by someone, but if you get a copy legally you can use it personally- read it, play it, etc. - but no copy “Fair Use” allows copying for “socially valuable purposes,” like reviews, education www3.utsystem.edu/ogc/IntellectualProperty/copypol2.htm

Hard Facts About SW It is virtually impossible to create bug- free software Software engineers know this (better than anyone) and make huge efforts to write quality programs and test them carefully Expect quality, but be alert for bugs Try other products if bugs/errors numerous Be wary of SW in “safety critical” situations Life is uncertain … eat dessert first!