Download presentation
Presentation is loading. Please wait.
Published byLillian Oliver Modified over 8 years ago
1
1 Lesson 31 Computer Safety and Ethics Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells
2
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 222 Objectives 1. Maintain a safe computing environment. 2. Prevent computer-related injuries. 3. Identify security risks. 4. Set access restrictions. 5. Understand workplace privacy. 6. Avoid e-commerce problems.
3
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 333 Objectives (continued) 7. Protect privacy on the Internet. 8. Use the Internet safely and legally. 9. Practice responsibility as a computer user.
4
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 444 1. Maintaining a Safe Computing Environment Make sure you use a computer in a way that supports your comfort, health, and safety. Pay attention to your posture, lighting, and activity level. Review product safety guidelines provided with your computer or any other electronic device. See www.osha.gov for guidelines.
5
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E VOCABULARY ASSIGNMENT (28 points) DIRECTIONS: Create a Word document entitled CLB M1L31 Vocabulary. Define the following words (as they relate to computers). RAISE YOUR HAND WHEN DONE. I WILL GRADE ONSCREEN. 5
6
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 666 Vocabulary repetitive strain injury (RSI) sniffer encryption hacking hardware firewall strong password brute force attacks keylogger spyware browser hijacking public key private key phishing hacker
7
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 2. Preventing Computer-Related Injuries Take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injury (RSI), which can result when a person makes too many of the same motions over a long period of time. 777
8
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 888 Identifying Security Risks - Network Protection An intruder could use a sniffer, which is a program that hackers use to capture user names and passwords on a network. Using Network Protection: When setting up a wireless network, change the default password and turn on some form of encryption.
9
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 999 Identifying Security Risks - Network Protection Computer hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system. If the network is large, a hardware firewall that controls the computers from one point should be implemented.
10
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks – Avoiding Data Loss Save frequently. Use surge protectors. Back up important files regularly. 10
11
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks - Network Protection Use strong passwords, install latest security updates, use an up- to-date antivirus program. 11
12
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks - Network Protection A strong password is both complex and secure. Strong passwords are more resistant to brute force attacks, which use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file. A keylogger is a malicious program that records keystrokes. 12
13
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks - Spyware Hackers often use spyware to control your browser, a practice called browser hijacking. Symptoms of browser hijacking: searches get redirected to unrequested websites; your homepage or search engine is changed without your permission; webpages load slowly. 13
14
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks Spyware Safeguarding Data Against Software Threats (continued): Anti-spyware, software designed to detect and remove malicious applications that may be monitoring or gathering information unbeknownst to the user, can be used to protect your system. 14
15
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks (continued) Safeguarding Data Against Software Threats (continued): Spyware may include but is not limited to: – Rootkits - a set of software tools that enable an unauthorized user to gain control of a computer system without being detected 15
16
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks (continued) Safeguarding Data Against Software Threats (continued): Spyware may include but is not limited to: – Adware - software that automatically displays or downloads advertising material when a user is online. 16
17
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks (continued) Safeguarding Data Against Software Threats (continued): Spyware may include but is not limited to: – Trojans – software that creates a backdoor on your computer that gives malicious users access to your system. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. 17
18
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 3. Identifying Security Risks (continued) Safeguarding Data Against Software Threats (continued): Spyware may include but is not limited to: – Cookies are small files which are stored on a user's computer. The main purpose of a cookie is to identify users and possibly prepare customized Web pages or to save site login information for you. 18
19
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E Video: Computer Security Guided Note Taking http://www.onguardonline.gov/articles/0009-computer-security (3:32 minutes) http://www.onguardonline.gov/articles/0009-computer-security Guided Note Taking (Be able to answer these questions) : – Why should you install security software? Why use automatic software updates? – Why set OS’s and browsers to update automatically also? – Why should you not trust pop-ups that say your computer is infected? – Why should you know how vendors are going to protect your financial information? – Why research company / product reviews / complaints before you buy online? – Why are physical addresses and phone numbers for companies important? – Why shouldn’t you provide personal info to non-secure websites? How do you tell when a website is secure? – Why should you use strong passwords? – Why is it important to back up files regularly and frequently? – What does OnGuardOnline.gov have information on? 19
20
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E Assignment Computer Security Review Log into to Kahoot.it Enter the pin number 20
21
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 21 4. Setting Access Restrictions System administrators and users often restrict access to files, storage devices, computers, networks, the Internet, or specific Internet sites to protect data and other users. Software is also available that lets you monitor computer usage, including Web sites, e-mail messages, social networks, instant messaging and chats, and applications.
22
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 22 5. Understanding Workplace Privacy Any information gathered from a company’s computer system is company property and not an individual worker’s personal property. The employee normally has no right to personal privacy regarding those issues. Many organizations have computer or network usage policies that provide guidelines for using the organization’s systems ethically, professionally, and legally.
23
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 23 6. Avoiding E-Commerce Problems Before providing personal information or credit card information on an e-commerce or similar site, first verify that the site is secure.
24
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 24 6. Avoiding E-Commerce Problems (continued) Several companies provide a Transport Layer Security (TLS) or Secure Sockets Layer (SSL) certificate for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements. SSL Certificates, or Digital Certificates, are small data files that are used to establish a secure encrypted connection between a browser (user's computer) and a server (website). This connection protects sensitive data, such as credit card information, exchanged during each visit (session).
25
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 25 6. Avoiding E-Commerce Problems (continued) An SSL certificate consists of a public key and a private key. The public key, which is available to everyone, encrypts information that can only be deciphered using a private key. Private keys, however, can only be used by the owner and can encrypt and decipher the information.
26
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 26 6. Avoiding E-Commerce Problems (continued) The primary advantage of public-key cryptography (coding) is increased security and convenience: public keys never need to be transmitted or revealed to anyone. In a private (secret-key) system, by contrast, the secret keys must be transmitted (either manually or through a communication channel) since the same key is used for encryption and decryption. A serious concern is that there may be a chance that an enemy can discover the secret key during transmission.
27
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 27 7. Protecting Privacy on the Internet Phishing is a type of computer fraud that attempts to steal your private data.
28
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 28 7. Protecting Privacy on the Internet (continued) Cookies and Spyware: Clean up the unnecessary cookies (small files that hold client or website specific data) on your computer frequently with a utility program designed for that purpose. Spyware (software that aims to gather information without the computer users knowledge) can be harmful as well as annoying. Securing Data: The best way to protect data is to effectively control the access to it. Use strong passwords, use code names or aliases, and always sign off of public computers.
29
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E Reading / Notes Assignment Visit class website: – http://cvhmultimedia.weebly.com http://cvhphotography-copeland.weebly.com http://cvhdigitv.weebly.com http://cvhmultimedia.weebly.com http://cvhphotography-copeland.weebly.com http://cvhdigitv.weebly.com Read / Take Notes: Understanding Mobile Apps – Student downloads > Reading / Powerpoints 29
30
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E Assignment Beware Of Spyware Game / Report Play the “Beware Of Spyware” game: – http://www.consumer.ftc.gov/media/game-0002-beware-spyware http://www.consumer.ftc.gov/media/game-0002-beware-spyware Play the game. Partner and summarize (Use Word / Goggle Docs. MLA format) what you’ve learned from the Understanding Mobile Apps reading and the Beware of Spyware Game. Answer the following questions: – What is a mobile app? – Why are some apps free? – What type of data can apps access? – How can I tell what information an app will access or share? – Why does the app I downloaded have ads in it? – Why do I see the ads I do? – Should I update my apps? – Could an app infect my phone with malware? – How can I avoid spyware? Continued on next slide 30
31
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E Assignment Beware Of Spyware Game / Report Be sure both partners names are on your questions / answers. Log-in to Jupiter Grades. Click HW Planner. Select the CT – Mobile Apps / Spyware Game assignment. The Dropbox will open. Select New Juno Doc. Select all of the information in your Word / Google Docs document (Ctrl-A) and copy (Ctrl-C) and paste (Ctrl-V) it your report into the Juno Doc. Lastly, submit by clicking “Turn It In Now” in the upper right corner of the Juno Doc dropbox screen. 31
32
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 8. Using the Internet Safely and Legally Nearly all institutions have written policies and guidelines regarding Internet usage. The Department of Justice and other government agencies provide resources for Internet safety. 32
33
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 33 9. Practicing Responsibility as a Computer User It is your responsibility to stay informed about changes and advancements in computer technology, product upgrades, and virus threats. Recycle products such as used computer paper and ink cartridges.
34
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 34 Summary In this lesson, you learned: How to make sure you use a computer in a way that supports your comfort, health, and safety by taking precautions to avoid repetitive motion injuries (RSI’s), eyestrain, and back problems. Ergonomic design, which adapts equipment and the workplace to fit the worker, can help to prevent repetitive strain and other injuries. 34
35
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 35 Summary (continued) You also learned: To avoid data loss, you can use techniques and devices for preventing computer hacking and computer power interruptions. Devising and following a regular procedure for backing up your data and scanning for malware can also help protect you from data loss. 35
36
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 36 Summary (continued) Additionally: Any information you send from a company’s computer system is available to the company and is the company’s property. As an employee, you normally have no right to personal privacy regarding the company’s computer system. 36
37
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E 37 Summary (continued) TSL and SSL technology enables encryption of sensitive information by establishing a private communication channel. Data transmitted through this channel is encrypted during transmission. Nearly all schools, government agencies, companies, libraries, and other similar institutions have written policies and guidelines regarding Internet usage. 37
38
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E Critical Thinking: Group Assignment (Pairs) Wikipedia contains a Web site dedicated to Internet privacy: http://en.wikipedia.org/wiki/Internet_privacy and review the information contained on the site, then, in a Word document, type and answer the following questions:http://en.wikipedia.org/wiki/Internet_privacy – What did you find the most beneficial for you personally? (Answer as a group. There should be more than one thing your group finds beneficial). – Detail why your group considers the items you listed beneficial. – Discuss the “levels of privacy” as defined in this article. – What are evercookies? – How can posting photographs online lead to privacy concerns? Log-in to Jupiter Grades. 38
39
Lesson 31 Morrison / WellsCLB: A Comp Guide to IC3 4E Critical Thinking: Group Work (Pairs) Click on the CLB M3L31 CRITICAL THINKING: INTERNET PRIVACY assignment name. The dropbox for the assignment will open. Select New Juno Doc. Select all of the information in your Word/ Google Docs document (Ctrl-A) and copy (Ctrl-C) and paste (Ctrl-V) it your report into the Juno Doc. Lastly, submit by clicking “Turn It In Now” in the upper right corner of the Juno Doc dropbox screen. 39
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.