Download presentation
Presentation is loading. Please wait.
Published byMegan Hutchinson Modified over 9 years ago
1
Module 2.2 Security, legal and ethical issues Theme: Finding solutions
2
Computer crime Computer crime involves the use of ICT to commit a crime or to assist in the commission of a crime.
3
Computer crime Examples –Data theft –Identity theft –Pornographic exploitation –Paedophile ‘rings’ –Piracy –Theft of computer resources –Theft from companies and bank accounts
4
Computer crime Containing and preventing is difficult because –no specially trained police officers –budget not big enough –laws unclear –crime committed across international boundaries.
5
Activity EXPLORE Activity 1 p 68 1
6
Security risks –Malware –Unauthorised access –Unauthorised use –Hardware theft –Software theft –Data theft –System failure Security in ICT
7
TERMINOLOGY Activity 2 p 69 2 Activity
8
Security in ICT Precautions – Control access Lockable cases Kensington lock cables Key control
9
Security in ICT Precautions – Backups
10
APPLY Activity 3 P 71 3 Activity
11
Precautions – Install malware detection and removal tools Anti-virus software Spyware prevention software Firewall software Security in ICT
12
EXPLORE Activity 4 p 74 4 Activity
13
Security in ICT Precautions – Safeguard against system failure UPS
14
APPLY Activity 5 p 75 5 Activity
15
Legal issues What rights do you have as worker or employee? What right do you have as consumer of –Hardware –Software EULA
16
EXPLORE Activity 6 p 77 6 Activity
17
Ethical issues Ten Commandments of Computer Ethics PLAGIARISM
18
EXPLORE Activity 7 p 78 7 Activity
19
CHECKLIST I can.... 8 Activity
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.