Presentation is loading. Please wait.

Presentation is loading. Please wait.

SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.

Similar presentations


Presentation on theme: "SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins."— Presentation transcript:

1 SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins Brock Williams William Cravey Amber Couch Erin Lynn Mullins

2 COMPUTER SECURITY: RISKS AND SAFETY GUARDS 2

3 VIRUS – a potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works. oIllegal computer code oCan alter programs or destroy data oCan copy itself onto programs to spread its effects 3

4 VIRUS PAYLOAD -the symptom or damage caused by a virus - Can be harmless or can cause significant damage 4

5 BOOT SECTOR VIRUS – replaces the boot program used to start the computer with a modified, infected version of the boot program -When the computer runs the infected boot program, it loads the virus into the computer’s memory -This causes it to spread to any storage media inserted into the computer 5

6 FILE VIRUS – inserts virus code into program files -Spreads to any program that accesses the infected file 6

7 MACRO VIRUS – uses the macro language of an application to hide virus codes -If a document with an infected macro is opened, the virus loads into memory -Certain actions, such as saving the document activate the virus -Often are part of templates 7

8 TWO COMMON VARIATIONS OF COMPUTER VIRUSES - Worm – program that copies itself repeatedly in a computer’s memory or on a network -Uses up resources and can potentially shut down a computer or network -Creators of worms make them appealing to people so they’ll download them - Trojan Horse – malicious software program that hides within or is designed to look like a legitimate program 8

9 LOGIC BOMBS AND TIME BOMBS Logic bomb – a program that activates when it detects a certain condition. Time bomb – a type of logic bomb that activates on a particular date. -Michelangelo virus – destroys data on your hard disk on March 6, the date of Michelangelo’s birthday. 9

10 SAFE COMPUTING TIPS 10

11 SAFE COMPUTING TIPS - Purchase and install reliable antivirus software - Scan all removable media - Scan all files downloaded from the internet - Scan all attached files before opening them - Turn off e-mail preview - Scan all software before using it, even if it is shrink-wrapped - Do not use pirated, illegal copies of copyrighted software - Never start your computer with removable media in the drives - Install a personal firewall program to help protect against unwanted incoming attacks - Back up your files often - Set your antivirus program to scan automatically 11

12 ANTIVIRUS PROGRAMS - Using an antivirus program is one of the more effective ways to protect against computer viruses. - An antivirus program is designed to detect, disinfect, and protect computers and networks from viruses. - The programs work by looking for programs that attempt to modify the boot programs that normally are read from but not written to. - Antivirus programs can be installed on personal computers and networks. - A popular choice of software by most schools is Norton. 12

13 RESCUE DISC A rescue disc is normally a CD-ROM that contains an uninfected copy of key operating system commands and start-up information that enables the computer to restart correctly. 13

14 UNAUTHORIZED ACCESS AND USE - Unauthorized access is the use of a computer or network without permission. - Individuals who tries to access a computer or network illegally is called a Hacker - These individuals goal is to break into computers by logging into a server as a user and not only corrupt files but gain access to them. - Unauthorized use is the use of a computer or data for unapproved or possibly illegal activities. - Unauthorized users range from employee’s using a company computer for personal needs to someone gaining access to a bank system and completing an unauthorized transfer of funds. 14

15 PERSONAL SETTINGS/ PARENTAL CONTROLS - Block unwanted sites from popping up. - Regulate what material (age appropriate) is viewed under certain users. - Deny access to guest users of personal files and private material or information. - Set up daily scans for antivirus programs to run while your not on the computer. 15

16 ACCESS CONTROL - One way to prevent unauthorized access to and use of computers is to implement access controls, which are security measures that define who can access a computer, when they can success it, and what actions they can take while using the computer. - Most schools and businesses provide authorized users with unique user identifications (often called User ID and Password that allows them to log on to the network). - Most home or personal computers offer this same security. 16

17 FIREWALLS - Despite efforts to protect the data on your computer’s hard disk, it still is vulnerable to attacks from hackers. - A firewall is a security system consisting of hardware and software that prevents unauthorized access to data and information on a network. - Many schools route all communications through a proxy server which screens all incoming and outgoing messages. - Windows Vista/XP or Mac OS X already have personal firewall. - Most routers have a firewall as well. 17

18 HARDWARE/SOFTWARE THEFT - Places with multiple computers and devices are susceptible to theft. - Chain computers to desks. - Lock up unused equipment and software. - Software theft is a growing crime in America. - Piracy is number 1 software thief in the world. 18

19 ETHICS AND THE INFORMATION AGE 19

20 ETHICS Ethics are standards that determine whether an actions is good or bad. Computer ethics: 1. Unauthorized use of computers 2. Hardware, software, and information theft. 3. Information privacy 4. Copyright 5. Existence of liable materials on the internet 20

21 INFORMATION PRIVACY Information privacy is the right of individuals and organizations to deny or restrict the collection and use of information about them. 21

22 UNAUTHORIZED COLLECTION AND USE OF INFORMATION - Electronic profile - Phishing - Spam - Spim - Split - E-mail filtering - Antispam program 22

23 PRIVACY LAWS - Collected data about individuals limits the information that one can store. - Data is restricted to only those who need it to perform their job duties. - Release of personal information can be released after getting permission. - Individual collected has to be given an opportunity for the person to determine accuracy. 23

24 EMPLOYEE AND STUDENT MONITORING - What is employee monitoring? - What does Acceptable Use Policy mean? 24

25 COPYRIGHT LAWS - What is copyright? - Three areas of copyright in today’s classroom: - Illegal copying - Use of printed and copyrighted materials via internet. - Copyrighted materials on teacher and student Web pages. 25

26 FAIR USE - What is fair use? - What all does fair use guidelines apply to? 26

27 TEACHER AND STUDENT WEB PAGES - Web publishing - Public domain 27

28 INTERNET ETHICS AND OBJECTIONABLE MATERIALS 28

29 OBJECTIONABLE MATERIAL -Pornographic Material -Controversial Subjects -Inappropriate Material for K-12 Students 29

30 CHILDREN’S INTERNET PROTECTION ACT -Passed in 2000 to protect children from obscene, pornographic, and other information considered harmful to minors. - Required Filtering Systems -Only a very small percentage of the internet is able to be accessed through K-12 computers. 30

31 CYBERBULLYING -The posting or sending of detrimental or cruel text or images using the Internet or other digital devices. -Students, Teachers, and Faculty can all be victims. 31

32 PARENTAL CONTROLS -Parental Controls are available in Windows Vista/XP and Mac Operating Systems. -Parental Options - Web Filter - Time Limits - Games - Allow and Block Specific Programs -Internet Filtering Software, such as ‘Net Nanny’, are also available online -Communication with your children is still the key to safety. 32

33 EDUCATIONAL CONTROLS -Filtering Software – Schools install these and constantly update them to keep them as current as possible. -Acceptable Use Policies- Many schools require for parents or guardians to print, sign, and mail or deliver them to the school. -Curriculum Pages -Teacher Observation 33


Download ppt "SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins."

Similar presentations


Ads by Google