Download presentation
Presentation is loading. Please wait.
Published byLewis Hopkins Modified over 9 years ago
1
3.05 Protect Your Computer and Information Unit 3 Internet Basics
2
Introduction Many consumers enjoy sharing digital files, such as music, movies, photos, and software. File-sharing software that connects your computer to a network of computers is often available for free. File-sharing can pose several risks. – When connected to a file-sharing network, you may allow others to copy files you didn’t intend to share. – You might download a virus or bit of spyware that makes your computer vulnerable to hackers. – You might also break the law by downloading material that is copyright protected.
3
Introduction At the end of this lesson, student will be able to: – Practice safe, ethical, and legal use of technology systems and digital content. (ACOS 13) – Explain consequences of unsafe and illegal use of technology systems and digital content (ACOS 13.B1)
4
Lesson A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the Internet the way some telemarketers automatically dial random phone numbers. They send out pingscalls to thousands of computers and wait for responses. Firewalls prevent your computer from responding to these random calls. A firewall blocks communications to and from sources you don’t permit. To avoid spyware in the first place, download software only from sites you know and trust. Piggybacking spyware can be an unseen cost of many “free” programs. Don’t click on links in pop-up windows or in spam email.
5
Lesson 4 steps to protect your computer – Keep firewall turned on – Keep software & operating system up-to-date – Keep antivirus software up to date – Keep antispyware technology up to date
6
Lesson Firewalls – Firewalls restrict network traffic which can pass through them, based on a set of system administrator defined rules – A firewall consists of a server (with special software) connected on one side to the external network (usually the Internet) and on the other side to the computer system being protected. All incoming and outgoing data between the protected computer system and the network passes through the firewall The firewall server – accepts connection requests – decides whether the connection should be made – and, if permissible, completes the connection – A firewall helps protect your computer from hackers who might try to delete information crash your computer or even steal your passwords or credit card numbers
7
Lesson Antivirus software – Consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware) – To cause problems in software or hardware, a virus program has to run (execute its code) – Antivirus software, which detects and eliminates viruses before they run, is the only way to protect computers against damage.
8
Lesson Consequences of Unsafe and Illegal Use of Technology – Identity theft – Hard drive crashes; loss of information – You can become a victim of Online predator cyberbullying
9
Lesson How to Protect Yourself – Only open emails from trusted sources – Be aware of phishing schemes – Keep antivirus software updated – Keep firewall turned on – Never give out personal information – If you are a victim, tell your parent or a teacher
10
Review Here are some steps you can take to protect your computer and your data: – keep firewall turned on – keep software/operating system and antivirus/antispyware software up to date. – frequently back up your computer files because data may be destroyed, your hard drive may crash, or your laptop stolen.
11
Task Pretend that you are having a debate on School Internet Use and Computer Security. On each of the issues below, pick a side—you are either for or against the issue. In a debate, you must abide by the one-sentence rule, which means that you must make your point clear in one sentence only. When the opposing side makes a statement in which you disagree, you may have a one-sentence rebuttal. Here is an example of a statement for the side that more computer security is needed: “Copying downloaded music is illegal.” Here is an example of a statement that less computer security is needed: “Information should be shared to enhance society.”
12
Task cont. Issues 1.Since classroom computers are for educational purposes only, your teacher has the right and the responsibility to read your computer files. Should your teacher read your files? 2.Should students and even teachers be prevented from installing software on their school computers? 3.Should your school block MP3 files? 4.Should your teachers allow you to visit Facebook/MySpace?
13
Task cont. Decide which side you are on for each of the four issues on the previous slide. These responses must follow this format: – “I agree because (and state why)” OR – “I disagree because (and state why)”. Type your responses in Microsoft Word – Save to your F Drive in your Unit 3 Folder as 3.05 Discussion: Computer Security
14
Are you finished? You should have 15 things saved on your F Drive in your Unit 3 Folder. 1.3.01 Network Tutorial 2.3.01 How Networks Work 3.3.01 History and Internet Dropbox 4.3.02 Skills Check 3 5.3.02 Boolean QC Chart 6.3.02 How Stuff Works Brain Quiz 7.3.02 Searching the Web Dropbox 8.3.03 Intel Education 9.3.03 Tutorial for Info Power 10.3.03 Side Trip 11.3.03 Evaluating Web Sites Dropbox 12.3.04 On Guard Online Spyware Quiz 13.3.04 Practice 14.3.04 Vocabulary Practice 15.3.05 Discussion: Computer Security So, are you finished?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.