Download presentation
Presentation is loading. Please wait.
Published byMarlene Rice Modified over 9 years ago
1
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009
2
Web Site Design Process Steps to building a Web site: Define objectives and intended audience of the Web site Select the content to be presented Determine the navigational structure and layout Construct the individual Web pages Test your Web site (proofread content, verify links) Obtain server space and a URL Publish (FTP), then publicize, your Web site Keep Web page content up-to-date
3
Local Area Networks Local Area Network (LAN) is a network of machines covering a limited geographical area Metropolitan Area Network (MAN) covers more densely populated area
4
Wide Area Networks Wide Area Network (WAN) covers multiple locations Each location consists of a LAN or MAN LANs and WANs are often private networks
5
Firewalls What is a firewall ? A security system that prevents unauthorized access to data and information on a network or computer Prohibits access from the Internet Internet
6
Computer Security What is computer security risk? Any event or action that has the potential of causing a loss or theft of computer equipment, software, data, information, or processing capability What is computer crime? Examples? Any illegal act involving a computer e.g. unauthorized access, information/identity theft, viruses, online predators, etc.
7
Acceptable Use Policies (AUP) What is an acceptable use policy? Rules that govern the use of school and school district computers, networks, and the Internet.... Rules concerning objectionable materials Rules concerning copyright Guidelines for proper use Guidelines for online safety of personal information Consequences of breaking the rules
8
Unauthorized Access and Use What is unauthorized access? Accessing a computer or network without permission What is unauthorized use? Using a computer or data for unapproved or illegal activities protecting against unauthorized access how do you best select a password?
9
Viruses What is a computer virus? An illegal computer program that is potentially damaging to your computer May cause corruption or loss of data May cause software to malfunction or a system meltdown May be a harmless prank
10
Viruses
12
Antivirus Software Antivirus software detects, disinfects, and protects computers and networks from viruses
13
Antivirus Software How does antivirus software work? Detects programs attempting to write new data to the boot program, the operating system, etc. Scans for known virus programs Information about known viruses are downloaded frequently (daily or weekly)
14
Hardware Theft Safeguard against hardware theft Keep equipment locked up Security systems (e.g. alarms, video monitoring) Physical security devices (e.g. cables, locks, etc.) Tracking device
15
Software Theft What is software theft? Stealing software by stealing CDs or other media, or illegally downloading and copying software When software is purchased, the buyer typically does not own the software! Instead, the buyer has purchased the right to use the software software license agreement (must accept during installation)
16
Software Licenses End-user license agreement (EULA) User may install software on only one computer Or sometimes on one desktop and one laptop computer User may not install software on a network for multi-user use User may make one copy of software for backup purposes User may not give copies to friends and colleagues
17
Software Licenses also freeware or shareware
18
Information Theft Information and identity theft have become growing concerns Theft of credit card or bank account numbers Theft of social security numbers Theft of other private information e.g. financial aid, grades, courses, library records, etc. How can a school, organization, or individual prevent information theft?
19
Information Theft Organizations can prevent information theft by: Not storing sensitive data (e.g. credit card numbers, social security numbers) Encrypting data that is stored Maintaining firewalls and other network security measures
20
Phishing What is phishing? A scam in which an official-looking e-mail or Web site attempts to obtain personal information an attempt to bring you to a phony Web site and steal your personal information
21
Spam What is spam? Unsolicited e-mail messages selling products or services, promoting (potentially phony) business opportunities, or advertising offensive materials For more information, check out: http://its.strose.edu/ViewArticle.aspx?page_id=74
22
Computer Ethics What is computer ethics? Moral guidelines that govern the use of computers, networks, and information systems Unauthorized access and use Hardware, software, and information theft Information privacy Copyright Existence of inappropriate materials on the Internet
23
Computer Ethics U.S. government laws concerning privacy:
24
Computer Ethics U.S. government laws concerning privacy (cont.):
25
Computer Ethics U.S. government laws concerning privacy (cont.):
26
Objectionable Materials What types of objectionable materials are available on the Internet? Racist, sexist, or otherwise discriminatory materials Pornographic materials Gambling Web sites Age-restricted materials (e.g. cigarettes, alcohol, etc.) Incorrect or inaccurate information easy to identify not so easy to identify
27
Objectionable Materials Government initiatives Children’s Internet Protection Act (2000) Protect children from obscene, pornographic, and other information considered harmful to minors Filtering software prevents Web browsers from displaying materials from targeted sites or sites containing certain keywords
28
Objectionable Materials Parental controls via rating systems Internet Content Rating Association (ICRA) Web browser reads rating of Web pages, and reacts accordingly
29
Objectionable Materials Parental controls via filtering software Net Nanny Relevant age groups?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.