We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMegan Hutchinson
Modified over 2 years ago
Module 2.2 Security, legal and ethical issues Theme: Finding solutions
Computer crime Computer crime involves the use of ICT to commit a crime or to assist in the commission of a crime.
Computer crime Examples –Data theft –Identity theft –Pornographic exploitation –Paedophile ‘rings’ –Piracy –Theft of computer resources –Theft from companies and bank accounts
Computer crime Containing and preventing is difficult because –no specially trained police officers –budget not big enough –laws unclear –crime committed across international boundaries.
Activity EXPLORE Activity 1 p 68 1
Security risks –Malware –Unauthorised access –Unauthorised use –Hardware theft –Software theft –Data theft –System failure Security in ICT
TERMINOLOGY Activity 2 p 69 2 Activity
Security in ICT Precautions – Control access Lockable cases Kensington lock cables Key control
Security in ICT Precautions – Backups
APPLY Activity 3 P 71 3 Activity
Precautions – Install malware detection and removal tools Anti-virus software Spyware prevention software Firewall software Security in ICT
EXPLORE Activity 4 p 74 4 Activity
Security in ICT Precautions – Safeguard against system failure UPS
APPLY Activity 5 p 75 5 Activity
Legal issues What rights do you have as worker or employee? What right do you have as consumer of –Hardware –Software EULA
EXPLORE Activity 6 p 77 6 Activity
Ethical issues Ten Commandments of Computer Ethics PLAGIARISM
EXPLORE Activity 7 p 78 7 Activity
CHECKLIST I can.... 8 Activity
Security risks in a network. Remote access When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Issues Raised by ICT.
Security and Ethics Safeguards and Codes of Conduct.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Factors to be taken into account when designing ICT Security Policies
SPYWARE Do you know where your personal information is?
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security Issues, Ethics, & Emerging Technologies in Education
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Protect Your Good Name Reduce your Risk of Identity Theft.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Computer Skills and Applications Computer Security.
© 2017 SlidePlayer.com Inc. All rights reserved.