We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMegan Hutchinson
Modified about 1 year ago
Module 2.2 Security, legal and ethical issues Theme: Finding solutions
Computer crime Computer crime involves the use of ICT to commit a crime or to assist in the commission of a crime.
Computer crime Examples –Data theft –Identity theft –Pornographic exploitation –Paedophile ‘rings’ –Piracy –Theft of computer resources –Theft from companies and bank accounts
Computer crime Containing and preventing is difficult because –no specially trained police officers –budget not big enough –laws unclear –crime committed across international boundaries.
Activity EXPLORE Activity 1 p 68 1
Security risks –Malware –Unauthorised access –Unauthorised use –Hardware theft –Software theft –Data theft –System failure Security in ICT
TERMINOLOGY Activity 2 p 69 2 Activity
Security in ICT Precautions – Control access Lockable cases Kensington lock cables Key control
Security in ICT Precautions – Backups
APPLY Activity 3 P 71 3 Activity
Precautions – Install malware detection and removal tools Anti-virus software Spyware prevention software Firewall software Security in ICT
EXPLORE Activity 4 p 74 4 Activity
Security in ICT Precautions – Safeguard against system failure UPS
APPLY Activity 5 p 75 5 Activity
Legal issues What rights do you have as worker or employee? What right do you have as consumer of –Hardware –Software EULA
EXPLORE Activity 6 p 77 6 Activity
Ethical issues Ten Commandments of Computer Ethics PLAGIARISM
EXPLORE Activity 7 p 78 7 Activity
CHECKLIST I can Activity
Security risks in a network. Remote access When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Issues Raised by ICT. Topics Security Privacy Health and Safety Legal and Ethical Environmental Practice Paper.
Security and Ethics Safeguards and Codes of Conduct.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
FACTORS TO BE TAKEN INTO ACCOUNT WHEN DESIGNING ICT SECURITY POLICIES.
SPYWARE Do you know where your personal information is?
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security Issues, Ethics, & Emerging Technologies in Education.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Protect Your Good Name Reduce your Risk of Identity Theft.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Computer Skills and Applications Computer Security.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security Information Systems Today Leonard Jessup and Joseph Valacich.
Chap1: Is there a Security Problem in Computing?.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
General Awareness Training Security Awareness Module 2 What is a Security Incident? How Vulnerable am I?
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
1 Chapter 9 Information Systems Ethics, Computer Crime, and Security Information Systems Today Leonard Jessup and Joseph Valacich.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer Security, Ethics and Privacy Chapter 11.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A surge suppressor can be used to protect a computer against.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
ProtectYour GoodName Protect Your Good Name Reduce Your Risk of Identity Theft.
Digital Security Jesline James! 9cc. Contents The CREATORS!!!! =] The CREATORS!!!! =] What is Digital Security? What is Digital Security? How does.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online Computer Literacy BASICS.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education Taylor Grizzle.
Protecting Your Information Assets Explain why it is critical that you protect your information assets. 2. Identify the various behavioral actions.
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Information Security Identify the five factors that contribute to the increasing vulnerability of information resources, and provide a specific.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
© 2017 SlidePlayer.com Inc. All rights reserved.