Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.

Similar presentations

Presentation on theme: "Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate."— Presentation transcript:

1 Computer Ethics Ms. Scales

2 Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate Internet use and to protect the user. Also use to delegate general computer usage. Code of Conduct  The way we conduct ourselves in society

3 Computer Conduct Netiquette  A new term the refers to how you present yourself and treat others when online Privacy  The ability to keep yourself and your information private from others

4 Protecting Your Computer Online Safety  Precautions taken to protect personal information and images from being misused by others. Security Protection  of computer, computer files, or a computer network form use without permission of the owners

5 Password A Code for the security protection to allow access to a computer or the computer programs. Tips for Passwords:  Mix of caps, lower case, numbers, symbols  At least 8 character long  Change it on a regular basis  NEVER share your passwords with ANYONE


7 Malicious Conduct  Intentional destruction of another’s property with disregard of consequences to others Vandalism  The intentional act of destroying computer files or computer networks

8 Examples… Identity Theft  Claiming someone else’s identity through their personal information, such as SS#, bank account #, etc… Hacker  An unauthorized person who secretly gains access to other’s computers/ computer files. Software Piracy  Illegally copying software, distributing, and/or selling it.


10 Most Common Dangers Virus  A file that is meant to cause malicious harm to your computer These use to be really obvious when your computer is infected, but these days the creator of these viruses have more sneaky plans sometimes Worms  These are files that replicate themselves from one machine to another with out the need to be downloaded from the internet.  Typically are sent as attachments in emails

11 More dangers Trojans  These act like another type of file, but are really opening a backdoor on your computer to allow a hacker to gather information or to use your computer for other malicious activity, such as spamming, or hacking Spyware  A generic term for malicious software that ends up on your computer to gather information about you and other files on your computer such as personal information, credit card information, websites you have visited

12 More dangers Backdoor  A way into your computer, bypassing the normal authentication procedures, this allows hackers to use your computer as they see fit Downloaders  This allows someone to download files from your computer to their computer

13 More dangers Hijackers  These take control of various parts of your web browser to redirect you to other websites that you were not trying to go to Keyloggers  This a malware that captures the keystrokes you use from your keyboard and save them to send to a hacker later on.  Typically they are trying to find credit card numbers, social security numbers, pin numbers, usernames, and passwords

14 More dangers Spybot  These send information from your computer to interested parties about your activities to gather info about you Adbots  These deliver unwanted advertisements to your computers, think pop up! Though not usually harmful, can usually indicated more issues

15 Use of Social Networking sites Profile should be set to “Private” Never accept a friend request from someone you don’t know, even if you have mutual friends. Never give someone information about yourself unless you know them Beware of predators

16 Internet Safety Never open a program or file downloaded from the internet unless the source is trusted. Beware of Malware Malware infiltrates your computer without your knowledge Often steals information from the user (passwords, etc.) Have an anti-malware program (Norton Antivirus, etc.)

17 A few facts 19% of teens feel safer on line than in the real world 39% of students say they trust who they are chatting with online 24% of students say they see nothing wrong with chatting with a stranger online 10% of students have been asked to keep a relationship online a secret Children between 8 and 18 spend over an hour a day online 74% have a computer with internet access

18 Personal Information Full name Age Address Phone number Parent’s names School Work info Passwords Usernames Mother’s Maiden nam Once you have given it out, you can never take it back You should only trust your parents online with personal info Avoid putting personal photos online

19 Usernames and Profiles Make them unique and generic Provide only the required information Resist the temptation to revel personal information through usernames and profiles

20 Online Friends Don’t ever meet people you only know online in person You have NO idea who the person you are talking to online really is Online friends are still strangers

21 Cyber bullying More likely to occur online than in person (42% of students have been cyber bullied) Avoid cyber bullying:  Being kind to others online as well as in person  Don’t type in ALL CAPS  Don’t send messages with angry Always tell an adult if you are being cyber bullied (58% of students don’t report it)

22 Free Stuff Online Nothing is “free” on the internet Usually your personal information is at risk in these situations Typically there are long term hidden costs Can lead to identity theft, viruses, having your personal info sold

23 Attachments These are added files to emails Sometimes can be real or legit stuff Could be a method to infect your computer with a virus Only open an attachment from a email address you and know and if the email looks ok (sometimes people’s emails get hacked)] NEVER EVER open an.exe attachment (watch for these type of links too)

24 Online Protection Use Antivirus software Use Adware and spyware software Update these programs regularly Run scans of your computer at least weekly

Download ppt "Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate."

Similar presentations

Ads by Google