Presentation is loading. Please wait.

Presentation is loading. Please wait.

Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.

Similar presentations


Presentation on theme: "Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8."— Presentation transcript:

1 Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8

2 Chapter Objectives  Identify security risks that threaten home and school computers  Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses  Describe different ways schools safeguard computers and networks  Explain why computer backup is important and how it is accomplished Chapter 8: Security Issues and Ethics in Education 2

3 Chapter Objectives  Define what is meant by information privacy and its impact on schools  Identify the components of copyright that impact education  Describe the ethical issues related to Internet usage and steps schools are taking to address them  Identify safe and healthy uses of technology resources Chapter 8: Security Issues and Ethics in Education 3

4 Computer Security: Risks and Safeguards  Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability  Any illegal act involving a computer generally is referred to as a computer crime  Computer Viruses  New virus programs found every day  Boot sector virus  File virus  Macro virus  Worm  Trojan horse Chapter 8: Security Issues and Ethics in Education 4

5 5

6 6

7 7

8 Computer Security: Risks and Safeguards  Computer Viruses  Logic bomb  Time bomb  Michelangelo virus Chapter 8: Security Issues and Ethics in Education 8

9 Discussion: Which of the following would you most likely check for viruses? 1.a previously used flash drive borrowed from a friend 2.a shareware program found in a bin at a flea- market 3.software still in shrink-wrap from a computer store 4.a program downloaded from a bulletin board 5.e-mail from an unfamiliar source Chapter 8: Security Issues and Ethics in Education 9

10 Computer Security: Risks and Safeguards  Virus Detection and Removal  Antivirus programs  Popular antivirus programs  Many options to using antivirus software  Rescue disc  Virus hoaxes Chapter 8: Security Issues and Ethics in Education 10

11 Computer Security: Risks and Safeguards  Unauthorized Access and Use  Crackers and hackers  Access controls  Identification  Authentication  Selecting a password  Protecting your password Chapter 8: Security Issues and Ethics in Education 11

12 Computer Security: Risks and Safeguards  Possessed Objects and Biometric Devices  A possessed object is any item that you must carry to gain access to a computer or computer facility  Badges, cards, smart cards, and keys  Personal Identification Number (PIN)  Biometric devices authenticate a person’s identity with a personal characteristic Chapter 8: Security Issues and Ethics in Education 12

13 Computer Security: Risks and Safeguards  Firewall  A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network  Proxy server  Personal firewall Chapter 8: Security Issues and Ethics in Education 13

14 Computer Security: Risks and Safeguards Chapter 8: Security Issues and Ethics in Education 14

15 Computer Security: Risks and Safeguards  Hardware Theft and Vandalism  Cable lock devices  Portable equipment warrants special considerations  Computer vandalism  Cutting cables  Deleting software  Smashing computer Chapter 8: Security Issues and Ethics in Education 15

16 Computer Security: Risks and Safeguards  Software Theft  Software piracy  Software license  Single-user license  Multiple-user  Network license  Community/State license Chapter 8: Security Issues and Ethics in Education 16

17 Computer Security: Risks and Safeguards  Information Theft  Encryption  Plain text  Encrypted text  Encryption key Chapter 8: Security Issues and Ethics in Education 17

18 Computer Security: Risks and Safeguards  System Failure  Undervoltage  Brownout  Blackout  Overvoltage (power surge)  Spike  Surge protector  Surge protector with phone line protection  Uninterruptible power supply (UPS) Chapter 8: Security Issues and Ethics in Education 18

19 Computer Security: Risks and Safeguards  Backing Up – The Ultimate Safeguard  Backup  Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed  Backup procedures policies in schools and school districts  Backup programs Chapter 8: Security Issues and Ethics in Education 19

20 Ethics and the Information Age  Computer ethics  Moral guidelines that govern the use of computers, networks, and information systems  Unauthorized use of computers  Hardware, software, and information theft  Information Privacy  Copyright  Existence of objectionable materials on the Internet Chapter 8: Security Issues and Ethics in Education 20

21 Chapter 8: Security Issues and Ethics in Education 21

22 Ethics and the Information Age  Information Privacy  The right of individuals and organizations to deny or restrict the collection and use of information about them  Unauthorized collection and use of information  Electronic profiles  Federal and state laws Chapter 8: Security Issues and Ethics in Education 22

23 Chapter 8: Security Issues and Ethics in Education 23

24 Ethics and the Information Age  Phishing  Email attempting to obtain personal and financial information  Spam  An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once  Average user receives more than 1,000 spam e- mail messages each year  Spam sent through instant messaging is called spim  Spam sent via Internet Telephony is called split Chapter 8: Security Issues and Ethics in Education 24

25 Ethics and the Information Age  Privacy Laws  Business or government agencies should only collect information necessary to carry out their functions  Restrict data access to those who must use it to perform job duties  Release personal information only after agreement to disclosure by individual  Must inform the individual when collecting information Chapter 8: Security Issues and Ethics in Education 25

26 Chapter 8: Security Issues and Ethics in Education 26

27 Ethics and the Information Age  Employee and Student Monitoring  Use of computers to observe, record, view, and review an individual’s use of a computer  Policies of computer use  Acceptable Use Policy (AUP) Chapter 8: Security Issues and Ethics in Education 27

28 Ethics and the Information Age  Copyright Laws  Copyright Act of 1976  Illegal copying  Fair use  Copyright information on Web pages Chapter 8: Security Issues and Ethics in Education 28

29 Ethics and the Information Age  Copyright Laws  Teacher and student Web pages  Copyright laws do protect these pages  Public domain Web sites  CDs and DVDs with images, graphics, audio, and video clips  Guidelines for creating Web pages Chapter 8: Security Issues and Ethics in Education 29

30 Chapter 8: Security Issues and Ethics in Education 30

31 Internet Ethics and Objectionable Materials  Three categories of objectionable material  Pornographic material  Racist literature, gambling  Incorrect or inappropriate material  Inaccurate information Chapter 8: Security Issues and Ethics in Education 31

32 Internet Ethics and Objectionable Materials  Government Actions  Children’s Internet Protection Act  Protects children from obscene, pornographic, and other information considered to be harmful to minors Chapter 8: Security Issues and Ethics in Education 32

33 Internet Ethics and Objectionable Materials  Parental Controls  Available in Windows and Mac operating systems  Determine proper controls for children in different age groups  Monitor child’s use of computer Chapter 8: Security Issues and Ethics in Education 33

34 Internet Ethics and Objectionable Materials  Parental Controls  Filtering software programs Chapter 8: Security Issues and Ethics in Education 34

35 Internet Ethics and Objectionable Materials  Parental Controls  Filtering software  Check Internet browser’s history Chapter 8: Security Issues and Ethics in Education 35

36 Internet Ethics and Objectionable Materials  Educational Controls  Acceptable Use Policies (AUP)  Use of network is a privilege, not a right  Behave as if you are a guest on the Internet  Rules concerning objectionable sites  Rules concerning copyright issues  Outline proper use of equipment  Online safety and personal information  Consequences of violating rules Chapter 8: Security Issues and Ethics in Education 36

37 Chapter 8: Security Issues and Ethics in Education 37

38 WCC’s Technology Acceptable Use Policy (TAUP)  PURPOSE: The purpose of the Wayne Community College's TAUP is to enhance and support the educational mission of the college. This policy is subordinate to all applicable laws of the State of North Carolina and the United States of America. All students, faculty, staff and public patrons are responsible for using WCC's technological resources in an effective, ethical and lawful manner. Resources are defined, but not limited to: Internet, web- based applications, e-mail, computers, computer networks and telecommunications, telephones and voice mail, and various multimedia and educational technologies such as PCs, laptops, sympodiums, data projectors, camcorders, VCR and DVD players, digital cameras, instructional television, video microscopes, etc.  POLICY: Our goal is to promote educational excellence for all Wayne Community College students, faculty, staff and patrons by facilitating resource sharing, accessing outside information and research while encouraging technological innovation and global communication. Based on this policy, the following acceptable and unacceptable uses have been approved:  http://www.waynecc.edu/technology-at-wayne/taup/ Chapter 8: Security Issues and Ethics in Education 38

39 Green Computing  Involves reducing the use of electricity and the production of environmental waste while using a computer  Society and schools are taking measures to combat it Chapter 8: Security Issues and Ethics in Education 39

40 Health Issues  Computers and Health Issues  Musculoskeletal Disorder (MSD)  Repetitive Strain Injury (RSI)  Carpal Tunnel Syndrome (CTS)  Hand Exercises  Computer Vision Syndrome (CVS)  Techniques to ease eyestrain Chapter 8: Security Issues and Ethics in Education 40

41 Health Issues  Ergonomics  An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Chapter 8: Security Issues and Ethics in Education 41


Download ppt "Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8."

Similar presentations


Ads by Google