Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Thank you to IT Training at Indiana University Computer Malware.
Woodland Hills School District Computer Network Acceptable Use Policy.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Boyertown Area School District Acceptable Use Policy.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Viruses & Destructive Programs
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Viruses.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Employee Guidelines for Acceptable Use of Technology Resources.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Ch. 9&10 RAP SarahBeth Walker. Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Security Issues & Ethics in Education By Maud Mushayamunda.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Computer Ethics, Viruses, and Copyrights
Managing Windows Security
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics, Viruses, and Copyrights
Malware, Phishing and Network Policies
What is Information Security?
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton

Security Risk that Threaten Home and School Computers  Computer Security Risk- Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability.  Computer Crime- Any illegal act involving a computer.

Viruses  Virus- A Potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works.  They do not happen by chance. People who create viruses do them to destroy things such as data.  Virus payload- The symptom or damage caused by a virus.  There are more than 300,000 known to exist with hundred identified every month.  A lot of virus spread through s.

Different types of viruses  Worm- Copies it’s self repeatedly.  Trojan horse- hides within or is designed to look like a legit program.  Logic bomb- A program that activates when it detects a certain condition.  Rootkit- Allows someone from a remote location to take control of your computer.

How to prevent viruses  Purchase Antivirus Software  Scan all removable data  Scan all files downloaded from the internet  Scan all attached files before opening them  Turn off pre-view  Do not use pirated items  Never start your computer with removable media in the drives.  Install a person firewall program  Back up your files

Ways Schools Safeguard Computers and Networks  Install antivirus programs  Only allow access to programs, data, and information that schools approve  User ID’s and Password  Implement a variety of security precautions  Ensure all software is properly installed

Why Computer Backup is Important and How it is Accomplished  What is a backup?  Use an off site location  Creating backup copies.

Information Privacy  The right of individuals and organizations to deny or restrict the collection and use of the information about them.  Schools have information privacy because they store large amounts of related data in their database. They also use the computers to monitor students and employee activities.

Copyright  The original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distribute the creative work.  A couple of laws that the school will see an impact.  Privacy Act of 1974  Copyright Act of 1976 est. the fair use  Telephone Records and Privacy Protection Act of 2006

Internet Ethics  Government actions- helped protect children from being exploited, including numerous Internet-related initiatives.  Children’s Internet Protection Act- protect children from obscene, pornographic, and other information considered harmful to minors.  Parental controls- tools parents can use to prevent their children from accessing pornographic and other objectionable materials on the Internet.

Educational Controls  Filtering software- prevents the browser from accepting material from targeted sites or material that contains keywords or phrases.  Acceptable Use Policies- a set of rules that governs the use of school and school district computers, networks, and the Internet by teachers, administrators, staff, and students.  Curriculum Resource Pages- a teacher-created document or Web page that contains hyperlinks to teacher selected and evaluated Web sites.  Teacher Observation- permits teachers to monitor their students actively and continuously while they are on the Internet.