Security Issues & Ethics in Education By Maud Mushayamunda.

Slides:



Advertisements
Similar presentations
Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Boyertown Area School District Acceptable Use Policy.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Discovering Computers 2010
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
INTERNET: The Good, The Bad and The Ugly
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
IT in Business Issues in Information Technology Lecture – 13.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Network System Security - Task 2. Russell Johnston.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security.
Presentation transcript:

Security Issues & Ethics in Education By Maud Mushayamunda

Computer Security Computer security risk: Any event or action that has the potential of causing a lost of computer equipment, software, data and information or processing capability. Computer crime: any illegal act involving a computer

Examples of Security Risks A virus is a segment of program code that implants itself in a computer file and spreads. -Virus spread by sharing infected programs -antivirus can identify & help stop virus -3 types of viruses exist: boot sector virus, file viruses, macro viruses

Unauthorized Access & Use -Use of a computer without permission. The person who does this is called a hacker -Hackers usually search for personal information -Provide access control to prevent unauthorized access (User ID, password). -Use creative passwords to make access harder

Firewalls & Hardware/Software Theft A firewall is a security system consisting of hardware/software that prevents unauthorized access A proxy server screens all incoming & outgoing messages A personal firewall is a software program that detects & protects personal computer Firewall Products: Norton, McAfee, ZoneAlarm Pro, BitDefender internet security Theft of hardware can be prevented by installing deadbolt locks Software piracy – the unauthorized use of copyrighted software. Most common form of theft Software license gives you the right to use the software. Use is limited to one purchase. Using same software for another computer (or sharing with someone else) is a federal crime

Backing up – duplicate files System failure – malfunctioning of computer Information theft – use encryption key

Ethics & the Information Age Computer ethics are the moral guidelines that govern the use of computers, networks, & information systems 5 areas: 1. unauthorized use 2.hardware, software & information theft 3. information privacy 4. copyright 5. existence of objectionable materials Fair Use - guidelines to use copyrighted materials (NB: to be safe, assume everything on the Web is copyrighted. Also give credit & use citations)

Phishing & Spam Phishing is a scam in which a perpetrator sends an official-looking that attempts to obtain personal & financial information from the recipient. Spam is an unsolicited message posting sent to many recipients at once

Government Laws Concerning Privacy

Objectionable Materials These are materials that are include racist literature, obscene pictures & videos, gambling, age-restricted items Children’s Internet Protection Act (CIPA) protects children from the above material

Things that can be done to protect students Parents Parental controls Set time limits Allow & block specific programs Control access to games Teachers Observe students closely at all times during computer use

Healthy Computer Uses

Health Issues Green computing – reducing electricity use & paper while using the computer Long time computer use can lead to tendonitis (CTS) – take frequent breaks Computer Vision Syndrome (CVS) – sore, tired, itching eyes, headaches, sore neck. (take min eye break, close your eyes for 5 secs)