Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Woodlands High School
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Discovering Computers 2010
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Security Issues and Ethics in Education
T e a c h e r s D i s c o v e r i n g C o m p u t e r s Integrating Technology in the Classroom 3 rd Edition Chapter 8 Security Issues, Ethics, and Emerging.
Computer Programming I
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Ch. 9&10 RAP SarahBeth Walker. Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy.
CONTROLLING INFORMATION SYSTEMS
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security Issues & Ethics in Education By Maud Mushayamunda.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Crosby ISD Acceptable Use Policy Training
Acceptable Use Policy (Draft)
Network and Internet Security and Privacy
Add video notes to lecture
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Year 10 ICT ECDL/ICDL IT Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Internet Safety and Acceptable Use Policies.
Network and Internet Security and Privacy
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Computer Programming I
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

Teachers Discovering Computers Integrating Technology in a Changing World 8th Edition Chapter Eight Security Issues and Ethics in Education

Chapter Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses Describe different ways schools safeguard computers and networks Explain why computer backup is important and how it is accomplished 2

Chapter Objectives Define what is meant by information privacy and its impact on schools Identify the components of copyright that impact education Describe the ethical issues related to Internet usage and steps schools are taking to address them Identify safe and healthy uses of technology resources 3

Computer Security: Risks and Safeguards Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability Any illegal act involving a computer generally is referred to as a computer crime Computer Viruses – New virus programs found every day – Boot sector virus – File virus – Macro virus – Worm – Trojan horse 4

5

6

7

Computer Security: Risks and Safeguards Computer Viruses – Logic bomb – Time bomb Michelangelo virus 8

Discussion: Which of the following would you most likely check for viruses? 1.a previously used flash drive borrowed from a friend 2.a shareware program found in a bin at a flea-market 3.software still in shrink-wrap from a computer store 4.a program downloaded from a bulletin board 5. from an unfamiliar source Chapter 8: Security Issues and Ethics in Education 9

Computer Security: Risks and Safeguards Virus Detection and Removal – Antivirus programs – Popular antivirus programs – Many options to using antivirus software – Rescue disc – Virus hoaxes 10

Computer Security: Risks and Safeguards Unauthorized Access and Use – Crackers and hackers – Access controls Identification Authentication – Selecting a password – Protecting your password 11

Computer Security: Risks and Safeguards Possessed Objects and Biometric Devices – A possessed object is any item that you must carry to gain access to a computer or computer facility Badges, cards, smart cards, and keys – Personal Identification Number (PIN) – Biometric devices authenticate a person’s identity with a personal characteristic 12

Computer Security: Risks and Safeguards Firewall – A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network – Proxy server – Personal firewall 13

Computer Security: Risks and Safeguards 14

Computer Security: Risks and Safeguards Hardware Theft and Vandalism – Cable lock devices – Portable equipment warrants special considerations – Computer vandalism Cutting cables Deleting software Smashing computer 15

Computer Security: Risks and Safeguards Software Theft – Software piracy – Software license Single-user license Multiple-user Network license Community/State license 16

Computer Security: Risks and Safeguards Information Theft – Encryption Plain text Encrypted text – Encryption key 17

Computer Security: Risks and Safeguards System Failure – Undervoltage Brownout Blackout – Overvoltage (power surge) Spike – Surge protector Surge protector with phone line protection – Uninterruptible power supply (UPS) 18

Computer Security: Risks and Safeguards Backing Up – The Ultimate Safeguard – Backup Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or destroyed Backup procedures policies in schools and school districts Backup programs 19

Ethics and the Information Age Computer ethics – Moral guidelines that govern the use of computers, networks, and information systems Unauthorized use of computers Hardware, software, and information theft Information Privacy Copyright Existence of objectionable materials on the Internet 20

21

Ethics and the Information Age Information Privacy – The right of individuals and organizations to deny or restrict the collection and use of information about them – Unauthorized collection and use of information Electronic profiles Federal and state laws 22

23

Ethics and the Information Age Phishing – attempting to obtain personal and financial information Spam – An unsolicited mess or newsgroup posting sent to many recipients or newsgroups at once – Average user receives more than 1,000 spam messages each year – Spam sent through instant messaging is called spim – Spam sent via Internet Telephony is called split 24

Ethics and the Information Age Privacy Laws – Business or government agencies should only collect information necessary to carry out their functions – Restrict data access to those who must use it to perform job duties – Release personal information only after agreement to disclosure by individual – Must inform the individual when collecting information 25

26

Ethics and the Information Age Employee and Student Monitoring – Use of computers to observe, record, view, and review an individual’s use of a computer – Policies of computer use – Acceptable Use Policy (AUP) 27

Ethics and the Information Age Copyright Laws – Copyright Act of 1976 – Illegal copying – Fair use Copyright information on Web pages 28

Ethics and the Information Age Copyright Laws – Teacher and student Web pages Copyright laws do protect these pages Public domain Web sites CDs and DVDs with images, graphics, audio, and video clips Guidelines for creating Web pages 29

30

Internet Ethics and Objectionable Materials Three categories of objectionable material – Pornographic material – Racist literature, gambling – Incorrect or inappropriate material Inaccurate information 31

Internet Ethics and Objectionable Materials Government Actions – Children’s Internet Protection Act Protects children from obscene, pornographic, and other information considered to be harmful to minors 32

Internet Ethics and Objectionable Materials Parental Controls – Available in Windows and Mac operating systems – Determine proper controls for children in different age groups – Monitor child’s use of computer 33

Internet Ethics and Objectionable Materials Parental Controls – Filtering software programs 34

Internet Ethics and Objectionable Materials Parental Controls – Filtering software – Check Internet browser’s history 35

Internet Ethics and Objectionable Materials Educational Controls – Acceptable Use Policies (AUP) Use of network is a privilege, not a right Behave as if you are a guest on the Internet Rules concerning objectionable sites Rules concerning copyright issues Outline proper use of equipment Online safety and personal information Consequences of violating rules 36

37

Internet Ethics and Objectionable Materials Educational Controls – Curriculum resource pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs 38

Internet Ethics and Objectionable Materials Educational Controls – Teacher observation Final measure to prevent students from accessing objectionable and inappropriate materials Instruct students on use of Back button on the browser Understanding of ethical concepts 39

WCC’s Technology Acceptable Use Policy (TAUP) PURPOSE: The purpose of the Wayne Community College’s (WCC) Technology Acceptable Use Procedure (TAUP) is to enhance and support the educational mission of the college. This procedure is subordinate to all applicable laws of the State of North Carolina and the United States of America. All students, faculty, staff and public patrons are responsible for using WCC’s technological resources in an effective, ethical, and lawful manner to ensure that the College maintains confidentiality, integrity, and availability of systems and information assets. PROCEDURE: The goal is to promote educational excellence for all Wayne Community College students, faculty, staff, and patrons by facilitating resource sharing, accessing outside information and research while encouraging technological innovation and worldwide communication. The following guidance on acceptable and unacceptable use is not intended to be all-inclusive in a fast- changing technological environment, but should provide the basis for determination of what is and what is not acceptable regarding technology usage. Chapter 8: Security Issues and Ethics in Education 40

WCC’s Technology Acceptable Use Policy (TAUP) Acceptable Use: Use consistent with the Acceptable Use Policy (AUP) for the Microelectronics Center of North Carolina (MCNC). WCC uses MCNC as its Internet Service Provider (ISP) and is therefore subject to its established AUP. MCNC’s AUP is available on its website: Use related to administrative and other support activities considered consistent with the mission of Wayne Community College. Use for purposes of, or in support of, education and research. 41

WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Use of WCC’s technological resources that violates federal, state and local laws or statues. Use inconsistent with MCNC’s AUP. Use of WCC’s technological resources, which provides or assists in gaining unauthorized or inappropriate access to systems, networks, software, or data at WCC or any other sites. Use of the Internet for any illegal activity, including violation of copyrights, patents, trademarks, software licensing, or other contracts. Use of the Internet or other technology for financial or commercial gain, including but not limited to gambling. Use for activities that interfere with the ability of others to use WCC’s technological resources effectively. 42

WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Use for activities that result in the loss of another person’s work or unauthorized access to another person’s work. Use of another person’s account. Divulging passwords to anyone else. Divulging personal, confidential, or sensitive information. Use for distribution of obscene, pornographic, abusive or threatening messages via electronic communications of any means. Use for a defamatory, libelous, or slanderous purpose. Use in a discriminatory manner, to promote discrimination or incite hate. Use for distribution of chain letters or broadcasting to lists of individuals in such a manner that might cause congestion on the network or cause College networks to be blocked by external systems due to “spamming” or other misuse (unsolicited bulk messages or advertising for example). 43

WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Reconfiguring or tampering with the operation of the College’s computer systems and components, networks, and wide area networks to which the college subscribes, including the Internet. This includes any circumvention of IT security systems. Cyberharassment, which includes Cyberbullying, is defined by the National Conference of State Legislatures as follows: “Cyberharassment differs from cyberstalking in that it may generally be defined as not involving a credible threat. Cyberharassment usually pertains to threatening or harassing messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual.” Reference North Carolina General Statues (b) and

WCC’s Technology Acceptable Use Policy (TAUP) Unacceptable Use: Cyberstalking, which is defined by the National Conference of State Legislatures as follows: “Cyberstalking is the use of the Internet, or other electronic communications to stalk, and generally refers to a pattern of threating or malicious behaviors. Cyberstalkinh may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm.” Reference N.C. General Statue Sending malware, viruses, worms, Trojan horses, bombs, spyware, adware, keyloggers, or other harmful software code. 45

WCC’s Technology Acceptable Use Policy (TAUP) Wayne Community College reserves the right and will exercise its responsibility to record and/or monitor its systems for acceptable use. This may include (except where prohibited by law) examination of the content (including private or personal content) stored with and data files of any users, and examination of the access history of any users while on Wayne Community College systems or devices. WCC makes every effort to protect from threats and vulnerabilities and expects all users of its systems to adhere to all procedures governing use of technology. Violations of this procedure may result in a reduction of access to WCC technological resources or complete denial of access to WCC technological resources. IT staff will communicate all violations to the appropriate Vice President. Violators will be subject to College disciplinary processes and the College may pursue legal action. Action taken by WCC does not preclude the possibility of legal action taken by others. MODIFICATIONS: WCC reserves the right to modify this procedure at any time 46

Green Computing Involves reducing the use of electricity and the production of environmental waste while using a computer Society and schools are taking measures to combat it 47

Health Issues Computers and Health Issues – Musculoskeletal Disorder (MSD) – Repetitive Strain Injury (RSI) – Carpal Tunnel Syndrome (CTS) Hand Exercises – Computer Vision Syndrome (CVS) Techniques to ease eyestrain 48

Health Issues Ergonomics – An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace 49