Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Discovering Computers 2010
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computer Security, Ethics and Privacy Chapter 11.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Computer Crimes Career & Technology Education Department.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Security Issues & Ethics in Education By Maud Mushayamunda.
Viruses & Destructive Programs
Computer Safety and Ethics
Managing Windows Security
Add video notes to lecture
Lecture 8. Cyber Security, Ethics and Trust
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Chapter Nine (Part 2).
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Ethics.
Chapter 10 Computer Security, Ethics, and Privacy
BCT 2.00 Analyze Technology Issues
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
What is Information Security?
Student User Agreement and Policy 2022
Chapter # 3 COMPUTER AND INTERNET CRIME
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology Safeguards Theft Q $100 Q $100 Q $100 Q $100 Q $100 Q $200 Q $200 Q $200 Q $200 Q $200 Q $300 Q $300 Q $300 Q $300 Q $300 Q $400 Q $400 Q $400 Q $400 Q $400 Q $500 Q $500 Q $500 Q $500 Q $500 Final Jeopardy

$100 Question from H1 any event or action that could cause loss of, or damage to computer equipment, software, data and information or processing capability

Computer Security Risk $100 Answer from H1 Computer Security Risk

$200 Question from H1 replaces the program that is used to start the computer system with a modified, infected version of the startup program

$200 Answer from H1 Boot sector virus

$300 Question from H1 virus that hides within or is designed to look like a legitimate program

$300 Answer from H1 Trojan Horse

$400 Question from H1 Copies itself repeatedly, using up resources and shutting down the computer and/or network

$400 Answer from H1 Worm

Well-known time bomb virus $500 Question from H1 Well-known time bomb virus

$500 Answer from H1 Michelangelo Virus March 6

$100 Question from H2 These programs detect viruses and inoculate against them as well as repair infected programs and files

$100 Answer from H2 Antivirus Programs Norton’s McAfee AVG

$200 Question from H2 Any item that you must carry to gain access to a computer or computer facility

$200 Answer from H2 Possessed object Badges, cards, keys,etc

$300 Question from H2 A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network

$300 Answer from H2 Firewall

$400 Question from H2 Duplicate of a file, program, or disk that can be used if the original is lost

$400 Answer from H2 Backup

$500 Question from H2 the use of a computer or data for unapproved or possibly illegal activities

$500 Answer from H2 Unauthorized use

The most common type of software theft $100 Question from H3 The most common type of software theft

$100 Answer from H3 Piracy

$200 Question from H3 antipiracy technology designed to verify that software products have been legitimately licensed

$200 Answer from H3 Product Activation

Software that is distributed free for a trial use period $300 Question from H3 Software that is distributed free for a trial use period

$300 Answer from H3 Shareware

$400 Question from H3 a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient

$400 Answer from H3 Phishing

allows network users to share a single copy of the software $500 Question from H3 allows network users to share a single copy of the software

$500 Answer from H3 Site License

$100 Question from H4 Moral guidelines that govern the use of computers, networks and information systems

$100 Answer from H4 Computer ethics

$200 Question from H4 protect original materials created by students and teachers posted on the Web , apply to all creative works , are contained in the Copyright Act of 1976 and its numerous amendments

$200 Answer from H4 Copyright Laws

$300 Question from H4 Allow educators to use certain copyrighted works for nonprofit educational purposes

$300 Answer from H4 Fair use Guidelines

$400 Question from H4 set of rules that govern the use of school and school district computers, networks, and the Internet

$400 Answer from H4 AUP Acceptable Use Policy

$500 Question from H4 Passed by Congress in 2000 to protect children from obscene, pornographic, and other harmful information

Children’s Internet Protection Act $500 Answer from H4 CIPA Children’s Internet Protection Act

$100 Question from H5 technology that will significantly impact education during the next five years

$100 Answer from H5 DVD Based Technology

$200 Question from H5 As all areas of education begin to use these, the traditional textbooks used in K-12 schools will disappear

Web and video enhanced textbooks $200 Answer from H5 Web and video enhanced textbooks

Technologies that help special needs students have equal access $300 Question from H5 Technologies that help special needs students have equal access

$300 Answer from H5 Assistive Technology

$400 Question from H5 Revolution that is dominating the first decade of the 21st century in technology

$400 Answer from H5 Wireless revolution

$500 Question from H5 These instructional strategies offer creative solutions for teacher shortages, homebound, challenged and at risk students

Web based instructional strategies $500 Answer from H5 Web based instructional strategies

Final Jeopardy An applied science devoted to incorporating comfort, efficiency and safety into the design of items in the workplace

Final Jeopardy Answer Ergonomics