Unit 6 Digital Literacy Study S3 Obj 2-2

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Unit 6 Digital Literacy Study S3 Obj 1
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 6 Digital Literacy Study S3 Obj 2-2
Security, Privacy, and Ethics Online Computer Crimes.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Viruses.
Crime & Malpractice AS Module Heathcote Ch. 10.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Topic 5: Basic Security.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Security Keeping you and your computer safe in the digital world.
Technical Implementation: Security Risks
Computer Ethics, Viruses, and Copyrights
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Computer Safety and Ethics
Misuses of ICT Malpractice and crime © Folens 2008.
3.6 Fundamentals of cyber security
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
How to build a good reputation online
Related to data, hardware, and software
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Ethics, Viruses, and Copyrights
Scams, Identity Theft, and Viruses Kelly & Caitlin
Computer Ethics.
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Computer Ethics, Viruses, and Copyrights
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Computer Ethics, Viruses, and Copyrights
Stay Safe While Using The Internet
Unit 6 Digital Literacy Study S3 Obj 2-2
Part 3.
Viruses.
King Saud University- College OF Applied Studies
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
What is Information Security?
King Saud University- College OF Applied Studies
Technology Mrs. Huddleston
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Unit 6 Digital Literacy Study S3 Obj 2-2 Viruses & Destructive Programs Unit 6 Digital Literacy Study S3 Obj 2-2

Computer Virus A Virus is a computer program written to alter the way a computer operates without the permission or knowledge of the user. Viruses can either be considered a Nuisance or Destructive. They can Corrupt files Destroy data Display irritating messages Corrupt computer systems Some viruses replicate themselves which means that they copy themselves over and over. Look up top 6 Virus types to fill out #4 on the worksheet by clicking on the link below: http://www.bkav.com/general-knowledge/- /view_content/content/19025/classification-of-computer-viruses

Spreading Viruses Viruses spread because people distribute infected files by exchanging disks and CDs, sending e-mail attachments, and downloading files from the Internet. Viruses attach themselves to files with .exe, .com, or .vbs filename extensions When you open the infected file, the virus opens and waits to infect the next program you run or disk you use. Viruses have the ability to lurk in a computer for days or months, quietly replicating (copying) themselves. You may not even know your computer has a virus, thus making it easier to spread the virus.

How Viruses Spread Click on the clipart below to discover 11 ways viruses are spread in our computer systems. Using a your own words, write a brief description of each on your study guide.

Protecting your Computer Just as you protect yourself from illness and disease, there are ways you can cut the chances of your computer systems being infected. Click on the clipart below to discover 11 suggestions for protecting your computer. List them on your study guide.

Computer Theft & Privacy The most popular tech item to steal are Laptops which are then most often sold. Theft of personal information can also be stolen through unsecured use of wireless services. Others may be able to access the files you have open in these situations. Use passwords to keep your files and information safe and to keep most people out of your files. View the 5 minute video on the importance of using strong passwords to help protect your privacy. Record at least three things you learned.

Hacking Hacking The Penalty Hacking means finding out weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. Their objective is to do damage or steal personal information. The Penalty The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done. Hackers cost business money because of downtime and loss of data

Internet Controls Types of controls for internet safety Firewalls: forms a barrier between two networks Filters: controls what can be viewed on Internet Parental Control: Software allows parental control over what kids do on the Internet

Freeware & Shareware Freeware Shareware Software is copyrighted computer software which is made available for use free of charge for an unlimited time Shareware Software Is typically obtained free of charge, either by downloading from the Internet or other source. A user tries out the program, and thus shareware has also been known as "try before you buy". A shareware program is accompanied by a request for payment, and the software's distribution license often requires such a payment.