Lesson 30 Computer Safety and Ethics

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
1 Lesson 4 Computer Maintenance High School Credit.
1 Lesson 4 Computer Maintenance Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Lesson 4 Computer Maintenance
1 Lesson 4 Computer Maintenance Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Ethics and Safety Management. Health Safety When using a computer for long periods of time, you can cause health risks ranging from minor to major. Ex.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lesson 10 Operating System Customization
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Protecting ICT Systems
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 31 Computer Safety and Ethics 1 Morrison / Wells / Ruffolo.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Defining Security Issues
Lesson 27 Communications and Collaboration
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Staying Safe Online Keep your Information Secure.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Lesson 31 Computer Safety and Ethics
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
1 Lesson 31 Computer Safety and Ethics Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Unit 4 IT Security.
Topic 6: Issues Press F5 to view!
Computer Security.
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Lesson 30 Computer Safety and Ethics Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition Morrison / Wells

Objectives Explain how to maintain a safe working environment and use computer equipment in a way that prevents personal injury Identify injuries that can result from the use of computers for long periods of time Identify software threats and risks to data Understand methods you can use to prevent data loss Identify various security measures 2 2

Objectives (continued) Identify the principles regarding when information can or cannot be considered personal Identify the risks associated with electronic commerce Understand how computer use can affect your privacy and personal security Identify how to stay informed about changes and advancements in technology Understand how to be a responsible user of computers 3 3

Vocabulary 4 4 browser hijacking brute force attacks hacking hardware firewall keylogger private key public key repetitive strain injury (RSI) Secure Sockets Layer (SSL) sniffer spyware strong password Transport Layer Security (TLS) 4 4

Introduction As a computer user, you have certain responsibilities that govern your use of technology, including the following guidelines and policies, exercising ethical conduct online, and maintaining a safe work environment. 5 5

Maintaining a Safe Computing Environment Make sure you use a computer in a way that supports your comfort, health, and safety. Pay attention to your posture, lighting, and activity level. Review product safety guidelines provided with your computer and any electronic devices. 6 6

Computer Related Injuries Take precautions to avoid eyestrain, back problems, and repetitive strain injury (RSI), which can result when a person makes too many of the same motions over a long period of time. A well-designed work area, use of ergonomic furniture, good posture, and changing positions throughout the day are effective ways to minimize these types of injuries. 7 7

Security Risks Wireless networks create serious risks if it is not properly secured. Using Network Protection: Password-protect your wireless network and turn on some form of encryption. Computer Hacking: Use firewalls to prevent hackers from invading computers. 8 8

Security Risks (continued) Avoiding Data Loss: Save frequently and back up data regularly. 9 9

Security Risks (continued) Safeguarding Against Software Threats: To protect against viruses, use strong passwords, download and install the latest security updates for your operating system, and use an up-to-date antivirus program. 10 10

Access Restrictions System administrators and users often restrict access to files, storage devices, various computers, networks, the Internet, or specific Internet sites to protect data and other users. Firewalls do not protect data from employees. When using software to monitor computer usage, protecting users should be balanced with preserving privacy. 11 11

Private Property—But Not Yours Generally, any information gathered from a company’s computer system is company property and not an individual worker’s personal property. Many organizations have computer network usage policies that provide guidelines for using the organization’s systems ethically, professionally, and legally. 12 12

E-Commerce Issues Before providing personal or credit card information on an e-commerce site, verify that the site is secure. TSL and SSL technology enables encryption of sensitive information by establishing a private communication channel. To protect private information: Use a secure browser Check privacy policies Keep personal information private 13 13

Preserving Privacy Any time you submit information on the Internet, it can possibly be gathered and used. Phishing attempts to steal private data by posing as a trustworthy entity. Phishing message 14 14

Preserving Privacy (continued) Cookies and Spyware: Clean up unnecessary cookies on your computer frequently with a utility program. Spyware tracks your Web habits and can be harmful as well as annoying. Avoiding spyware infection 15 15

Securing Data The best way to protect data is to effectively control the access to it using passwords or login information. 16 16

Using the Internet Safely and Legally Information on the safe use of computers can be found on numerous Web sites, in books and magazines, and other similar media. 17 17

Technology Changes and Individual Responsibilities It is your responsibility to stay informed about changes and advancements in computer technology, product upgrades, and virus threats. Be a responsible computer user by recycling products such as paper and ink cartridges and donating unneeded computer hardware. Consider volunteering to help others learn to use computers effectively. Be 18 18

Summary 19 19 In this lesson, you learned: Make sure you use a computer in a way that supports your comfort, health, and safety. When you use a computer, take precautions to avoid chronic physical maladies such as repetitive motion injuries, eyestrain, and back problems that can arise over time. Ergonomic design, which adapts equipment and the workplace to fit the worker, can help to prevent repetitive strain injuries. 19 19

Summary (continued) When setting up your wireless network, your first step should be to change the default password to protect access to the network. Computer hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system. To avoid data loss, you can use techniques and devices for preventing power interruptions. You can also devise and follow a regular procedure for backing up your data. 20 20

Summary (continued) A virus is a program that has been written, usually by a hacker, to corrupt data on a computer. The virus is attached to a file and spreads from one file to another once the program is executed. To protect your computer against virus damage, use up-to-date antivirus software, download and install security updates for your operating system, and avoid opening files sent via e-mail from people you do not know. System administrators and users often restrict access to files, storage devices, various computers, networks, the Internet, or specific Internet sites. 21 21

Summary (continued) If you work for a company that provides you with e-mail services, the information you send is available to the company and is the company’s property. TSL and SSL technology enables encryption of sensitive information by establishing a private communication channel. Data transmitted through this channel is encrypted during transmission. Nearly all schools, government agencies, companies, libraries, and other similar institutions have written policies and guidelines regarding Internet usage. 22 22