Significant Social & Ethical Issues. Significant Issues Year 2000 Y2K Problem Viruses Reliance on Software.

Slides:



Advertisements
Similar presentations
WEEK THREE MANAGING, FINDING AND SELECTING INFORMATION- PART 2 Functional ICT.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
By Mr. Abdalla A. Shaame 1. Uses of Computer PC at Home Common uses for the computer within the home  Computer games  Working from Home  Banking from.
Explanations Of Software Utilities By Tim Wong.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
{ Macro by Gabriel and Brian. Definiti on a macro virus is a virus that is written in a macro language that is to say, a language built into a software.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Safety and Security issues of using ICT Alys brooks.
HalFILE 2.1 Network Protection & Disaster Recovery.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus (W). A virus is a piece of software or programming that can be extremely harmful to computer. It damages your computer by taking over your.
Computer virus Done: Aaesha Mohammed ID: H
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Computer Security Keeping you and your computer safe in the digital world.

Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Presentation transcript:

Significant Social & Ethical Issues

Significant Issues Year 2000 Y2K Problem Viruses Reliance on Software

Year 2000 Y2K Problem In the 1960’s and 70’s, storage or memory was limited and very expensive. So a simple decision was made to store the year date as a two digit number e.g. 75, 82.

Year 2000 Y2K Problem This worked well but was shortsighted as a problem became evident. When the Year 2000 started, these systems would think that the year was 1900!

Year 2000 Y2K Problem People were worried that important companies may have been using this outdated method and their software may fail as the Year 2000 clicked over. This could have a dramatic effect on various services to people.

Year 2000 Y2K Problem The problem never eventuated for one reason or another, but primarily because the problem was realised prior to the Year 2000 and procedures implemented to prevent problems occurring.

Year 2000 Y2K Problem Research Activity –Outline 2 of the main procedures that were implemented to ensure the smooth transition from 1999 to Identify 2 major companies that were affected by the Y2K problem. –Use the Internet to research this information. –Suggested sites include

Viruses Computer viruses are software programs designed to cause some form of damage on computer systems. They usually attach themselves to other files so they can be transported from system to system via or floppy disk.

Viruses Anti virus protection software and diligence are the best methods for prevention of the spread of viruses, however as new viruses are being created every day, it is hard to completely prevent these forms of malicious attack.

Viruses Activity –Write down the names of 4 Anti-Virus protection and detection programs. –Do you use any of these? –What risks are there if major companies do not have a virus protection protocol? –Should people who write viruses be punished?

Reliance on Software Software programs organise and run so many of the systems we use in our everyday lives. Without these programs, our lives would be drastically different. Automatic Teller Machines and EFTPOS, cars, washing machines, microwaves and all major forms of transportation rely on software to ensure smooth running.

Reliance on Software Activity –Write a page (300 words) on the good or bad aspects of this statement: ‘as a society we have a huge reliance on the use of software.’ Use specific examples in your argument. You may use Microsoft Word to outline your argument. Is this an example of the reliance on software?

National & International Legal action resulting from software development

Legal Cases involving software Research information about legal cases from the following categories. Choose one case from each category and outline what the case for and against was about.

Legal Cases involving software International –Microsoft vs Netscape –Microsoft Vs Apple Local –Trumpet software Pty Ltd & Anor vs Oz Pty Ltd & Ors 1996