Living Online Module Lesson 29 — Security, Privacy, and Ethics Online

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Lesson 30 Computer Safety and Ethics
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 9 Information Systems Ethics, Computer Crime, and Security
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Viruses & Destructive Programs
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Exploring Security and Privacy Issues Living Online Lesson 6 Internet and Web Page Design.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Staying Safe Online Keep your Information Secure.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Computer Crimes Career & Technology Education Department.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Privacy, Security and Ethics
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
BCT 2.00 Analyze Technology Issues
Presentation transcript:

Living Online Module Lesson 29 — Security, Privacy, and Ethics Online Computer Literacy BASICS

Computer Literacy BASICS Objectives Understand methods you can use to prevent data loss. Identify types of computer crimes. Identify computer viruses. Identify various security measures. Understand how computer use can impact your privacy. Computer Literacy BASICS

Computer Literacy BASICS Objectives (cont.) Explore other legal and ethical issues concerning electronic information. Identify the responsibilities associated with technology use. Explain how to maintain a working environ-ment that is safe and use computer equip-ment in a way that prevents personal injury. Computer Literacy BASICS

Computer Literacy BASICS Vocabulary Biometric security measures Computer crime Computer fraud Data diddling Hacking Identity theft Logic bomb Software piracy Time bomb Trojan horse Virus Worm Computer Literacy BASICS

Threats to Computer Systems Computers are vulnerable to Power failures Power surges Lightning strikes Any of these can damage your computer and cause loss of data. Basic precautions can minimize these threats to your computer system. Computer Literacy BASICS

Safeguarding Software and Data To protect your system and data: Secure power cords so that they cannot be kicked and unplugged accidentally. Install an uninterruptible power source (UPS). Install surge suppressors. Save files frequently as you work on them. Do regular and frequent backups. Computer Literacy BASICS

Computer Literacy BASICS Computer Crime Computer crime is growing rapidly and includes Unauthorized use of a computer. Infecting computers with a virus. Harassment and stalking via computer. Stealing and damaging data or equipment. Copyright violations of software. Copyright violations of Internet information. Computer Literacy BASICS

Computer Literacy BASICS Computer Fraud Computer fraud is conduct involving the use of a computer to obtain money or property dishonestly or to cause loss, such as Stealing money from bank accounts Stealing information from other people’s computers for gain Computer Literacy BASICS

Warning Signs of Computer Fraud Possible signs of computer fraud include Low staff morale because unhappy employees may think the company owes them and may take what they think they have coming to them. Unusual work patterns, giving employees an opportunity to access computers without supervision. Staff members who seem to be living above their income. Computer Literacy BASICS

Computer Literacy BASICS Hacking Hacking involves invading someone else’s computer without permission. Some people hack for personal satisfaction. Others access computers illegally for personal gain. Hackers are usually computer experts who enjoy the power they have to invade someone’s privacy. Hackers can steal money. Hackers also change, damage, or steal data for personal or monetary gain. Computer Literacy BASICS

Computer Literacy BASICS Computer Viruses A virus is a program, often written by a hacker, that is meant to cause corruption of data. Viruses can completely wipe out a hard drive or may just display a harmless message. Common virus types include Worms Time bombs Logic bombs Trojan horses Computer Literacy BASICS

How a Computer Virus Can Spread Computer Literacy BASICS

Computer Virus Protection To protect your computer from a virus: Obtain antivirus software and update it regularly. Be careful when opening e-mail attachments. Viruses are frequently attached to e-mail. Scan messages before opening them. Don’t access files on floppy disks or those that were downloaded from the Internet until they are scanned by antivirus software. Computer Literacy BASICS

Computer Literacy BASICS Software Piracy The illegal copying or use of software programs is called software piracy. Software piracy costs individuals and businesses money. Copying a friend’s version instead of buying it is stealing the intellectual property of the creator of the software. Computer Literacy BASICS

Shareware Is Not Freeware Some programs offered on the Internet at no cost are called freeware. Other programs called shareware are offered for free use on a trial basis, but if you want to continue to use the software, you must register it and pay a fee. Downloading and using shareware without paying the author is also software piracy. Software piracy is a felony and carries serious consequences if you get caught. Computer Literacy BASICS

Theft of Computer Time Is a Crime When an employee uses a company computer on company time for personal use, this is another form of computer crime. Examples of theft of computer time by an employee include Running a small business on the side Maintaining records for an outside organization Keeping personal records Computer Literacy BASICS

Computer Literacy BASICS Other Computer Crimes Using information you see or find on some-one else’s computer for personal profit is theft of output. Data diddling is the illegal act of changing data before or after it is entered into the computer. Anyone involved in creating, recording, encoding, or checking data can change the data. Computer Literacy BASICS

Computer Literacy BASICS Security Issues Computer security is necessary to keep hardware, software, and data safe from harm or destruction. Risks to computers and data include Natural causes Accidents Intentional illegal activities Safeguards are required for each type of risk. It is the responsibility of a company or an individual to protect their data. Computer Literacy BASICS

Computer Literacy BASICS Passwords The best way to protect data is to restrict access to the system. This is usually done by log-in IDs and passwords. Users must protect their passwords so unauthorized users cannot gain access. Passwords should be changed frequently. Notify your supervisor or system administrator if you think someone has stolen your password. Computer Literacy BASICS

Using a Password to Protect Against Unauthorized Entry Computer Literacy BASICS

Other Security Measures Other methods used to safeguard a computer system and its data include Electronic ID cards to limit access to certain areas Firewalls to block outside attempts to enter the system Antivirus software Screening of potential employees Regular backups of data Biometric security measures Computer Literacy BASICS

Biometric Security Measures Computer Literacy BASICS

Computer Literacy BASICS Internet Security The security and privacy of personal information on the Internet is improving all the time. But it is still necessary to take precautions to protect both personal and business-related information. Many Web sites and online accounts require passwords. Computer Literacy BASICS

Internet Account Passwords Users typically use passwords that are easy to remember to access a restricted Web site or online account. This makes them easy to crack for a hacker. To protect yourself: Do not use the same password for all online accounts. Change your Internet passwords regularly. Computer Literacy BASICS

Internet Security: Credit Cards Another common security concern on the Internet is credit card information. Safeguard your credit card information: Only give credit card numbers to a site that you know and trust. Do not enter card information into an unsecured site. Read a company’s privacy policy carefully before giving them personal information. Computer Literacy BASICS

Internet Security: Personal Information Avoid providing your telephone number on Web forms. Disclose only what you think is legitimately necessary for the intended purpose. Don’t give out personal information to unknown parties. Use code names when appropriate to protect your identity and personal security. Computer Literacy BASICS

Computer Literacy BASICS Preserving Privacy When you submit information to a Web site, you have no guarantee how that information will be used or who will see it: Information is sold for spam mailing lists. Direct marketing companies use the information to create mailing lists. Credit history information is sold to marketers and other interested parties. Computer Literacy BASICS

Computer Literacy BASICS Cookies Cookies are small files that are created when you visit a Web site and are stored on your computer. They may make it easier for you to use the site when you return, but also provide the site’s owner with information about you and your computer. Cookies also take up disk storage space that you might want to use for other data, so it is important to clean up unnecessary cookies regularly with a utility program designed for the purpose. Computer Literacy BASICS

Computer Literacy BASICS Spyware Spyware can be installed on your computer without your knowledge, usually when you download a file. Spyware tracks your Web habits and can even take over control of your computer and direct you to Web sites you have not chosen to visit. Spyware can be harmful as well as annoying. Firewalls can protect your computer from unauthorized spyware programs. Computer Literacy BASICS

Private Property—But Not Yours When using a company computer e-mail system, all e-mail you send or receive could be viewed by your employer. Personal documents you store on a company computer are company property, and you have no right to expect that they will remain private. Many companies monitor employee’s computer and Internet use. Computer Literacy BASICS

Legal and Ethical Issues Do not copy information from electronic resources, even noncopyrighted material, and claim it as your own. This is illegal and it is called plagiarism. Make sure the information you publish is true. If you publish inaccurate information about a person or organization, you could be sued for libel. Computer Literacy BASICS

Computer Literacy BASICS Identity Theft The flow of information across the Internet makes it easy for criminals to acquire information and prey on unsuspecting victims. Identity theft is often used for fraudulent purchases or other economic crimes. Credit card numbers, Social Security numbers, and even telephone card numbers are routinely used in crimes that are costly to companies and individuals. Computer Literacy BASICS

Other Illegal Online Activities Using someone’s personal data to defraud them or deceive someone else is a serious crime. Other significant criminal problems on the Internet include Making sexual advances to minors. Posting anonymous threats. Circulating rumors to manipulate stock prices. All are made easier by the Internet, but they are just as illegal and just as wrong. Computer Literacy BASICS

Unethical Computer Behavior Not all improper activities on the Internet are illegal. Activities that may not be against the law but may still harm innocent people include A seemingly harmless or humorous prank that can lead to serious repercussions for people who believe that the information is true Unfair use of free-trial “shareware” software The Internet is a powerful tool that must be used ethically and responsibly. Computer Literacy BASICS

Legal Protection for Technology Issues Several laws have been passed to protect computer users, including The Copyright Act of 1976 Software Piracy and Counterfeiting Amendment, 1983 Electronic Communication Privacy Act, 1986 Computer Fraud and Abuse Act, 1986 Computer Matching & Privacy Protection Act, 1988 Many states have laws that pertain to that particular state. Computer Literacy BASICS

Responsibilities of Technology Users Be responsible for your own ethical conduct online. Know the computer policies of a company, school, or organization if you use their computers. Stay informed about changes and advance-ments in computer technology, including product upgrades and virus threats. Computer Literacy BASICS

Responsibilities of Technology Users (cont.) Recycle computer-related products, such as paper output and used ink cartridges. Share your knowledge and experience with your community. Computer Literacy BASICS

Maintaining a Safe Working Environment Computer systems pose various potential hazards: Check that wires, cables, and power cords are arranged and installed safely. Make sure computer equipment is ventilated and cooled to prevent excessive heat buildup. Computer Literacy BASICS

Avoiding Physical Injuries Computer operators need to take precautions to avoid chronic physical maladies such as Repetitive motion injuries Eyestrain Back problems Some ways to minimize the risk of injury include Well-designed work areas and ergonomic furniture Good posture Changing position frequently and taking brief breaks Computer Literacy BASICS

Computer Literacy BASICS Summary Back up data frequently and consistently to avoid losing important information due to a power outage, hardware failure, natural disaster, or computer crime. Computer crime has become a major problem, costing companies billions of dollars annually. Computer Literacy BASICS

Computer Literacy BASICS Summary (cont.) Computer fraud is conduct that involves the manipulation of a computer or computer data for dishonest profit. Computer hacking involves invading some-one else’s computer for personal gain. Sometimes it is done for financial gain and sometimes just as a prank. Computer Literacy BASICS

Computer Literacy BASICS Summary (cont.) A computer virus is a program that has been written to cause corruption of data on a computer. There are different variations of viruses. These include worms, time bombs, logic bombs, and trojan horses. Other computer crimes include theft of computer time, data diddling, and using information from another person’s screen or printouts. Computer Literacy BASICS

Computer Literacy BASICS Summary (cont.) To protect yourself against viruses, install and keep an antivirus program running on your computer. Be sure to update it regularly. E-mail attachments can contain viruses. It is a good idea to save any message to disk if you are not familiar with the sender. After saving it to a disk, you can scan it for viruses. Computer Literacy BASICS

Computer Literacy BASICS Summary (cont.) Computer security is necessary in order to keep hardware, software, and data safe from harm or destruction. The best way to protect data is to control access to the data. The most common way to control access to data is to use passwords. Companies purchase personal information obtained on the Internet to sell to various companies for marketing purposes. Computer Literacy BASICS

Computer Literacy BASICS Summary (cont.) Identity theft is a computer crime that involves using another person’s identification data to defraud or deceive. Laws have been passed in an effort to assist those who have been harmed by computer crimes and offenses, but they are difficult to enforce. Computer Literacy BASICS

Computer Literacy BASICS Summary (cont.) It is important to know and follow the policies of the organization or company whose computers you use. Users of technology are obligated to act responsibly when using computers, dispos-ing of computer parts and materials, and sharing their knowledge. Computer Literacy BASICS

Computer Literacy BASICS Summary (cont.) Maintaining a safe working environment when using computer equipment involves setting up the equipment properly and taking appropriate precautions to avoid physical injuries caused by computer use. Computer Literacy BASICS