Computer and Society Introduction to: World Wide Web Wild Card

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Internet Safety/Cyber Ethics
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Analyzing Technology Issues 8 th Grade Exploring Business and Marketing.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Digital Citizenship Project
Digital Citizenship By: Miranda Scorver.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT security By Tilly Gerlack.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
DIGITAL CITIZENSHIP What You Should Know!.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Computer Basics Technology’s Impact.
Protect Your Computer Against Harmful Attacks!
BCT 2.00 Analyze Technology Issues
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer and Society Introduction to: World Wide Web Wild Card Security/Privacy Computer Crimes Viruses Ethics Etiquette/ Netiquette Email Edited By A. Moore 02/12 Information retrieved from 2008 Exploring Business Technologies & Business Computer Technology—BE 6400, and Digital Literacy curriculum.

Lesson Objectives After completing this lesson you will be able to: Understand the world wide web and the use of the wild card symbol. Identify the common measures used to protect your computer and your data. Discuss security, confidentiality, and ethical issues as related to computer usage. Identify computer viruses. Understand computer ethics, etiquette, and netiquette.

World Wide Web WWW - collection of data that is accessible from the Internet. Web browser - software that allows you to retrieve resources from the web. Internet Explorer, Mozilla Firefox, Google Chrome Search engine – allows users to search for information on the WWW. Google, Alta Vista, Excite

Wild Card Searching The * symbol, called an asterisk, is considered a wildcard character. Used if you don’t know the spelling of a word Example: N*Ryan to search for Nolan Ryan Used to search plurals or variations of words.

What is Computer Security & Privacy? Damages your computer or the data on it is a computer threat. When your computer is connected to a network, the computer becomes more vulnerable to computer threats. Video 5 Worst Photos Post Online

Security Measures Maintain & enforce security measures such as: Passwords Firewalls Limits data that passes through the Internet and protects data from damage by unauthorized users. Antivirus software

Other Terms Scams - attractive offers through e-mail messages or chat room communication. Online predators - individuals who contacts Internet users online. Involve others into inappropriate and unethical relationships.

Computer Privacy Computer privacy - keeping personal files, data, and e-mail messages, away from anyone without permission Computer Security – protecting a computer system from accidental or intentional loss and tampering (Ex: user name and password).

Computer Laws Copyright - Law protecting the original work of an artist or author (software, text, paintings, photographs, books, songs, video/movies).

Computer Crimes Criminal act committed through the use of a computer. Hacker - Using the computer to misuse or tamper with the programs and data stored on the computer. Computer hacking - Invading someone else’s computer, for personal gain or the satisfaction of invasion. Computer fraud - Manipulating a computer or its data for dishonest profit. Theft of computer time - Using a company’s computer for personal use.

Computer Crimes (con’t.) Plagiarism - Taking ideas or words that are not yours and claiming it as yours (research papers). Data diddling - Changing data before or while entering in the computer. Piracy - Violation of copyright law. Illegally copying and reselling as your original.

Identity Theft Hacker steals your personal information to assume your identity.

Viruses http://www.commoncraft.com/video/computer-viruses-and-threats Viruses – software written to cause malfunctioning of a computer or damage the stored data. Worms – uses computer networks and duplicates copies of itself in the computer's memory and causes the computer to crash. E-mail viruses – travels as an e-mail attachment by automatically mailing itself to the address book.

Viruses con’t. Trojan horse - does something harmful while appearing to do something useful (trick disguised as a game). Logic bomb – virus takes affect at an event (deleting an email, closing a pop-up window) Time bomb – virus takes affect at a certain date or time (Friday 13th). Hoax – virus that tricks you into thinking you have a virus.

Spyware Spyware – program installed on your computer without your knowledge. Secretly sends out information about your Web browsing habits or other personal details to another computer through the network.

EXE Called executable files, make things happen. EXE files are necessary for running your applications. EXE files can be dangerous files and damage your computer system and your security. Do not open EXE files than you received as an e-mail.

What is Ethics? Moral principles or values Distinguishing between right and wrong

Technology Ethics Ethics - moral principles by which people conduct themselves. Not play computer games during work hours. Not check personal e-mail. Not use the Internet for personal use such as shopping online.

Acceptable Use Policy (AUP) Policy a user must agree to follow in order to be provided access (login - user name & password) to a network or to the Internet.

E-mail Etiquette Etiquette - Use good manners when writing email messages. Use correct spelling and punctuation. Keep your message short. DO NOT USE ALL CAPS! It looks like you are yelling.

Netiquette - Good internet behavior

Electronic Mail Electronic form of postal mail. Email consists of three parts: The user name of the individual The @ symbol The user’s domain name (name of the computer that handles your mail) Example: rsmith@yahoo.com

Parts of an E-Mail Message Header Body

Are You Paying Attention? Take out a blank sheet of paper. Write your first name, last name, class and date in the right corner. Label this assignment “Computer Society” Number it 1-5.

You receive an e-mail message from an unknown e-mail address. The message requests you to share your credit card details to receive a discount on some music CDs. What will you do with this message? A. Reply to the message to provide your credit card details. B. Encrypt the message. C. Scan the message for viruses. D. Delete the message.

2) Lina is unable to access the e-mail account that her Internet service provider (ISP) provides. She realizes that someone has hacked into her account. What action will she take to remedy this issue? A. Protect her computer from surges and spikes B. Use Microsoft® Windows® Update C. Install spyware D. Report the incident to her ISP

3) Ken decides to download the latest song from his favorite band from a publicly available Web site and share it with his friends. What is Ken doing? A. Breaching copyright B. Breaching security C. Slandering the singer D. Violating privacy

4) While reading a novel, you realize that the author has copied material from another author. How will you categorize this violation? A. Phishing B. Plagiarism C. Libel D. Slander

5) Gloria uses the Internet frequently for online purchasing 5) Gloria uses the Internet frequently for online purchasing. To protect her system from virus attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on her system. Which of the following measures will she implement to prevent this virus in the future? A. Update and run virus scans daily. B. Update the Internet browser. C. Check Windows Update. D. Use a strong password.