Lesson 31 Computer Safety and Ethics

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Hart District Acceptable Use Policy Acceptable Use Policy.
Lesson 30 Computer Safety and Ethics
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Ethics and Safety Management. Health Safety When using a computer for long periods of time, you can cause health risks ranging from minor to major. Ex.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Defining Security Issues
Lesson 27 Communications and Collaboration
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
1 Lesson 26 Communications and Collaboration Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Types of Electronic Infection
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
1 Lesson 31 Computer Safety and Ethics Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Security Risks Todays Lesson Security Risks Security Precautions
IT Security  .
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Lesson 31 Computer Safety and Ethics Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition Morrison / Wells

Objectives Maintain a safe computing environment. Prevent computer-related injuries. Identify security risks. Set access restrictions. Understand workplace privacy. Avoid e-commerce problems. 2 2

Objectives (continued) Protect privacy on the Internet. Use the Internet safely and legally. Practice responsibility as a computer user. 3 3

VOCABULARY ASSIGNMENT DIRECTIONS: Create a Word document entitled CLB M1L31 Vocabulary. Define the following words (as they relate to computers). RAISE YOUR HAND WHEN DONE. I WILL GRADE ONSCREEN.

Vocabulary repetitive strain injury (RSI) sniffer spyware browser hijacking brute force attacks encryption hacking hardware firewall keylogger phishing private key public key repetitive strain injury (RSI) sniffer spyware strong password Transport Layer Security (TLS) 5 5

Maintaining a Safe Computing Environment Make sure you use a computer in a way that supports your comfort, health, and safety. Pay attention to your posture, lighting, and activity level. Review product safety guidelines provided with your computer or any other electronic device. See www.osha.gov for guidelines. 6 6

Preventing Computer-Related Injuries Take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injury (RSI), which can result when a person makes too many of the same motions over a long period of time. 7 7

Identifying Security Risks An intruder could use a sniffer, which is a program that hackers use to capture user names and passwords on a network. Using Network Protection: When setting up a wireless network, change the default password and turn on some form of encryption. 8 8

Identifying Security Risks (continued) Computer Hacking: Computer hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system. If the network is large, a hardware firewall that controls the computers from one point should be implemented. 9 9

Identifying Security Risks (continued) Avoiding Data Loss: Save frequently. Use surge protectors. Back up important files regularly. 10 10

Identifying Security Risks (continued) Safeguarding Data Against Software Threats: Use strong passwords, install latest security updates, use an up-to-date antivirus program. 11 11

Identifying Security Risks (continued) Safeguarding Data Against Software Threats (continued): A strong password is both complex and secure. Strong passwords are more resistant to brute force attacks, which use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file. A keylogger is a malicious program that records keystrokes. 12 12

Identifying Security Risks (continued) Safeguarding Data Against Software Threats (continued): Hackers often use spyware to control your browser, a practice called browser hijacking. You can also use antispyware software such as Windows Defender to protect your system. 13 13

Video: Computer Security http://www.onguardonline.gov/articles/0009-computer-security (3:32 minutes)

Setting Access Restrictions System administrators and users often restrict access to files, storage devices, computers, networks, the Internet, or specific Internet sites to protect data and other users. Software is available that lets you monitor computer usage, including Web sites, e-mail messages, social networks, instant messaging and chats, and applications. 15 15

Understanding Workplace Privacy Any information gathered from a company’s computer system is company property and not an individual worker’s personal property. The employee normally has no right to personal privacy regarding those issues. Many organizations have computer or network usage policies that provide guidelines for using the organization’s systems ethically, professionally, and legally. 16 16

Avoiding E-Commerce Problems Before providing personal information or credit card information on an e-commerce or similar site, first verify that the site is secure. 17 17

Avoiding E-Commerce Problems (continued) Several companies provide a *Transport Layer Security (TLS) or Secure Sockets Layer (SSL) certificate for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements. An SSL certificate consists of a public key and a private key. The public key encrypts information and the private key deciphers the information. 18 18

*OSI Model: TLS and SSL The OSI (Open Systems Interconnection) Model defines a computer networking framework to implement protocols in seven layers. Each layer controls a different function on a network. 19 19

*OSI Model: TLS and SSL 20 20

Protecting Privacy on the Internet Phishing is a type of computer fraud that attempts to steal your private data. 21 21

Protecting Privacy on the Internet (continued) Cookies and Spyware: Clean up the unnecessary cookies on your computer frequently with a utility program designed for that purpose. Spyware can be harmful as well as annoying. Securing Data: The best way to protect data is to effectively control the access to it. Use strong passwords, use code names or aliases, and always sign off of public computers. 22 22

Reading / Notes Assignment Visit class website: http://ohsgd.weebly.com Reading / Notes: Understanding Mobile Apps Student downloads > Reading Beware of Spyware Game

Beware Of Spyware Game http://www.consumer.ftc.gov/media/game-0002-beware-spyware Search: Beware Of Spyware Game. Play the game. Prepare a report (Use Word. MLA format) on what you’ve learned from the Understanding Mobile Apps reading and the Beware of Spyware Game. Include information on how to avoid spyware. Log-in to Jupiter Grades. Click on the CT – Mobile Apps / Spyware Game assignment. The Dropbox will open. Select New Juno Doc. Copy your information from Word into a Juno Doc and click Submit.

Using the Internet Safely and Legally Nearly all institutions have written policies and guidelines regarding Internet usage. The Department of Justice and other government agencies provide resources for Internet safety. 25 25

Practicing Responsibility as a Computer User It is your responsibility to stay informed about changes and advancements in computer technology, product upgrades, and virus threats. Recycle products such as used computer paper and ink cartridges. 26 26

Summary 27 27 In this lesson, you learned: Make sure you use a computer in a way that supports your comfort, health, and safety. When you use a computer, take precautions to avoid chronic physical maladies such as repetitive motion injuries, eyestrain, and back problems that can arise over time. Ergonomic design, which adapts equipment and the workplace to fit the worker, can help to prevent repetitive strain injuries. 27 27

Summary (continued) When setting up your wireless network, your first step should be to change the default password to protect access to the network. Computer hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system. To avoid data loss, you can use techniques and devices for preventing power interruptions. You can also devise and follow a regular procedure for backing up your data. 28 28

Summary (continued) A virus is a program that has been written, usually by a hacker, to corrupt data on a computer. The virus is attached to a file and spreads from one file to another when the program is executed. To protect your computer against virus damage, use up-to-date antivirus software, download and install security updates for your operating system, and avoid opening files sent via e-mail from people you do not know. 29 29

Summary (continued) System administrators and users often restrict access to files, storage devices, various computers, networks, the Internet, or specific Internet sites. If you work for a company that provides you with e-mail services, the information you send is available to the company and is the company’s property. 30 30

Summary (continued) TSL and SSL technology enables encryption of sensitive information by establishing a private communication channel. Data transmitted through this channel is encrypted during transmission. Nearly all schools, government agencies, companies, libraries, and other similar institutions have written policies and guidelines regarding Internet usage. 31 31

Critical Thinking: Group Assignment (Pairs) Wikipedia contains a Web site dedicated to Internet privacy: http://en.wikipedia.org/wiki/Internet_privacy and review the information contained on the site, then, in a Word document, type and answer the following questions: What did you find the most beneficial for you personally? (Answer as a group. There should be more than one thing your group finds beneficial). Detail why your group considers the items you listed beneficial. Discuss the “levels of privacy” as defined in this article. What are evercookies? How can posting photographs online lead to privacy concerns? Log-in to Jupiter Grades.

Critical Thinking: Group Work (Pairs) Click on the CLB M3L31 CRITICAL THINKING: INTERNET PRIVACY assignment name. The dropbox for the assignment will open. Select New Juno Doc. Select all of the information in your Word document (Ctrl-A) and copy (Ctrl-C) and paste (Ctrl-V) it your report into the Juno Doc. Lastly, submit by clicking “Turn It In Now” in the upper right corner of the Juno Doc dropbox screen.