Ch 8: Security Issues, Ethics, and Emerging Technologies in Education

Slides:



Advertisements
Similar presentations
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
CYBER CRIME AND SECURITY TRENDS
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
New Data Regulation Law 201 CMR TJX Video.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1.1 System Performance Security Module 1 Version 5.
Computer Security, Ethics and Privacy Chapter 11.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Computer Crimes Career & Technology Education Department.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Technology and You Chapter 7. Definitions: complete the definition for the following terms. Hardware Central Processing Unit (CPU) USB Flash Drive Peripherals.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Security Issues & Ethics in Education By Maud Mushayamunda.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Slide Template for Module 4 Data Storage, Backup, and Security
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Why Computer Security Need???
Computer Ethics.
Malware, Phishing and Network Policies
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Presentation transcript:

Ch 8: Security Issues, Ethics, and Emerging Technologies in Education Chapter 8 covers several topics. Those being security issues to be aware of as computer users, ethics as educators incorporating technology in the classroom, and emerging technologies that will transform the classroom. Taylor Grizzle

Security risks Virus Malicious Software Programs Boot sector virus File virus Macro virus Malicious Software Programs Worms Trojan horses There are several security risks computer users need to be aware of. Viruses and Malicious software programs are the most frequent and major. There are three different types of viruses boot sector viruses, file viruses, and macro viruses. -A boot sector virus replaces the boot program used to start the computer with a modified, infected version of the boot program. -A file virus inserts virus code into program files; the virus then spreads to any program that accesses the infected file. -A macro virus uses the macro language of an application, such as word processing or spread sheet, to hide virus codes. When you open a document with an infected macro, the macro virus loads into memory. Malicious software programs are variations of computer viruses. A worm is a program that copies itself repeatedly in a computer’s memory or on a network, using up resources and possibly shutting down the computer or network. Creators of worms often play on user psychology to entice people to download and run them. As a result, a number of well known worms have hijacked e-mail systems and sent copies of themselves around the world in a matter of hours. -A Trojan horse is a malicious software program that hides within or is designed to look like a legitimate program.

How Computer Viruses and Malicious Software Programs Work

How Schools Safeguard Computers and Networks Antivirus Programs Establishing username with pass codes to access computers Installing physical security devices Installing firewalls to deny network access to outsiders -Purchase and install reliable antivirus software -Scan all removable media -Scan all files downloaded from the Internet -Scan all attached files before opening them -Turn off e-mail preview -Scan all software before using it -Do not use pirated, illegal copies of copyrighted software -Never start your computer with removable media in the drives -Install a personal firewall program -Backup your files often -Set your antivirus program to scan automatically

Computer Backup Definition: duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed Schools have backup procedures that outline a regular plan of copying and backing up important data and programs Easiest way to backup is to copy your important files from your hard disk to a CD, USB flash drive, or portable hard drive.

Components of Copyright Illegal copying or using copyrighted software programs Fair use laws and their application to the use of both printed copyrighted materials and copyrighted materials accessible on the Internet Use of copyrighted materials on teacher and student Web pages

Ethical Issues to Internet Usage Unauthorized use of computers Hardware, software, and information theft Information privacy Copyright Existence of objectionable materials on the Internet Will not use a computer to harm other people Will not interfere with others’ computer work Will not look at others’ computer files Will not use a computer to steal or lie Will not copy or use software without paying for it Will not use others’ computer resources without permission Will not use others’ work Will think about the social impact of the programs he or she creates Will use a computer in a way that shows respect and consideration for other people

Emerging Technologies in Traditional Classrooms Digital Media Revolution World Wide Web Netbooks Assistive Technologies Web- and Video-enhanced textbooks Web-based distance learning Wireless Technologies -To reach and motivate today’s students, teachers must understand this digital media revolution and utilize current and future digital media technologies. Teachers must integrate and adopt digital media technologies and create innovative teaching and learning technologies -The majority of PreK-12 students in most schools will be able to access thousands of full-motion videos on demand. This will allow teachers to bring live video footage of current and historical events into their classrooms. Students can review video productions on their iPods and other similar devices. -Netbooks are computers, just smaller in size but not small in flexibility, usability, or functionality. When every student has a netbook, an entire new world of anytime and anyplace learning possibilities opens up. -Assistive technologies aid in teaching student who have physical, sensory, or cognitive disabilities. Emerging assistive technologies will provide teachers with innovative tools to help students with special needs overcome the disability that blocks or impedes their learning process. -Digitized textbooks provide students with discovery learning avenues and information about thousands of topics form thousands of sources all over the world. The textbooks are enhanced with an extensive Web site that is continuously updated and maintained by a team. -Web-based instructional strategies offer creative solutions for homebound students, home-schooled students, at-risk students, students who are physically challenged, and teacher shortages for specialized positions. -Wireless communications will allow teachers and students to connect their smart phones, netbooks, Tablet PCs, iPods, and other wireless devices to a high speed network. Wireless netbook computers, tablets, mobile labs, and other devices will ensure that educational technology is used seamlessly at the point of instruction. Global wireless access will ensure that all children, regardless of socioeconomic status, will have access to educational classroom materials and the world itself from their homes, their schools, and many other locations throughout their communities.