Security Issues and Ethics in Education

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Woodlands High School
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
VISD Acceptable Use Policy
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Digital Citizenship By: Miranda Scorver.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Employee Guidelines for Acceptable Use of Technology Resources.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Digital Citizenship Created By: Kelli Stinson June 2011.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Digital Citizenship Project By Allen Naylor Ed 505.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Topic 5: Basic Security.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Security Issues & Ethics in Education By Maud Mushayamunda.
Technical Implementation: Security Risks
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Being CyberSmart! About Online Safety and Security At Schools
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
BCT 2.00 Analyze Technology Issues
Student Accounts OFFICE 365 Student Accounts.
The Issues with Technology in education
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

Security Issues and Ethics in Education Chapter 8 Security Issues and Ethics in Education

What are Computer Security Risks? Computer Security Risks- are any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability.

Types of Computer Security Risks: Viruses Unauthorized Access Computer Vandalism Information Theft Virus – A potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works.

Signs of Virus Infection -An unusual message or graphical image appears on the computer screen. -An unusual sound or music plays randomly. -The available memory is less than what should be available. -A program or file suddenly is missing. - An unknown program or file mysteriously appears. - The size of a file changes without explanation. - A file becomes corrupted. - A program or file does not work properly.

Types of Viruses Trojan Horse – A malicious software program ( named after the Greek myth) that hides within or is designed to look like a legitimate program. Worm – Malicious software program that copies itself repeatedly in a computer’s memory or on a network, using up resources and possibly shutting down a computer or network. Logic bombs – A virus program that activates when it detects a certain condition. Time Bomb – Type of logic bomb that activates on a particular date.

Virus Removal Antivirus Programs – are designed to detect, disinfect, and protect computers and networks from viruses. Also called Vaccines.

Types of Computer Security Risks: Unauthorized Access- is the use of a computer or network without permission. Unauthorized Use – is the use of a computer or data for unapproved or possibly illegal activities. -Unauthorized Use ranges from an employee using a company computer to send personal e-mail to someone gaining access to a bank system and completing an unauthorized transfer of funds.

Prevention of Unauthorized Access Access Controls – are security measures that define who can access a computer, when they can access it, and what actions they can take while using the computer. Common Access Controls: User ID & Password Possessed Objects Personal Identification Numbers (PIN) Biometric Devices Firewall – Both hardware and software used to restrict access to data on a network. Proxy Server – screens all incoming and outgoing messages.

Computer Theft and Vandalism Computer Vandalism- Vandalism that takes many forms, from a student cutting a computer cable or deleting files to individuals breaking in a school and randomly smashing computers. -With the size and weight of computers and tablets becoming smaller it makes them an easy target to steal. -Common sense and constant awareness of the risks are the best prevention, but some schools do take the precaution to lock their computers to a table or desk. Lojack of the Computer World- service available for purchase; designed to notify the administrator with the location of the stolen device when the person who stole the device uses the device to access the Internet.

Software Theft Software Piracy – The unauthorized and illegal duplication of copyrighted software -Is by far the most common form of software theft.

Software Licenses Software License- Agreement that provides specific conditions for use of software, which users must accept before using the software. Multiple-user: Software installed on a set number of computers, typically 5, 10, 50, or more. -Most common in schools used for a cost-effective method to install software on more than one computer. Community & State License: Software frequently distributed on CD-DVDs . -In schools it is a very cost-effective way for school districts & states to purchase large quantities of software.

Information Theft -The deliberate theft of information causes as much or more damage than theft of hardware. -School networks contain large amounts of important and confidential information about student and teachers. -As a result of information theft, schools have implemented several security precautions. One example would be encryption. Encryption- The process of converting readable data into unreadable characters by applying a formula that uses a code. Encryption Key- code that coverts readable data into unreadable characters.

Ethics & the Information Age Ethics- The standards that determine whether an action is good or bad. Computer Ethics- moral guidelines that govern the use of computers, network, and information systems.

Computer Ethics for Educators Educators will not use a computer to harm people. Educators will not interfere with other’s computer work. Educators will not look at others’ computer files. Educators will not use a computer to steal. Educators will not use a computer to lie. Educators will not copy or use software without paying for it. Educators will not use other’s computer resources without permission. Educators will not use other’s work. Educators will think about the social impact of the programs they create. Educators will always use a computer in a way that shows respect and consideration for other people.

Information Privacy Information Privacy- The right of individuals and organizations to deny or restrict the collection and use of information about them. -Schools have a legal and moral responsibility to protect sensitive information, whether it is in printed form or stored electronically on school computers. -Teachers also must follow federal and state privacy laws concerning the storage and release of information about their students. -Teachers should carefully read and make sure they understand all school district policies concerning the release of sensitive information related to their students.

Employee Monitoring Employee Monitoring- Uses computers to observe, record, and review and individual’s use of a computer, including communications such as e- mail, keyboard activity, and internet sites visited. -Schools usually have very specific rules governing the use of e-mail and networks by teachers, administrators, and students. -Teachers should become familiar with all school policies concerning e- mail, computer, and Internet usage. -Acceptable Use Policies are required to be signed by teachers, administrators, parents, and students providing specific guidance for using school computers.

How to Avoid Copyright Issues Copyright Laws Copyright- The original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distribute the creative work. Fair Use- Guidelines that allow educators to use and copy certain copyrighted materials for nonprofit educational purposes. How to Avoid Copyright Issues -Assume all material you or your students use for the classroom is copyrighted even web pages. -Always follow Fair Use Policies, School Policies, or any restrictions that maybe listed on the material.

Objectionable Materials on the Internet Objectionable Materials: Racist Literature Obscene Pictures and Videos Gambling Age Restricted Items such as Cigarettes & Alcohol Fake Web Pages -Make sure your students do not encounter objectionable materials, and if they do be sure to follow the policies set forth by your school or school district. Children’s Internet Protection Act (CIPA)- Act passed by Congress in 2000 to protect children from obscene, pornographic, and other information on the Internet considered harmful to minors. -CIPA requires public libraries install filtering software to block Web sites that contain obscene images or content.

Cyberbullying in Schools Cyberbullying- The posting or sending of detrimental or cruel text or images using the Internet or other digital devices. -Students are most often the victim of cyberbullying just as they were with traditional bullying. -Teachers can also be the victim of cyberbullying if students post cruel information about their teachers. -All teachers should be aware of the actions and consequences of cyberbullying teaching their students they will be held accountable for their actions, including criminal prosecution if appropriate.

Helpful Hints for Educators A notice that use of school computers, networks, and the Internet is a privilege, not a right. A list of rules and consequences concerning accessing objectionable Internet sites. A notice that students who violate the Acceptable Use Policy will face disciplinary action and possibly permanent cancellation of school network and/or Internet access privileges. Teacher Observation- Teachers actively observing their students during the learning process. -Permits teachers to monitor their students actively and continuously while they are on the Internet. -Teacher Observation is the most important secure & ethical way to protect your class.