Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Learning Objectives Can I understand what is a computer virus and worm is Can I identify risks when using technology (E- Safety) Can I discuss cyber bullying.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 6 Digital Literacy Study S3 Obj 2-2
Internet Safety/Cyber Ethics
Using internet and cell phones safely
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Safeguarding. Your responsibility Your responsibility.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
A Student’s Guide to Proper and Safe Web Behavior
Computer Ethics.
Digital Citizenship Project By: Wanda Hicks Technology and Education Dr. Hocutt.
Joseph Pettaway ED505. What is Digital Citizenship? Concepts that aids individuals in learning and understanding how to use technology appropriately.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT security By Tilly Gerlack.
Viruses & Destructive Programs
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Computer viruses are small software programs designed to spread from one computer to another corrupt or delete data on your computer.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Sean Nagelski, Kristina Klima, and Kelly Sipko.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Safety and Security issues of using ICT Alys brooks.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computer crimes.
INTRODUCTION & QUESTIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
A Student’s Guide to Proper and Safe Web Behavior
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Ethics Unit 1

What does ethical mean? Following rules or doing the right thing

What is computer hacking? Gaining access to online information without permission.

Examples of hacking Accessing school records from home to change grades Accessing bank records and changing numbers

Consequences of hacking Suspension from school Criminal conviction –Including fines –Imprisonment

What is computer piracy? The coping of ones computer software or other digital information without permission.

Examples of piracy? Copying CD’s or DVD's Software programs that you did not purchase such as: – Microsoft programs –Videos games

What is a computer virus? Computer programs that ruin computer files or hard drives

What is the common way a virus is sent? Phishing –The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft enterprise – htmlhttp:// html

What are computer worms? Self-replicating computer program. It does not need a program to attach it self to. Always cause harm

What is invasion of privacy? Accessing someone’s private information without permission. Spreads lies about people

Consequences of invasion of privacy? Lawsuits fines

What is a poison pen? Writing nasty s and sending them to people. Similar to cyber bullying