Security and Ethics Safeguards and Codes of Conduct.

Slides:



Advertisements
Similar presentations
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Advertisements

Security Objectives Describe the types of computer security risks
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Living in a Digital World Discovering Computers 2010.
Discovering Computers Fundamentals, 2012 Edition Living in a Digital World.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Living in a Digital World Discovering Computers 2011.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 11 Computer Security and Safety, Ethics, and Privacy.
Chapter 11 Computer Security, Ethics and Privacy
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
Computer Security, Ethics and Privacy
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Discuss techniques to prevent unauthorized computer access and use
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
history, hardware, software, safety, and computer ethics
Chapter 11 Objectives Describe the types of computer security risks
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Living in a Digital World Discovering Computers 2010.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Living in a Digital World Discovering Computers 2011.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Your Interactive Guide to the Digital World Discovering Computers Manage Computing Securely, Safely, and Ethically Chapter Eleven.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
Security Issues & Ethics in Education By Maud Mushayamunda.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet.
Presentation transcript:

Security and Ethics Safeguards and Codes of Conduct

Security Computer Security Risk - any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capabilities Computer Crimes - any illegal act involving a computer Cybercrime - online or Internet illegal acts

Common Security Risks Computer Viruses Worms Trojan Horses Unauthorized Access and Use Information Theft System Failure

Safeguards Against Malicious- Logic Programs Never start with a floppy disk Only use a trusted source with attachments Always install an antivirus program Set macro security Check all downloaded programs Write protect recovery disks Back-up files often Stay informed with new virus alerts.

Unauthorized Access Cracker/Hacker — Someone who tries to access a computer or network illegally Acceptable Use Policy (AUP) — A written policy that outlines the activities for which a computer and network may or may not be used

Safeguards Against Unauthorized Access and Use Firewalls Intrusion Detections Access Controls Audit Trails

Hardware Theft and Vandalism Hardware Theft — The act of stealing computer equipment Hardware Vandalism — The act of defacing or destroying computer equipment

Safeguards Against Hardware Theft and Vandalism Limit physical access Install alarm systems Use locking devices Monitor mobile devices at all times Use passwords

Software Theft Software Theft — The act of stealing software media, intentionally erasing programs, or illegally copying programs Software Piracy — The unauthorized and illegal duplication of copyrighted software

Safeguards Against Software Theft Keep originals in a secure place Escort terminated employees off premises Issue user licensing agreements

Information Theft Information Theft - the act of stealing personal or confidential information Information Theft is often linked to other types of computer crimes Use Identification Controls Encrypt Sensitive Information Use Virtual Private Networks Safeguards

Ethics and Society Computer Ethics - The moral guidelines that govern the use of computers and information Intellectual Property Rights - The protection of unique and original works Copyright - The exclusive rights granted to an author

Information Privacy Codes of Conduct Electronic Profiles Cookies Cookie Managers Spyware Spam Privacy Laws Employee Monitoring Content Filtering Filtering Digital Signatures

Health Concerns of Computer Use Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome Tendonitis Computer Vision Syndrome OSHA Guidelines Hand Exercises Eyestrain Ease Ergonomics Green Computing Energy Star Computer Addiction