Presentation is loading. Please wait.

Presentation is loading. Please wait.

BCT 2.00 Analyze Technology Issues

Similar presentations


Presentation on theme: "BCT 2.00 Analyze Technology Issues"— Presentation transcript:

1 BCT 2.00 Analyze Technology Issues
Discuss security, confidentiality and ethical issues as related to computer usage.

2 ETHICS Conforming to the accepted professional standards of conduct
What is right and wrong using computers (morals)

3 Privacy Concerns Public Data – Information that is available ethically to any user (phone numbers, addresses, etc) Private Data – Information that is confidential and only ethically available to selected individuals (credit card #s, social security numbers, )

4 Computer Crimes

5 Computer Crimes A criminal act committed through the use of a computer. Can also involve the theft of a computer and any equipment associated with the computer.

6 Types of Computer Crimes
Computer Fraud Conduct that involves the manipulation of a computer or computer data to obtain money, property, or value dishonestly or to cause loss. Examples: stealing money from bank accounts stealing information from other people’s computers for gain

7 Types of Computer Crimes
Hacking Involves invading (breaking into) someone else’s computer, usually for personal gain or just the satisfaction of invasion. Data Diddling Changing data before it is entered into the computer or after is has been entered into the computer.

8 Types of Computer Crimes
Software Piracy Illegally copying and distributing software Making and/or selling “bootlegged” copies of software

9 Other Computer Crimes Theft of computer time
An employee uses a company’s computer for personal use such as running a small business keeping records of an outside organization keeping personal records shopping on the Internet

10 SOFTWARE LICENSES

11 License The instructions telling you exactly what you are allowed to do as far as copying and loading software on machines

12 Single Use License Installation of the program purchased under a Single-User License is restricted to one single personal computer owned by or under control of the licensee plus one additional computer also owned by the licensee

13 Multi-User License The license permits you to install the program on the specific numbers of PCs entirely within your family, organizations and corporation within one particular specified location (e.g. school).

14 Site License A type of software licensing agreement that grants the purchaser permission to use the software on a network on a single site, with an unlimited number of end users. There may be a maximum specified number of simultaneous end users.

15 Types of Software Licenses
Single Use License One computer Multi-User License A specified number of computers Site License Computers within one building

16 TYPES OF SOFTWARE

17 Public Domain Material that is not copyrighted.
These computer programs can legally be used for free, shared, and copied.

18 Freeware A copyrighted program that you do not have to pay for
Examples: Netscape Internet Explorer Instant Messenger

19 Shareware Software you can use for free for a specified period to try it out. If you decide that you like it and it meets your needs, you are suppose to pay for it. Demo

20 Commercial Software Copyrighted software that must be purchased Word
Microtype Math Blaster SIM City

21 TYPES OF SOFTWARE Public Domain – free to use and distribute; not copyrighted Freeware – copyrighted, but you do not have to pay for it Shareware – use it on a trial basis and pay for it if you want to keep it Commercial Software – you have to pay for it

22 VIRUSES

23 Computer Viruses A destructive computer program that can make your computer perform incorrectly WORMS, BOMBS, TROJAN HORSES

24 WORM Bores its way through your computer attaching itself to files
Makes copies of itself Slows your computer down

25 BOMB Sits in your computer and waits for something to happen
Does not cause damage until a certain date or until the system has been booted a certain number of times.

26 TROJAN HORSE Masquerades as (looks like) a piece of useful software but it is not Does something different than what it is expected to do

27 HOAX A program that tricks users into thinking they have a virus

28 SECURITY MEASURES

29 Security Measures Passwords Selective hiring process
DO use a random sequence of numbers, letters and symbols. DO NOT use words that could be easily guessed by others DO NOT share your passwords with others Selective hiring process carefully screen employees before hiring them

30 Other Security Measures
Firewalls Computer software used to keep someone from breaking into your network or computer Antivirus software Software used to protect you computer from being infected by a virus

31 Security Measures Passwords Firewalls Antivirus software
Protects your network or computer from intruders Antivirus software Software used to protect your computer from being infected by a virus

32 THE END


Download ppt "BCT 2.00 Analyze Technology Issues"

Similar presentations


Ads by Google