Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Issues and Ethics in Education

Similar presentations


Presentation on theme: "Security Issues and Ethics in Education"— Presentation transcript:

1 Security Issues and Ethics in Education
Chapter 8 Security Issues and Ethics in Education

2 What are Computer Security Risks?
Computer Security Risks- are any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability.

3 Types of Computer Security Risks:
Viruses Unauthorized Access Computer Vandalism Information Theft Virus – A potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works.

4 Signs of Virus Infection
-An unusual message or graphical image appears on the computer screen. -An unusual sound or music plays randomly. -The available memory is less than what should be available. -A program or file suddenly is missing. - An unknown program or file mysteriously appears. - The size of a file changes without explanation. - A file becomes corrupted. - A program or file does not work properly.

5 Types of Viruses Trojan Horse – A malicious software program ( named after the Greek myth) that hides within or is designed to look like a legitimate program. Worm – Malicious software program that copies itself repeatedly in a computer’s memory or on a network, using up resources and possibly shutting down a computer or network. Logic bombs – A virus program that activates when it detects a certain condition. Time Bomb – Type of logic bomb that activates on a particular date.

6 Virus Removal Antivirus Programs – are designed to detect, disinfect, and protect computers and networks from viruses. Also called Vaccines.

7 Types of Computer Security Risks:
Unauthorized Access- is the use of a computer or network without permission. Unauthorized Use – is the use of a computer or data for unapproved or possibly illegal activities. -Unauthorized Use ranges from an employee using a company computer to send personal to someone gaining access to a bank system and completing an unauthorized transfer of funds.

8 Prevention of Unauthorized Access
Access Controls – are security measures that define who can access a computer, when they can access it, and what actions they can take while using the computer. Common Access Controls: User ID & Password Possessed Objects Personal Identification Numbers (PIN) Biometric Devices Firewall – Both hardware and software used to restrict access to data on a network. Proxy Server – screens all incoming and outgoing messages.

9 Computer Theft and Vandalism
Computer Vandalism- Vandalism that takes many forms, from a student cutting a computer cable or deleting files to individuals breaking in a school and randomly smashing computers. -With the size and weight of computers and tablets becoming smaller it makes them an easy target to steal. -Common sense and constant awareness of the risks are the best prevention, but some schools do take the precaution to lock their computers to a table or desk. Lojack of the Computer World- service available for purchase; designed to notify the administrator with the location of the stolen device when the person who stole the device uses the device to access the Internet.

10 Software Theft Software Piracy – The unauthorized and illegal duplication of copyrighted software -Is by far the most common form of software theft.

11 Software Licenses Software License- Agreement that provides specific conditions for use of software, which users must accept before using the software. Multiple-user: Software installed on a set number of computers, typically 5, 10, 50, or more. -Most common in schools used for a cost-effective method to install software on more than one computer. Community & State License: Software frequently distributed on CD-DVDs . -In schools it is a very cost-effective way for school districts & states to purchase large quantities of software.

12 Information Theft -The deliberate theft of information causes as much or more damage than theft of hardware. -School networks contain large amounts of important and confidential information about student and teachers. -As a result of information theft, schools have implemented several security precautions. One example would be encryption. Encryption- The process of converting readable data into unreadable characters by applying a formula that uses a code. Encryption Key- code that coverts readable data into unreadable characters.

13 Ethics & the Information Age
Ethics- The standards that determine whether an action is good or bad. Computer Ethics- moral guidelines that govern the use of computers, network, and information systems.

14 Computer Ethics for Educators
Educators will not use a computer to harm people. Educators will not interfere with other’s computer work. Educators will not look at others’ computer files. Educators will not use a computer to steal. Educators will not use a computer to lie. Educators will not copy or use software without paying for it. Educators will not use other’s computer resources without permission. Educators will not use other’s work. Educators will think about the social impact of the programs they create. Educators will always use a computer in a way that shows respect and consideration for other people.

15 Information Privacy Information Privacy- The right of individuals and organizations to deny or restrict the collection and use of information about them. -Schools have a legal and moral responsibility to protect sensitive information, whether it is in printed form or stored electronically on school computers. -Teachers also must follow federal and state privacy laws concerning the storage and release of information about their students. -Teachers should carefully read and make sure they understand all school district policies concerning the release of sensitive information related to their students.

16 Employee Monitoring Employee Monitoring- Uses computers to observe, record, and review and individual’s use of a computer, including communications such as e- mail, keyboard activity, and internet sites visited. -Schools usually have very specific rules governing the use of and networks by teachers, administrators, and students. -Teachers should become familiar with all school policies concerning e- mail, computer, and Internet usage. -Acceptable Use Policies are required to be signed by teachers, administrators, parents, and students providing specific guidance for using school computers.

17 How to Avoid Copyright Issues
Copyright Laws Copyright- The original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distribute the creative work. Fair Use- Guidelines that allow educators to use and copy certain copyrighted materials for nonprofit educational purposes. How to Avoid Copyright Issues -Assume all material you or your students use for the classroom is copyrighted even web pages. -Always follow Fair Use Policies, School Policies, or any restrictions that maybe listed on the material.

18 Objectionable Materials on the Internet
Objectionable Materials: Racist Literature Obscene Pictures and Videos Gambling Age Restricted Items such as Cigarettes & Alcohol Fake Web Pages -Make sure your students do not encounter objectionable materials, and if they do be sure to follow the policies set forth by your school or school district. Children’s Internet Protection Act (CIPA)- Act passed by Congress in 2000 to protect children from obscene, pornographic, and other information on the Internet considered harmful to minors. -CIPA requires public libraries install filtering software to block Web sites that contain obscene images or content.

19 Cyberbullying in Schools
Cyberbullying- The posting or sending of detrimental or cruel text or images using the Internet or other digital devices. -Students are most often the victim of cyberbullying just as they were with traditional bullying. -Teachers can also be the victim of cyberbullying if students post cruel information about their teachers. -All teachers should be aware of the actions and consequences of cyberbullying teaching their students they will be held accountable for their actions, including criminal prosecution if appropriate.

20 Helpful Hints for Educators
A notice that use of school computers, networks, and the Internet is a privilege, not a right. A list of rules and consequences concerning accessing objectionable Internet sites. A notice that students who violate the Acceptable Use Policy will face disciplinary action and possibly permanent cancellation of school network and/or Internet access privileges. Teacher Observation- Teachers actively observing their students during the learning process. -Permits teachers to monitor their students actively and continuously while they are on the Internet. -Teacher Observation is the most important secure & ethical way to protect your class.


Download ppt "Security Issues and Ethics in Education"

Similar presentations


Ads by Google