View
267
Download
7
Category
Tags:
Preview:
Citation preview
Security Issues, Ethics, & Emerging Technologies in Education
Learning Objectives Identify security risks that threaten home and school computers
Describe how computer viruses and malicious software programs work and steps you can take to prevent viruses
Describe different ways schools safeguard computers and networks
Explain why computer backup is important and how it is accomplished
Define what is meant by information privacy and its impact on schools
Identify the components of copyright that impact education
Describe the ethical issues related to Internet usage and steps schools are taking to address them
Security Risks Computer Viruses
Unauthorized access & use
Information theft
Security Risks Computer Viruses - Types
Boot Sector Virus
Loads into memory on boot
Infects targeted files
File Virus
Inserted code that effects a specific program
Infects targeted files
Macro Virus
Code within a program such as MS Excel or MS Word
Infects targeted files
Security Risks Computer Viruses - Variations
Worms
Self-replicated file that sends itself to other nodes(computers) on a network
Trojan Horse
Looks like a legitimate program
Security Risks Computer Viruses – Detection & Removal
Anti-Virus Software
Look for files that change / alter / act like known viruses
Repair infected files
Security Risks Unauthorized access & use - Types
Hacker
Security Risks Unauthorized access & use - Protection
Access Control
User Name
• Usually dictated by some protocol
Passwords
• Use combination of letters, digits, words, initials and dates
• Make the password at least 8 characters
• Add one or more numbers
• Use upper and lower case letters
Possessed Objects & Biometric Devise
• ID Cards
• Fingerprint readers
Security Risks Unauthorized access & use - Protection
Firewall
Safeguards Hardware
Software Software Piracy
EULA
Single-user
Multi-user
Network-user
Community/State-user
Data Encryption
Data Backup
Ethics Moral Guidelines that govern the use of computers,
networks & information systems Information Privacy
Unauthorized collection & use of information
Phishing
Spam
Children’s Internet Protection Act (CIPA) Schools & public library‘s must protect children from obscene,
pornographic, and other information considered harmful to minors.
Ethics Acceptable Use Policies
Internet Filters
Teacher Observation
Copyright Laws Fair Use
Document, document, document
Ask for permission
Public Domain Use Royalty Free files
Clip-art
Audio Files
Links Password Generator
PCTools Password Generator
Password Safe Keepass Password Safe
Password Strength How Secure Is My Password?
Backup Software DropBox
iBackup
Royalty Free Files FreeDigitalPhotos.net
RoyaltyFreeMusic.com
Recommended