Security Issues, Ethics, & Emerging Technologies in Education

Preview:

Citation preview

Security Issues, Ethics, & Emerging Technologies in Education

Learning Objectives Identify security risks that threaten home and school computers

Describe how computer viruses and malicious software programs work and steps you can take to prevent viruses

Describe different ways schools safeguard computers and networks

Explain why computer backup is important and how it is accomplished

Define what is meant by information privacy and its impact on schools

Identify the components of copyright that impact education

Describe the ethical issues related to Internet usage and steps schools are taking to address them

Security Risks Computer Viruses

Unauthorized access & use

Information theft

Security Risks Computer Viruses - Types

Boot Sector Virus

Loads into memory on boot

Infects targeted files

File Virus

Inserted code that effects a specific program

Infects targeted files

Macro Virus

Code within a program such as MS Excel or MS Word

Infects targeted files

Security Risks Computer Viruses - Variations

Worms

Self-replicated file that sends itself to other nodes(computers) on a network

Trojan Horse

Looks like a legitimate program

Security Risks Computer Viruses – Detection & Removal

Anti-Virus Software

Look for files that change / alter / act like known viruses

Repair infected files

Security Risks Unauthorized access & use - Types

Hacker

Security Risks Unauthorized access & use - Protection

Access Control

User Name

• Usually dictated by some protocol

Passwords

• Use combination of letters, digits, words, initials and dates

• Make the password at least 8 characters

• Add one or more numbers

• Use upper and lower case letters

Possessed Objects & Biometric Devise

• ID Cards

• Fingerprint readers

Security Risks Unauthorized access & use - Protection

Firewall

Safeguards Hardware

Software Software Piracy

EULA

Single-user

Multi-user

Network-user

Community/State-user

Data Encryption

Data Backup

Ethics Moral Guidelines that govern the use of computers,

networks & information systems Information Privacy

Unauthorized collection & use of information

Phishing

Spam

Children’s Internet Protection Act (CIPA) Schools & public library‘s must protect children from obscene,

pornographic, and other information considered harmful to minors.

Ethics Acceptable Use Policies

Internet Filters

Teacher Observation

Copyright Laws Fair Use

Document, document, document

Ask for permission

Public Domain Use Royalty Free files

Clip-art

Audio Files

Recommended