14
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Embed Size (px)

Citation preview

Page 1: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Chapter 8Security Issues and Ethics in

Education

By: Nick, Bryan, Randa, Austin

Page 2: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

HomeWork School

Computers Every Day

Is the Classroom at Risk?

Page 3: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

A virus is a potentially damaging computer program designed to affect your computer negatively without your Knowledge.

A virus spreads from one computer to another.

It even spreads through: Cell Phones, Flash drives, e-mail, or I-pads.

A virus acts instantly when it comes in contact with other software or storage devices.

There are different types of viruses and each one has a different Virus Payload or symptom.

What Is A Virus?

Page 4: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Boot Sector Virus- replaces the boot program that starts the computerFile Virus- inserts a virus code into files and spreads to any program that accesses the file.Macro Virus- uses word processor or language programs to hide virus codes.Malicious Software Programs- these include Worm and Trojan horse viruses which hide as legitimate programs and copy repeatedly.Logic Bomb- activates when it detects certain conditions.Time Bomb- activates on a particular date. (most common time bomb is the Michelangelo Virus.) Rootkit- allows someone from a remote location to take full control of a computer.

Some different types of Viruses

Page 5: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Purchase and install reliable antivirus software. (most antivirus software will scan automatically)

Turn off e-mail preview. Do not use pirated, illegal copies of copyrighted

software. Never start your computer with removable media in

the drives. Install a personal firewall program. Always back up your files often. (Save often)

Safe Computing Tips

Page 6: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Unauthorized Access is the process in which an individual illegally gains access to a computer or network.

Unauthorized Use is the use of a computer to perform unapproved, or even illegal activities.

One way to prevent either situation from happening is to implement Access Controls. Access controls are security measures that define who can access a computer.

Unauthorized Access and Use

Page 7: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Another precaution to take in order to prevent unauthorized access and use is to designate a Possessed Object. A possessed object is any item, such as a badge, key, or card that grants the holder access to a computer facility or computer.

Many facilities, including schools, are using Biometric Devices, which takes a personal characteristic, such as a fingerprint, and translates it into a digital code to be verified for authenticity.

Possessed Objects and Biometric Devices

Page 8: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Firewalls are another great way to protect your computer from hackers. A firewall is a security system that prevents unauthorized access to data and personal information.

Both Windows and Mac come with a personal firewall. Routers also come with a hardware firewall pre-installed.

Firewalls

Page 9: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

System Failure also poses a major threat when it comes to data loss. A system failure is a result of electrical problems (overvoltage, power surges), as well as hardware and software errors.

One way to prevent system failures is to use a surge protector. A surge protector is not only useful for your computer, but for your modem, telephone lines, DSL lines, etc.

System Failure

Page 10: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

To prevent data loss, many schools and businesses back up their important files by placing them on flash drives, disc, or portable hard drives.

A secondary back up is also helpful if the original disc is lost, or destroyed.

As an extra precaution, it would be wise to store backup copies at an off-site location. This simple precaution prevents a single disaster, such as a fire, from destroying the primary and backup copies.

Backing Up

Page 11: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Information privacy is the right of individuals and organizations to deny or restrict the collection and use of information about them.

Information Privacy and it’s Impacts on Schools

Page 12: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Copyright means the original author or creator of the work retains ownership of the work and has the exclusive right to reproduce and distributes the creative work.

3 areas of copyright directly impact todays class room 1) illegal copying or using copyrighted materials. 2)copyrighted materials accessible on the internet. 3)use of copyrighted materials on teacher and student web pages.

Copyright and the Impact on school

Page 13: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Computer ethics are the moral guidelines that govern the use of computers, networks, and information systems.

1)Phishing a scam in which a perpetrator sends an official looking email that attempts to obtain personal and financial information from the recipient. 2) spam is unsolicited email message or newsgroup pasting sent to many recipients newsgroups at once.

Privacy laws are laws regarding storing and disclosing personal data and other computer related issues.

Employee and student monitoring uses computers to observe, record, and review an individual’s use of a computer. (Communications, keyboard use, and internet sites visited.

Filtering software Acceptable use policies- set of rules for school and school district

computers Teacher observation- permits teachers to monitor their students’

activity.

Ethical Issues on the internet and how schools are dealing

with them

Page 14: Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin

Ergonomics applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the work place.

Viewing angle of screen is 20 degrees from eye to center of screen with a distance of 18-28 inches.

Elbows at about 90 degrees and arms and hands approximately parallel to floor.

Chair height should be adjustable and should have 4-5 legs for stability

Keyboard 23 to 28 depending on height of user. Feet on the floor.

Safe and healthy uses of Technology use.