29
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Embed Size (px)

Citation preview

Page 1: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

EducationalComputing

David Goldschmidt, Ph.D.Computer Science

The College of Saint Rose

CIS 204Spring 2009

Page 2: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Web Site Design Process Steps to building a Web site:

Define objectives and intended audience of the Web site

Select the content to be presented Determine the navigational structure and layout Construct the individual Web pages Test your Web site (proofread content, verify

links) Obtain server space and a URL Publish (FTP), then publicize, your Web site Keep Web page content up-to-date

Page 3: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Local Area Networks

Local Area Network (LAN) is a networkof machines coveringa limited geographicalarea

Metropolitan AreaNetwork (MAN)covers more denselypopulated area

Page 4: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Wide Area Networks

Wide Area Network(WAN) covers multiplelocations Each location consists

of a LAN or MAN

LANs and WANs areoften private networks

Page 5: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Firewalls

What is a firewall ? A security system that prevents

unauthorized access to data and information on a network or computer

Prohibits accessfrom the InternetInternet

Page 6: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Computer Security

What is computer security risk? Any event or action that has the potential of

causing a loss or theft of computer equipment, software, data, information, or processing capability

What is computer crime? Examples? Any illegal act involving a computer e.g. unauthorized access, information/identity

theft, viruses, online predators, etc.

Page 7: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Acceptable Use Policies (AUP)

What is an acceptable use policy? Rules that govern the use of school and

school district computers, networks, and the Internet....

Rules concerning objectionable materials Rules concerning copyright Guidelines for proper use Guidelines for online safety of

personal information Consequences of breaking

the rules

Page 8: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Unauthorized Access and Use

What is unauthorized access? Accessing a computer

or network withoutpermission

What is unauthorized use? Using a computer or

data for unapprovedor illegal activities

protecting against unauthorized access

how do you best select a password?

Page 9: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Viruses

What is a computer virus? An illegal computer program that is

potentially damaging to your computer May cause corruption

or loss of data May cause software

to malfunction or asystem meltdown

May be a harmless prank

Page 10: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Viruses

Page 11: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Viruses

Page 12: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Antivirus Software

Antivirus software detects, disinfects, and protects computers and networks from viruses

Page 13: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Antivirus Software

How does antivirus software work? Detects programs attempting to write

new data to the boot program, theoperating system, etc.

Scans for known virus programs Information about known viruses

are downloaded frequently(daily or weekly)

Page 14: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Hardware Theft

Safeguard against hardware theft Keep equipment locked up Security systems (e.g. alarms, video

monitoring) Physical security devices

(e.g. cables, locks, etc.) Tracking device

Page 15: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Software Theft

What is software theft? Stealing software by stealing CDs or other

media, or illegally downloading and copying software

When software is purchased, the buyer typicallydoes not own the software! Instead, the buyer has

purchased the right touse the software

software license agreement

(must accept during installation)

Page 16: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Software Licenses

End-user license agreement (EULA) User may install software on only one

computer Or sometimes on one desktop and one laptop

computer User may not install software on a network

for multi-user use User may make one copy of software for

backup purposes User may not give copies to friends and

colleagues

Page 17: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Software Licenses

also freeware or shareware

Page 18: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Information Theft

Information and identity theft havebecome growing concerns Theft of credit card or bank account numbers Theft of social security numbers Theft of other private information

e.g. financial aid, grades, courses, library records, etc.

How can a school, organization, or individualprevent information theft?

Page 19: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Information Theft

Organizations can prevent information theft by: Not storing sensitive data (e.g. credit card

numbers, social security numbers) Encrypting data

that is stored Maintaining firewalls

and other networksecurity measures

Page 20: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Phishing

What is phishing? A scam in which an official-looking e-mail

or Web site attempts toobtain personalinformation

an attempt to bring you toa phony Web site and stealyour personal information

Page 21: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Spam

What is spam? Unsolicited e-mail messages selling

products or services, promoting (potentially phony) business opportunities, or advertising offensive materials

For more information, check out:http://its.strose.edu/ViewArticle.aspx?page_id=74

Page 22: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Computer Ethics

What is computer ethics? Moral guidelines that govern the use of

computers, networks, and information systems

Unauthorized access and use Hardware, software, and information theft Information privacy Copyright Existence of inappropriate materials on the

Internet

Page 23: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Computer Ethics

U.S. government laws concerning privacy:

Page 24: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Computer Ethics

U.S. government laws concerning privacy (cont.):

Page 25: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Computer Ethics

U.S. government laws concerning privacy (cont.):

Page 26: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Objectionable Materials

What types of objectionable materials areavailable on the Internet? Racist, sexist, or otherwise discriminatory

materials Pornographic materials Gambling Web sites Age-restricted materials (e.g. cigarettes,

alcohol, etc.) Incorrect or inaccurate information

easy to identify

not so easy to identify

Page 27: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Objectionable Materials

Government initiatives Children’s Internet Protection Act (2000)

Protect children from obscene, pornographic, and other information considered harmful to minors

Filtering software prevents Web browsers from displaying materials from targeted sites or sites containing certain keywords

Page 28: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Objectionable Materials

Parental controls via rating systems Internet Content Rating Association (ICRA) Web browser

reads rating ofWeb pages,and reactsaccordingly

Page 29: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009

Objectionable Materials

Parental controls via filtering software Net Nanny

Relevantage groups?