14

Click here to load reader

Security Issues, Ethics, & Emerging Technologies in Education

Embed Size (px)

Citation preview

Page 1: Security Issues, Ethics, & Emerging Technologies in Education

Security Issues, Ethics, & Emerging Technologies in Education

Page 2: Security Issues, Ethics, & Emerging Technologies in Education

Learning Objectives Identify security risks that threaten home and school computers

Describe how computer viruses and malicious software programs work and steps you can take to prevent viruses

Describe different ways schools safeguard computers and networks

Explain why computer backup is important and how it is accomplished

Define what is meant by information privacy and its impact on schools

Identify the components of copyright that impact education

Describe the ethical issues related to Internet usage and steps schools are taking to address them

Page 3: Security Issues, Ethics, & Emerging Technologies in Education

Security Risks Computer Viruses

Unauthorized access & use

Information theft

Page 4: Security Issues, Ethics, & Emerging Technologies in Education

Security Risks Computer Viruses - Types

Boot Sector Virus

Loads into memory on boot

Infects targeted files

File Virus

Inserted code that effects a specific program

Infects targeted files

Macro Virus

Code within a program such as MS Excel or MS Word

Infects targeted files

Page 5: Security Issues, Ethics, & Emerging Technologies in Education

Security Risks Computer Viruses - Variations

Worms

Self-replicated file that sends itself to other nodes(computers) on a network

Trojan Horse

Looks like a legitimate program

Page 6: Security Issues, Ethics, & Emerging Technologies in Education

Security Risks Computer Viruses – Detection & Removal

Anti-Virus Software

Look for files that change / alter / act like known viruses

Repair infected files

Page 7: Security Issues, Ethics, & Emerging Technologies in Education

Security Risks Unauthorized access & use - Types

Hacker

Page 8: Security Issues, Ethics, & Emerging Technologies in Education

Security Risks Unauthorized access & use - Protection

Access Control

User Name

• Usually dictated by some protocol

Passwords

• Use combination of letters, digits, words, initials and dates

• Make the password at least 8 characters

• Add one or more numbers

• Use upper and lower case letters

Possessed Objects & Biometric Devise

• ID Cards

• Fingerprint readers

Page 9: Security Issues, Ethics, & Emerging Technologies in Education

Security Risks Unauthorized access & use - Protection

Firewall

Page 10: Security Issues, Ethics, & Emerging Technologies in Education

Safeguards Hardware

Software Software Piracy

EULA

Single-user

Multi-user

Network-user

Community/State-user

Data Encryption

Data Backup

Page 11: Security Issues, Ethics, & Emerging Technologies in Education

Ethics Moral Guidelines that govern the use of computers,

networks & information systems Information Privacy

Unauthorized collection & use of information

Phishing

Spam

Children’s Internet Protection Act (CIPA) Schools & public library‘s must protect children from obscene,

pornographic, and other information considered harmful to minors.

Page 12: Security Issues, Ethics, & Emerging Technologies in Education

Ethics Acceptable Use Policies

Internet Filters

Teacher Observation

Page 13: Security Issues, Ethics, & Emerging Technologies in Education

Copyright Laws Fair Use

Document, document, document

Ask for permission

Public Domain Use Royalty Free files

Clip-art

Audio Files