Upload
gordon-garrett
View
215
Download
1
Tags:
Embed Size (px)
Citation preview
Ying Wang EDN 303Fall 2008
ObjectivesIdentify security risks that threaten home and
school computersDescribe how computer viruses and malicious
software programs work and the steps you can take to prevent viruses
Describe different ways schools safeguard computers and networks
Explain why computer backup is important and how it is accomplished
Define what is meant by information privacy and its impact on schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2
ObjectivesIdentify the components of copyright that
impact educationDescribe the ethical issues related to Internet
usage and steps schools are taking to address them
Identify safe and healthy uses of technology resources
Describe the emerging technologies that will transform traditional classrooms
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3
Computer Security: Risks and safeguardsComputer security risk - Any event or action that
has the potential of causing a loss of computer equipment, software, data and information, or processing capability
Any illegal act involving a computer generally is referred to as a computer crime
Computer VirusesNew virus programs found every dayBoot sector virusFile virusWormTrojan horseMacro virus
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education5
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education6
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education7
Computer Security: Risks and SafeguardsComputer Viruses
Logic bombTime bomb
Michelangelo virus
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8
Virus Detection and RemovalAntivirus programsPopular antivirus
programsMany options to using
antivirus softwareRescue disk
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education9
Computer Security: Risks and Safeguards
Computer Security: Risks and SafeguardsUnauthorized Access
and UseCrackers and
hackersAccess controls
Identification Authentication
Selecting a password
Protecting your password
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education10
Computer Security: Risks and SafeguardsPossessed Objects and Biometric Devices
A possessed object is any item that you must carry to gain access to a computer Badges, cards, smart cards, and keys
Personal Identification Number (PIN)Biometric devices authenticate a person’s
identity with a physical characteristic
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11
Computer Security: Risks and SafeguardsFirewall
A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network
Proxy serverPersonal firewall
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13
Computer Security: Risks and SafeguardsHardware Theft and Vandalism
Cable lock devicesPortable equipment warrants special
considerationsComputer vandalism
Cutting cables Deleting software Smashing computer
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14
Computer Security: Risks and SafeguardsSoftware Theft
Software piracySoftware license
Single-user license Multiple-user Network license Community/State license
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15
Computer Security: Risks and SafeguardsInformation Theft
Encryption Plain text Encrypted text
Encryption key
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education16
Computer Security: Risks and SafeguardsSystem Failure
Undervoltage Brownout Blackout
Overvoltage (powersurge) Spike
Surge protector Surge protector with phone line protection
Uninterruptible power supply (UPS)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17
Computer Security: Risks and SafeguardsBacking Up – The Ultimate Safeguard
Backup Duplicate of a file, program, or disk that may be
used if the original is lost, damaged, or destroyed Backup procedures policies in schools and school
districts Backup programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18
Ethics and the Information AgeComputer ethics
Moral guidelines that govern the use of computers, networks, and information systems
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education20
Ethics and the Information AgeInformation Privacy
The right of individuals and organizations to deny or restrict the collection and use of information about them
Unauthorized collection and use of information Electronic profiles Federal and state laws
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education22
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education23
Ethics and the Information AgePhishing
Email attempting to obtain personal and financial information
SpamAn unsolicited e-mail mess or newsgroup posting
sent to many recipients or newsgroups at onceAverage user receives more than 1,000 spam e-
mail messages each yearAnti-spam campaignsAnti-spam program
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24
Ethics and the Information AgePrivacy Laws
Business or government agencies should only collect information necessary to carry out their functions
Restrict data access to those who must use it to perform job duties
Release personal information only after agreement to disclosure by individual
Must inform the individual when collecting information
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25
Ethics and the Information AgeEmployee and Student Monitoring
Use of computers to observe, record, view, and review an individual’s use of a computer
Policies of computer useAcceptable Use Policy (AUP)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26
Ethics and the Information AgeCopyright Laws
Copyright Act of 1976Illegal copyingFair use
Copyright information on Web pages
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education28
Ethics and the Information AgeCopyright Laws
Teacher and student Web pagesCopyright laws do
protect these pagesPublic domain Web
sitesCDs and DVDs with
images, graphics, audio, and video clips
Guidelines for creating Web pages
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education29
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education30
Internet Ethics and Objectionable MaterialsThree categories of objectionable material
Pornographic materialRacist literature, gamblingIncorrect or inappropriate material
Inaccurate information
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31
Internet Ethics and Objectionable MaterialsRecent Government Actions
Children’s Internet Protection Act Protects children from obscene, pornographic, and
other information considered to be harmful to minors
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32
Internet Ethics and Objectionable Materials
Parental ControlsRating systems
ICRA
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education33
Internet Ethics and Objectionable Materials
Parental ControlsFiltering software
programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education34
Internet Ethics and Objectionable MaterialsParental Controls
Filtering softwareCheck Internet browser’s history
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35
Internet Ethics and Objectionable MaterialsEducational Controls
Acceptable Use Policies (AUP) Use of network is a privilege, not a right Behave as if you are a guest on the Internet Rules concerning objectionable sites Rules concerning copyright issues Outline proper use of equipment Online safety and personal information Consequences of violating rules
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 36
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education37
Internet Ethics and Objectionable MaterialsEducational Controls
Curriculum pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 38
Internet Ethics and Objectionable MaterialsEducational Controls
Teacher observation Final measure to prevent students from accessing
objectionable and inappropriate materials Instruct students on use of Back button on the
browser Understanding of ethical concepts
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 39
Health IssuesComputers and Health Issues
Musculoskeletal Disorder (MSD)Repetitive Strain Injury (RSI)Carpal Tunnel Syndrome (CTS)
Hand ExercisesComputer Vision Syndrome (CVS)
Techniques to ease eyestrain
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 40
Health IssuesErgonomics
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 41
Emerging TechnologiesThe Web offers enormous potential for
expanding the classroom
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 42
Emerging TechnologiesThe World Wide Web
Most K-12 schools are on the InternetThe federal government is committed to high-
speed Internet access in every classroomSpeed will increaseFull-motion video on demandInstant access to Web-based educational
programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 43
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education44
Emerging TechnologiesEducational Software on DVD
Information, graphics, animations, video, and interactive links
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 45
Emerging TechnologiesAssistive Technologies
Technologies that modify or adapt the classroom for special learning needs
Individuals with Disabilities Act (IDEA) Amendment of 1997
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education46
Emerging TechnologiesFederal Accessibility Initiative
Technology should be available to people with disabilities
Section 508WebXACT
Text equivalents for all non-text elements Summaries of graphs and charts All information displayed in color available without
color
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 47
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education48
Emerging TechnologiesWeb- and Video-Enhanced Digital Textbooks
Web site is continuously updated and maintained
Web-Based Distance LearningAll instruction provided via the WebStill evolvingUseful for specialized classes not available in
all schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 49
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education50
Emerging TechnologiesWireless Technologies
Allows teachers and students to connect to a truly global network
Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction
Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 51
Chapter SummaryIdentify security risks that threaten home and
school computersDescribe how computer viruses and malicious
software programs work and the steps you can take to prevent viruses
Describe different ways schools safeguard computers and networks
Explain why computer backup is important and how it is accomplished
Define what is meant by information privacy and its impact on schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 52
Chapter SummaryIdentify the components of copyright that impact
educationDescribe the ethical issues related to Internet
usage and steps schools are taking to address them
Identify safe and healthy uses of technology resources
Describe the emerging technologies that will transform traditional classrooms
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 53