54
Ying Wang EDN 303 Fall 2008

Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Embed Size (px)

Citation preview

Page 1: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ying Wang EDN 303Fall 2008

Page 2: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

ObjectivesIdentify security risks that threaten home and

school computersDescribe how computer viruses and malicious

software programs work and the steps you can take to prevent viruses

Describe different ways schools safeguard computers and networks

Explain why computer backup is important and how it is accomplished

Define what is meant by information privacy and its impact on schools

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2

Page 3: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

ObjectivesIdentify the components of copyright that

impact educationDescribe the ethical issues related to Internet

usage and steps schools are taking to address them

Identify safe and healthy uses of technology resources

Describe the emerging technologies that will transform traditional classrooms

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3

Page 4: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and safeguardsComputer security risk - Any event or action that

has the potential of causing a loss of computer equipment, software, data and information, or processing capability

Any illegal act involving a computer generally is referred to as a computer crime

Computer VirusesNew virus programs found every dayBoot sector virusFile virusWormTrojan horseMacro virus

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4

Page 5: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education5

Page 6: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education6

Page 7: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education7

Page 8: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsComputer Viruses

Logic bombTime bomb

Michelangelo virus

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8

Page 9: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Virus Detection and RemovalAntivirus programsPopular antivirus

programsMany options to using

antivirus softwareRescue disk

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education9

Computer Security: Risks and Safeguards

Page 10: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsUnauthorized Access

and UseCrackers and

hackersAccess controls

Identification Authentication

Selecting a password

Protecting your password

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education10

Page 11: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsPossessed Objects and Biometric Devices

A possessed object is any item that you must carry to gain access to a computer Badges, cards, smart cards, and keys

Personal Identification Number (PIN)Biometric devices authenticate a person’s

identity with a physical characteristic

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11

Page 12: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsFirewall

A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network

Proxy serverPersonal firewall

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12

Page 13: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13

Page 14: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsHardware Theft and Vandalism

Cable lock devicesPortable equipment warrants special

considerationsComputer vandalism

Cutting cables Deleting software Smashing computer

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14

Page 15: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsSoftware Theft

Software piracySoftware license

Single-user license Multiple-user Network license Community/State license

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15

Page 16: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsInformation Theft

Encryption Plain text Encrypted text

Encryption key

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education16

Page 17: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsSystem Failure

Undervoltage Brownout Blackout

Overvoltage (powersurge) Spike

Surge protector Surge protector with phone line protection

Uninterruptible power supply (UPS)

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17

Page 18: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Computer Security: Risks and SafeguardsBacking Up – The Ultimate Safeguard

Backup Duplicate of a file, program, or disk that may be

used if the original is lost, damaged, or destroyed Backup procedures policies in schools and school

districts Backup programs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18

Page 19: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ethics and the Information AgeComputer ethics

Moral guidelines that govern the use of computers, networks, and information systems

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19

Page 20: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education20

Page 21: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ethics and the Information AgeInformation Privacy

The right of individuals and organizations to deny or restrict the collection and use of information about them

Unauthorized collection and use of information Electronic profiles Federal and state laws

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21

Page 22: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education22

Page 23: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education23

Page 24: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ethics and the Information AgePhishing

Email attempting to obtain personal and financial information

SpamAn unsolicited e-mail mess or newsgroup posting

sent to many recipients or newsgroups at onceAverage user receives more than 1,000 spam e-

mail messages each yearAnti-spam campaignsAnti-spam program

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24

Page 25: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ethics and the Information AgePrivacy Laws

Business or government agencies should only collect information necessary to carry out their functions

Restrict data access to those who must use it to perform job duties

Release personal information only after agreement to disclosure by individual

Must inform the individual when collecting information

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25

Page 26: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ethics and the Information AgeEmployee and Student Monitoring

Use of computers to observe, record, view, and review an individual’s use of a computer

Policies of computer useAcceptable Use Policy (AUP)

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26

Page 27: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ethics and the Information AgeCopyright Laws

Copyright Act of 1976Illegal copyingFair use

Copyright information on Web pages

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27

Page 28: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education28

Page 29: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Ethics and the Information AgeCopyright Laws

Teacher and student Web pagesCopyright laws do

protect these pagesPublic domain Web

sitesCDs and DVDs with

images, graphics, audio, and video clips

Guidelines for creating Web pages

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education29

Page 30: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education30

Page 31: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable MaterialsThree categories of objectionable material

Pornographic materialRacist literature, gamblingIncorrect or inappropriate material

Inaccurate information

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31

Page 32: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable MaterialsRecent Government Actions

Children’s Internet Protection Act Protects children from obscene, pornographic, and

other information considered to be harmful to minors

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32

Page 33: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable Materials

Parental ControlsRating systems

ICRA

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education33

Page 34: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable Materials

Parental ControlsFiltering software

programs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education34

Page 35: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable MaterialsParental Controls

Filtering softwareCheck Internet browser’s history

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35

Page 36: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable MaterialsEducational Controls

Acceptable Use Policies (AUP) Use of network is a privilege, not a right Behave as if you are a guest on the Internet Rules concerning objectionable sites Rules concerning copyright issues Outline proper use of equipment Online safety and personal information Consequences of violating rules

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 36

Page 37: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education37

Page 38: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable MaterialsEducational Controls

Curriculum pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 38

Page 39: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Internet Ethics and Objectionable MaterialsEducational Controls

Teacher observation Final measure to prevent students from accessing

objectionable and inappropriate materials Instruct students on use of Back button on the

browser Understanding of ethical concepts

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 39

Page 40: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Health IssuesComputers and Health Issues

Musculoskeletal Disorder (MSD)Repetitive Strain Injury (RSI)Carpal Tunnel Syndrome (CTS)

Hand ExercisesComputer Vision Syndrome (CVS)

Techniques to ease eyestrain

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 40

Page 41: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Health IssuesErgonomics

An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 41

Page 42: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Emerging TechnologiesThe Web offers enormous potential for

expanding the classroom

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 42

Page 43: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Emerging TechnologiesThe World Wide Web

Most K-12 schools are on the InternetThe federal government is committed to high-

speed Internet access in every classroomSpeed will increaseFull-motion video on demandInstant access to Web-based educational

programs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 43

Page 44: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education44

Page 45: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Emerging TechnologiesEducational Software on DVD

Information, graphics, animations, video, and interactive links

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 45

Page 46: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Emerging TechnologiesAssistive Technologies

Technologies that modify or adapt the classroom for special learning needs

Individuals with Disabilities Act (IDEA) Amendment of 1997

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education46

Page 47: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Emerging TechnologiesFederal Accessibility Initiative

Technology should be available to people with disabilities

Section 508WebXACT

Text equivalents for all non-text elements Summaries of graphs and charts All information displayed in color available without

color

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 47

Page 48: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education48

Page 49: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Emerging TechnologiesWeb- and Video-Enhanced Digital Textbooks

Web site is continuously updated and maintained

Web-Based Distance LearningAll instruction provided via the WebStill evolvingUseful for specialized classes not available in

all schools

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 49

Page 50: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education50

Page 51: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Emerging TechnologiesWireless Technologies

Allows teachers and students to connect to a truly global network

Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction

Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 51

Page 52: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter SummaryIdentify security risks that threaten home and

school computersDescribe how computer viruses and malicious

software programs work and the steps you can take to prevent viruses

Describe different ways schools safeguard computers and networks

Explain why computer backup is important and how it is accomplished

Define what is meant by information privacy and its impact on schools

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 52

Page 53: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software

Chapter SummaryIdentify the components of copyright that impact

educationDescribe the ethical issues related to Internet

usage and steps schools are taking to address them

Identify safe and healthy uses of technology resources

Describe the emerging technologies that will transform traditional classrooms

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 53

Page 54: Ying Wang EDN 303 Fall 2008. Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software