EducationalComputing
David Goldschmidt, Ph.D.Computer Science
The College of Saint Rose
CIS 204Spring 2009
Web Site Design Process Steps to building a Web site:
Define objectives and intended audience of the Web site
Select the content to be presented Determine the navigational structure and layout Construct the individual Web pages Test your Web site (proofread content, verify
links) Obtain server space and a URL Publish (FTP), then publicize, your Web site Keep Web page content up-to-date
Local Area Networks
Local Area Network (LAN) is a networkof machines coveringa limited geographicalarea
Metropolitan AreaNetwork (MAN)covers more denselypopulated area
Wide Area Networks
Wide Area Network(WAN) covers multiplelocations Each location consists
of a LAN or MAN
LANs and WANs areoften private networks
Firewalls
What is a firewall ? A security system that prevents
unauthorized access to data and information on a network or computer
Prohibits accessfrom the InternetInternet
Computer Security
What is computer security risk? Any event or action that has the potential of
causing a loss or theft of computer equipment, software, data, information, or processing capability
What is computer crime? Examples? Any illegal act involving a computer e.g. unauthorized access, information/identity
theft, viruses, online predators, etc.
Acceptable Use Policies (AUP)
What is an acceptable use policy? Rules that govern the use of school and
school district computers, networks, and the Internet....
Rules concerning objectionable materials Rules concerning copyright Guidelines for proper use Guidelines for online safety of
personal information Consequences of breaking
the rules
Unauthorized Access and Use
What is unauthorized access? Accessing a computer
or network withoutpermission
What is unauthorized use? Using a computer or
data for unapprovedor illegal activities
protecting against unauthorized access
how do you best select a password?
Viruses
What is a computer virus? An illegal computer program that is
potentially damaging to your computer May cause corruption
or loss of data May cause software
to malfunction or asystem meltdown
May be a harmless prank
Viruses
Viruses
Antivirus Software
Antivirus software detects, disinfects, and protects computers and networks from viruses
Antivirus Software
How does antivirus software work? Detects programs attempting to write
new data to the boot program, theoperating system, etc.
Scans for known virus programs Information about known viruses
are downloaded frequently(daily or weekly)
Hardware Theft
Safeguard against hardware theft Keep equipment locked up Security systems (e.g. alarms, video
monitoring) Physical security devices
(e.g. cables, locks, etc.) Tracking device
Software Theft
What is software theft? Stealing software by stealing CDs or other
media, or illegally downloading and copying software
When software is purchased, the buyer typicallydoes not own the software! Instead, the buyer has
purchased the right touse the software
software license agreement
(must accept during installation)
Software Licenses
End-user license agreement (EULA) User may install software on only one
computer Or sometimes on one desktop and one laptop
computer User may not install software on a network
for multi-user use User may make one copy of software for
backup purposes User may not give copies to friends and
colleagues
Software Licenses
also freeware or shareware
Information Theft
Information and identity theft havebecome growing concerns Theft of credit card or bank account numbers Theft of social security numbers Theft of other private information
e.g. financial aid, grades, courses, library records, etc.
How can a school, organization, or individualprevent information theft?
Information Theft
Organizations can prevent information theft by: Not storing sensitive data (e.g. credit card
numbers, social security numbers) Encrypting data
that is stored Maintaining firewalls
and other networksecurity measures
Phishing
What is phishing? A scam in which an official-looking e-mail
or Web site attempts toobtain personalinformation
an attempt to bring you toa phony Web site and stealyour personal information
Spam
What is spam? Unsolicited e-mail messages selling
products or services, promoting (potentially phony) business opportunities, or advertising offensive materials
For more information, check out:http://its.strose.edu/ViewArticle.aspx?page_id=74
Computer Ethics
What is computer ethics? Moral guidelines that govern the use of
computers, networks, and information systems
Unauthorized access and use Hardware, software, and information theft Information privacy Copyright Existence of inappropriate materials on the
Internet
Computer Ethics
U.S. government laws concerning privacy:
Computer Ethics
U.S. government laws concerning privacy (cont.):
Computer Ethics
U.S. government laws concerning privacy (cont.):
Objectionable Materials
What types of objectionable materials areavailable on the Internet? Racist, sexist, or otherwise discriminatory
materials Pornographic materials Gambling Web sites Age-restricted materials (e.g. cigarettes,
alcohol, etc.) Incorrect or inaccurate information
easy to identify
not so easy to identify
Objectionable Materials
Government initiatives Children’s Internet Protection Act (2000)
Protect children from obscene, pornographic, and other information considered harmful to minors
Filtering software prevents Web browsers from displaying materials from targeted sites or sites containing certain keywords
Objectionable Materials
Parental controls via rating systems Internet Content Rating Association (ICRA) Web browser
reads rating ofWeb pages,and reactsaccordingly
Objectionable Materials
Parental controls via filtering software Net Nanny
Relevantage groups?