13
Security Issues and Ethics in Education Chapter 8

Security issues ethics in education chapter 8

Embed Size (px)

Citation preview

Page 1: Security issues ethics in education chapter 8

Security Issues and Ethics – in Education

Chapter 8

Page 2: Security issues ethics in education chapter 8

Computer security risk - Any event that causes a

loss of computer equipment, software, data

and information, or processing capability. 

Computer Viruses: Logic bomb – a program that activates when it detects a certain

condition. Time bomb- is a type of logic bomb activates on a certain date.For example: the M ichelangelo virus activated on March 6th (his b-

day)• Rootkit- is a program that hides in a computer and allows

someone from a remote location to take full control of the computer.

Computer Crime- an illegal act involving a computer.

File virus- inserts virus code into program files, the virus then spreads to any program that accesses the infected file.

Virus payload – the symptom or damage caused by a virus. Boot sector virus- replaces boot program used to start the computer with a modified,

infected version of the boot program. Macro virus- uses the macro language of an application, such as word processing or

a spreadsheet, to hide virus codes. Worm- is a program that copies itself repeatedly in a computer’s memory or on a

network, using up resources and possibly shutting down the computer. Trojan horse named after the Greek myth- is malicious software program that hides in

software you within or is designed to look like a legitimate program.

Computer Security: Risks and Safeguards:

Virus is a potentially damaging computer program designed to affect your company negatively without your knowledge or permission by

altering the way it works.

Page 3: Security issues ethics in education chapter 8

Virus Detection and Removal: Antivirus programs is designed to detect, disinfect, and protect computers and

networks form viruses. Also known as vaccines. Many options to using antivirus software and popular antivirus programs include:

Norton Antivirus. McAfee Antivirus.

Rescue disk- is normally a CD that contains and uninfected copy of key operating system commands and start-up information that enables the computer to restart correctly.

Virus Hoax- False warnings about viruses often spread via e-mail and over the internet, these warnings describe viruses that are not actually known to exist.

Unauthorized Access and Use Crackers or hackers- an individual who tries to access a computer or network illegally. Unauthorized use – is the use of a computer or data for unapproved or possibly illegal

activities. Access controls- to prevent unauthorized use and access sensitive information, schools install

different levels and types of access controls. Selecting a password or user ID

Combination of letters, digits, words, initials, dates Always protect your password or log on id.

Computer Security: Risks and Safeguards (con’t)

Page 4: Security issues ethics in education chapter 8

Possessed Objects and Biometric Devices A possessed object is any item that you must carry to gain access to a

computer or computer facilityExamples include: Badges, cards, smart cards, and keys

Personal Identification Number (PIN) Biometric devices authenticate a person’s identity with a personal

characteristic such as finger print

Firewall – is a security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network. Schools - use firewalls to deny network access to outsiders and to restrict

both student and teacher access to sensitive data. Proxy server- screens all ingoing and outgoing messages. Personal firewall – is a software program that detects and protects your

personal computer and its data form unauthorized intrusions.

Hardware Theft and Vandalism Schools can implement a variety of security precautions.

Cables that lock computers to a desk, cabinet, or floor. Computer vandalism - takes many forms, from a student cutting

cables or deleting files to individuals breaking into a school and randomly smashing computers.

Computer Security: Risks and Safeguards (con’t)

Page 5: Security issues ethics in education chapter 8

Information Theft – typically occurs for a variety of reasons – organizations steal or buy stolen information to learn about competitors and individuals steal credit card and telephone charge card numbers to make purchases.

• Encryption- is the process of converting readable data into unreadable characters by applying a formula that uses a code.

• Encryption key – the “code” both sender and receiver must have.

Software Theft - Like hardware theft and vandalism, software theft many forms – from a student physically stealing a CD to intentional piracy of software. Software piracy – is the unauthorized

and illegal duplication of copyrighted software.

Software license – is an agreement that provides specific conditions for use of the software, which users must accept before using the software.

Computer Security: Risks and Safeguards (con’t)

Page 6: Security issues ethics in education chapter 8

Backing Up – The Ultimate Safeguard: Backup – is a duplicate of a file, program, or disk that can be used if the original is

lost, damaged, or destroyed. Most schools have backup procedures policies that outline a regular plan of

copying and backing up important data and files.

Computer Security: Risks and Safeguards (con’t)

System Failure – which is a malfunction of a computer. System failures occur because of electrical power problems, hardware component failure, or software error.

• Under voltage – occurs when the electrical power supply drops.• Brownout – is a prolonged an under voltage• Blackout – is complete power failure.• Over voltage or power surge - occurs when the incoming electrical power increases significantly

above the normal 120 volts. • Spike – momentary over voltage.• Surge protector – is a device that uses special electrical components to smooth out minor voltage

errors, provide a stable current flow, and keep and over voltage from damaging computer equipment.

• Uninterruptible power supply (UPS) – is a device that contains surge protection circuits and one or more batteries that provide power during a temporary or permanent loss of power.

Page 7: Security issues ethics in education chapter 8

Ethics and the Information Age  Computer ethics – are moral guidelines that govern the use of computers, networks, and information system.

Five areas of computer ethics frequently discussed (1) unauthorized use of computers, (2) hardware, software, and information theft, (3) information privacy, (4) copyright, and (5) existence of objectionable materials on the Internet.

  Information Privacy – is the right of individuals and organizations to deny or restrict the collection and use of information about them.

Unauthorized collection and use of information: Electronic profiles- combining this acquired data with other

information obtained from public sources, such as driver’s licenses and vehicle registration, national marketing organizations create.

Phishing – is a scam in which a perpetrator sends an official-looking email that attempts to obtain personal and financial information from the recipient.

Spam – is an unsolicited e-mail message or newsgroup posting sent to many recipients at once. Average user receives more than 1,000 spam e-mail messages each year. Spam sent through instant messaging is called spim. Spam sent via Internet Telephony is called split.

Email filtering is a service that blocks email messages from designated sources. You can block unwanted e-mail messages by using an antispam program that attempts to remove spam before it reaches your inbox.

Privacy Laws A business or government agency collecting data about individuals should limit the information collected and only store what is

necessary to carry out the organization’s functions. Organizations must restrict data access to those who must use it to perform job duties. An organizations should release an individual’s personal information only after the individual has agreed to its disclosure. An organization must inform the individual that it is collecting data and give her/him the opportunity to determine the accuracy

of the data.

Page 8: Security issues ethics in education chapter 8

Employee and Student Monitoring - uses computers to observe, record, view, and review an individual’s use of a computer, including communications such as e-mail, keyboard activity (used to measure productivity), and Internet sites visited. Acceptable Use Policy (AUP) – provides specific guidance for using

school computers, networks, and the Internet.  

Copyright Laws Copyright – means the original author or creator of the work retains ownership of the work and has the exclusive right to

reproduce and distribute the creative work. Three areas of copyright directly impact today’s classroom’s (1) illegal copying or using copyrighted software programs, (2) fair

use laws and their application to the use of both printed copyrighted materials and copyrighted materials accessible on the Internet, and (3) use of copyrighted materials on teacher and student Web pages.

Fair use – The Copyright Act of 1976 established fair use and provided the guidelines that allow educators to use and copy certain copyrighted materials for nonprofit educational purposes.

   Teacher and student Web pages

Teachers and students in school districts all over the country are creating and publishing heir own Web pages.

Copyright laws do protect all original created by students and teachers and published on the Web.

Public domain Web sites – including software or creative works – is free from copyright restrictions.

Ethics and the Information Age (con’t)

Page 9: Security issues ethics in education chapter 8

Internet Ethics and Objectionable Materials

Objectionable material on the internet, includes racist literature, obscene pictures and videos, gambling, and age-restricted items such as cigarettes and alcohol. There are three different types of Internet materials that fall under the general term objectionable material: 1. Pornographic material.2. Racist literature, gambling. 3. Incorrect, inaccurate or inappropriate material and information.

Government Actions: Children’s Internet Protection Act - protects children from obscene, pornographic, and other information

considered to be harmful to minors.

Parental Controls Available in Windows and Mac operating systems. Determine proper controls for children in different age groups. Monitor child’s use of computer; filtering software programs. Check Internet browser’s history.

Educational Controls Acceptable Use Policies (AUP)

A notice that use of a network is a privilege, not a right, behave as if you are a guest on the Internet. Rules concerning objectionable sites, and copyright issues. Outline proper use of equipment, safety and personal information. Consequences of violating rules.

Page 10: Security issues ethics in education chapter 8

Curriculum Resource Pages: is a teacher-created document or Web page that contains hyperlinks to teacher selected and evaluated Web sites:

Acts as guides for students. Sites are pre-evaluated by

teachers. Eliminates typing

mistakes when typing URLs.

Teacher observation: or supervision permits teachers to monitor their students actively and continuously while they are on the Internet.

Teacher observations is extremely important and, in most cases, the most effective step in preventing students from accessing objectionable and inappropriate materials on the internet.

Instruct students on use of back button on the browser. All educators should understanding clearly the ethical issues and concepts for their

students and teach them to be ethical computer users.

Page 11: Security issues ethics in education chapter 8

Green Computing: Involves reducing the use of electricity and the

production of environmental waste while using a computer.

Society and schools have become aware of this waste and are taking measures to combat it.

Page 12: Security issues ethics in education chapter 8

Computers and Health Issues: Musculoskeletal disorder (MSD) also called repetitive strain injury (RSI) –

is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. The largest job-related injury and illness problems in the United States

today are repetitive strain injuries. Carpal Tunnel Syndrome (CTS) also called tendonitis – is inflammation of a

tendon due to some repeated motion or stress on the tendon. CTS is inflammation of the nerve that connects the forearm to the palm of the wrist.

Computer Vision Syndrome (CVS) – health related issues include: tired, sore, burning, itching, or dry eyes.

Ergonomics – is an applied science devoted to incorporating comfort, efficiency, and safety into the design

of items in the workplace.

Health Issues:

Page 13: Security issues ethics in education chapter 8

Summary for Chapter Eight

Summary of Teachers Discovering Computers:

• To be effective in using educational technology in their classrooms, teachers must be computer literate, information literature, and most importantly, integration literate.

• The textbook provided the knowledge and skills in all three areas, What you have learned is only a beginning .

• You must continuously update your technology and technology integration skills so you can use and integrate technology into your curriculum and in so doing influence future generation in immensely positive ways.

Summary of Security Issues and Ethics in Education:

• The livelihood of businesses, schools, and individuals depends on the computers and networks in use every days.

• This increased reliance on computers and information sent over networks makes it essential to take steps to protect the systems and information from known risks.

• At the same time, employees, teachers, and students also have an obligation to use computers responsibly and not abuse the power computers provide.

• Educational technologies are tools, and their effectiveness is determined by the knowledge, skill, experience, level of training, and ethics of the user.

• The educational technology knowledge you acquire should help you participate more effectively in decisions on how to use computers and other educational technologies, and how to use the Internet efficiently and ethically.