33
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATIO N CHA PTER EIG HT P RESEN TATION Brock Williams William Cravey Amber Couch Erin Lynn

SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

Embed Size (px)

Citation preview

Page 1: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

SECURITY

ISSUES, E

THIC

S,

AND EMERGIN

G

TECHNOLO

GIES IN

EDUCATIO

N

CH

AP

TE

R E

I GH

T P

RE

SE

NT A

TI O

N

Brock Williams William CraveyAmber Couch

Erin Lynn Mullins

Page 2: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

COMPUTE

R SECURIT

Y:

RISKS A

ND SAFE

TY

GUARDS

2

Page 3: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

VIRUS

– a potentially damaging computer program designed to affect your computer negatively without your knowledge or permission by altering the way it works.

o Illegal computer code

o Can alter programs or destroy data

o Can copy itself onto programs to spread its effects

3

Page 4: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

VIRUS PAYLOAD

-the symptom or damage caused by a virus

- Can be harmless or can cause significant damage

4

Page 5: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

BOOT SECTOR VIRUS

– replaces the boot program used to start the computer with a modified, infected version of the boot program

- When the computer runs the infected boot program, it loads the virus into the computer’s memory

- This causes it to spread to any storage media inserted into the computer

5

Page 6: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

FILE VIRUS

– inserts virus code into program files

- Spreads to any program that accesses the infected file

6

Page 7: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

MACRO VIRUS

– uses the macro language of an application to hide virus codes

- If a document with an infected macro is opened, the virus loads into memory

- Certain actions, such as saving the document activate the virus

- Often are part of templates

7

Page 8: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

TWO COMMON VARIATIONS OF COMPUTER VIRUSES

- Worm – program that copies itself repeatedly in a computer’s memory or on a network

-Uses up resources and can potentially shut down a computer or network

-Creators of worms make them appealing to people so they’ll download them

- Trojan Horse – malicious software program that hides within or is designed to look like a legitimate program

8

Page 9: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

LOGIC BOMBS AND TIME BOMBS

• Logic bomb – a program that activates when it detects a certain condition.

• Time bomb – a type of logic bomb that activates on a particular date.

-Michelangelo virus – destroys data on your hard disk on March 6, the date of Michelangelo’s birthday.

9

Page 10: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

SAFE C

OMPUTI

NG TIP

S

10

Page 11: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

SAFE COMPUTING TIPS

- Purchase and install reliable antivirus software

- Scan all removable media

- Scan all files downloaded from the internet

- Scan all attached files before opening them

- Turn off e-mail preview

- Scan all software before using it, even if it is shrink-wrapped

- Do not use pirated, illegal copies of copyrighted software

- Never start your computer with removable media in the drives

- Install a personal firewall program to help protect against unwanted incoming attacks

- Back up your files often

- Set your antivirus program to scan automatically

11

Page 12: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

ANTIVIRUS PROGRAMS

- Using an antivirus program is one of the more effective ways to protect against computer viruses.

- An antivirus program is designed to detect, disinfect, and protect computers and networks from viruses.

- The programs work by looking for programs that attempt to modify the boot programs that normally are read from but not written to.

- Antivirus programs can be installed on personal computers and networks.

- A popular choice of software by most schools is Norton.

12

Page 13: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

RESCUE DISC

A rescue disc is normally a CD-ROM that contains an uninfected copy

of key operating system commands and start-up

information that enables the computer to restart correctly.

13

Page 14: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

UNAUTHORIZED ACCESS AND USE

- Unauthorized access is the use of a computer or network without permission.

- Individuals who tries to access a computer or network illegally is called a Hacker

- These individuals goal is to break into computers by logging into a server as a user and not only corrupt files but gain access to them.

- Unauthorized use is the use of a computer or data for unapproved or possibly illegal activities.

- Unauthorized users range from employee’s using a company computer for personal needs to someone gaining access to a bank system and completing an unauthorized transfer of funds.

14

Page 15: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

PERSONAL SETTINGS/ PARENTAL CONTROLS

- Block unwanted sites from popping up.

- Regulate what material (age appropriate) is viewed under certain users.

- Deny access to guest users of personal files and private material or information.

- Set up daily scans for antivirus programs to run while your not on the computer.

15

Page 16: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

ACCESS CONTROL

- One way to prevent unauthorized access to and use of computers is to implement access controls, which are security measures that define who can access a computer, when they can success it, and what actions they can take while using the computer.

- Most schools and businesses provide authorized users with unique user identifications (often called User ID and Password that allows them to log on to the network).

- Most home or personal computers offer this same security.

16

Page 17: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

FIREWALLS

- Despite efforts to protect the data on your computer’s hard disk, it still is vulnerable to attacks from hackers.

- A firewall is a security system consisting of hardware and software that prevents unauthorized access to data and information on a network.

- Many schools route all communications through a proxy server which screens all incoming and outgoing messages.

- Windows Vista/XP or Mac OS X already have personal firewall.

- Most routers have a firewall as well.

17

Page 18: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

HARDWARE/SOFTWARE THEFT

- Places with multiple computers and devices are susceptible to theft.

- Chain computers to desks .

- Lock up unused equipment and software.

- Software theft is a growing crime in America.

- Piracy is number 1 software thief in the world.

18

Page 19: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

ETHIC

S AND T

HE

INFO

RMATIO

N AGE

19

Page 20: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

ETHICS

Ethics are standards that determine whether an actions is good or bad.

Computer ethics:

1. Unauthorized use of computers

2. Hardware, software, and information theft.

3. Information privacy

4. Copyright

5. Existence of liable materials on the internet

20

Page 21: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

INFORMATION PRIVACY

Information privacy is the right of individuals and

organizations to deny or restrict the collection and use of information about them.

21

Page 22: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

UNAUTHORIZED COLLECTION AND USE OF INFORMATION

- Electronic profile

- Phishing

- Spam

- Spim

- Split

- E-mail filtering

- Antispam program

22

Page 23: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

PRIVACY LAWS

- Collected data about individuals limits the information that one can store.

- Data is restricted to only those who need it to perform their job duties.

- Release of personal information can be released after getting permission.

- Individual collected has to be given an opportunity for the person to determine accuracy.

23

Page 24: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

EMPLOYEE AND STUDENT MONITORING

- What is employee monitoring?

- What does Acceptable Use Policy mean?

24

Page 25: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

COPYRIGHT LAWS

- What is copyright?

- Three areas of copyright in today’s classroom:

- Illegal copying

- Use of printed and copyrighted materials via internet.

- Copyrighted materials on teacher and student Web pages.

25

Page 26: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

FAIR USE

- What is fair use?

- What all does fair use guidelines apply to?

26

Page 27: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

TEACHER AND STUDENT WEB PAGES

- Web publishing

- Public domain

27

Page 28: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

INTE

RNET ETH

ICS A

ND

OBJECTI

ONABLE

MATERIA

LS

28

Page 29: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

OBJECTIONABLE MATERIAL

- Pornographic Material

- Controversial Subjects

- Inappropriate Material for K-12 Students

29

Page 30: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

CHILDREN’S INTERNET PROTECTION ACT

- Passed in 2000 to protect children from obscene, pornographic, and other information considered harmful to minors.

- Required Filtering Systems- Only a very small percentage of the

internet is able to be accessed through K-12 computers.

30

Page 31: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

CYBERBULLYING

- The posting or sending of detrimental or cruel text or images using the Internet or other digital devices.

- Students , Teachers, and Faculty can all be victims.

31

Page 32: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

PARENTAL CONTROLS

- Parental Controls are available in Windows Vista/XP and Mac Operating Systems.

- Parental Options- Web Filter- Time Limits- Games- Allow and Block Specific Programs

- Internet Filtering Software , such as ‘Net Nanny’, are also available online

- Communication with your children is still the key to safety.

32

Page 33: SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins

EDUCATIONAL CONTROLS

- Filtering Software – Schools install these and constantly update them to keep them as current as possible.

- Acceptable Use Policies- Many schools require for parents or guardians to print, sign, and mail or deliver them to the school.

- Curriculum Pages- Teacher Observation

33