in Education
Chapter 8
Computer Security: Risks and Safeguards:
File virus- inserts virus code into program files, the virus then spreads to any program
that accesses the infected file.
Virus payload – the symptom or damage caused by a virus.
Boot sector virus- replaces boot program used to start the computer with a modified,
infected version of the boot program.
Macro virus- uses the macro language of an application, such as word processing or
a spreadsheet, to hide virus codes.
Worm- is a program that copies itself repeatedly in a computer’s memory or on a
network, using up resources and possibly shutting down the computer.
Trojan horse named after the Greek myth- is malicious software program that hides in
software you within or is designed to look like a legitimate program.
Computer Viruses:
Logic bomb – a program that activates when it detects a certain
condition. Computer security risk -
Any event that causes a
Time bomb- is a type of logic bomb activates on a certain date. loss of computer
For example: the M ichelangelo virus activated on March 6th (his b-day) Computer Crime- equipment, software, data
• Rootkit- is a program that hides in a computer and allows an illegal act and information, or
processing capability.
someone from a remote location to take full control of the involving a
computer. computer.
Virus Detection and Removal: Computer Security: Risks
Antivirus programs is designed to detect, disinfect, and protect computers and and Safeguards (con’t)
networks form viruses. Also known as vaccines.
Many options to using antivirus software and popular antivirus programs include:
Norton Antivirus.
McAfee Antivirus.
Rescue disk- is normally a CD that contains and uninfected copy of key
operating system commands and start-up information that enables the
computer to restart correctly.
Virus Hoax- False warnings about viruses often spread via e-mail and over
the internet, these warnings describe viruses that are not actually known to
exist.
Privacy Laws
A business or government agency collecting data about individuals should limit the information collected and only store what is
necessary to carry out the organization’s functions.
Organizations must restrict data access to those who must use it to perform job duties.
An organizations should release an individual’s personal information only after the individual has agreed to its disclosure.
An organization must inform the individual that it is collecting data and give her/him the opportunity to determine the accuracy
of the data.
Ethics and the Information Age (con’t)
Copyright Laws
Copyright – means the original author or creator of the work retains ownership of the work and has the exclusive right to
reproduce and distribute the creative work.
Three areas of copyright directly impact today’s classroom’s (1) illegal copying or using copyrighted software programs, (2) fair
use laws and their application to the use of both printed copyrighted materials and copyrighted materials accessible on the
Internet, and (3) use of copyrighted materials on teacher and student Web pages.
Fair use – The Copyright Act of 1976 established fair use and provided the guidelines that allow educators to use and copy
certain copyrighted materials for nonprofit educational purposes.
Teacher and student Web pages
Teachers and students in school districts all over the country are creating and
publishing heir own Web pages.
Copyright laws do protect all original created by students and teachers and
published on the Web.
Public domain Web sites – including software or creative works – is free from
copyright restrictions.
Internet Ethics and Objectionable Materials
Objectionable material on the internet, includes racist literature, obscene pictures and videos, gambling, and
age-restricted items such as cigarettes and alcohol.
There are three different types of Internet materials that fall under the general term objectionable material:
1. Pornographic material.
2. Racist literature, gambling.
3. Incorrect, inaccurate or inappropriate material and information.
Government Actions:
Children’s Internet Protection Act - protects children from obscene, pornographic, and other information
considered to be harmful to minors.
Parental Controls
Available in Windows and Mac operating systems.
Determine proper controls for children in different age groups.
Monitor child’s use of computer; filtering software programs.
Check Internet browser’s history.
Educational Controls
Acceptable Use Policies (AUP)
A notice that use of a network is a privilege, not a right, behave as if you are a guest on the Internet.
Rules concerning objectionable sites, and copyright issues.
Outline proper use of equipment, safety and personal information.
Consequences of violating rules.
Curriculum Resource Pages: is
a teacher-created document or
Web page that contains hyperlinks
to teacher selected and evaluated
Web sites:
Acts as guides for students.
Sites are pre-evaluated by
teachers.
Eliminates typing
mistakes when typing
URLs.
Teacher observation: or supervision permits teachers to monitor their students actively and
continuously while they are on the Internet.
Teacher observations is extremely important and, in most cases, the most
effective step in preventing students from accessing objectionable and
inappropriate materials on the internet.
Instruct students on use of back button on the browser.
All educators should understanding clearly the ethical issues and concepts for their
students and teach them to be ethical computer users.
Green Computing:
Involves reducing the use of electricity and the
production of environmental waste while using a
computer.
Society and schools have become aware of this
waste and are taking measures to combat it.
Health Issues:
Ergonomics – is an applied science devoted to
incorporating comfort, efficiency, and safety into the design
of items in the workplace.