Anda di halaman 1dari 13

Security Issues and Ethics –

in Education
Chapter 8
Computer Security: Risks and Safeguards:
 File virus- inserts virus code into program files, the virus then spreads to any program
that accesses the infected file.
 Virus payload – the symptom or damage caused by a virus.
 Boot sector virus- replaces boot program used to start the computer with a modified,
infected version of the boot program.
 Macro virus- uses the macro language of an application, such as word processing or
a spreadsheet, to hide virus codes.
 Worm- is a program that copies itself repeatedly in a computer’s memory or on a
network, using up resources and possibly shutting down the computer.
 Trojan horse named after the Greek myth- is malicious software program that hides in
software you within or is designed to look like a legitimate program.

Virus is a potentially damaging computer program designed to affect


your company negatively without your knowledge or permission by
altering the way it works.

 Computer Viruses:
 Logic bomb – a program that activates when it detects a certain
condition.  Computer security risk -
Any event that causes a
 Time bomb- is a type of logic bomb activates on a certain date. loss of computer
For example: the M ichelangelo virus activated on March 6th (his b-day)  Computer Crime- equipment, software, data
• Rootkit- is a program that hides in a computer and allows an illegal act and information, or
processing capability.
someone from a remote location to take full control of the involving a
computer. computer.
Virus Detection and Removal: Computer Security: Risks
 Antivirus programs is designed to detect, disinfect, and protect computers and and Safeguards (con’t)
networks form viruses. Also known as vaccines.
 Many options to using antivirus software and popular antivirus programs include:
 Norton Antivirus.
 McAfee Antivirus.
 Rescue disk- is normally a CD that contains and uninfected copy of key
operating system commands and start-up information that enables the
computer to restart correctly.
 Virus Hoax- False warnings about viruses often spread via e-mail and over
the internet, these warnings describe viruses that are not actually known to
exist.

 Unauthorized Access and Use


 Crackers or hackers- an individual who tries to access a computer or network illegally.
 Unauthorized use – is the use of a computer or data for unapproved or possibly illegal
activities.
 Access controls- to prevent unauthorized use and access sensitive information, schools install
different levels and types of access controls.
 Selecting a password or user ID
 Combination of letters, digits, words, initials, dates
 Always protect your password or log on id.
Computer Security: Risks and Safeguards (con’t)
 Possessed Objects and Biometric Devices
 A possessed object is any item that you must carry to gain access to a
computer or computer facility
Examples include: Badges, cards, smart cards, and keys
 Personal Identification Number (PIN)
 Biometric devices authenticate a person’s identity with a personal
characteristic such as finger print

 Firewall – is a security system consisting of hardware and/or software that


prevents unauthorized access to data and information on a network.
 Schools - use firewalls to deny network access to outsiders and to restrict
both student and teacher access to sensitive data.
 Proxy server- screens all ingoing and outgoing messages.
 Personal firewall – is a software program that detects and protects your
personal computer and its data form unauthorized intrusions.

 Hardware Theft and Vandalism


 Schools can implement a variety of security precautions.
 Cables that lock computers to a desk, cabinet, or floor.
 Computer vandalism - takes many forms, from a student cutting
cables or deleting files to individuals breaking into a school and
randomly smashing computers.
 Software Theft - Like hardware theft and
vandalism, software theft many forms – from
a student physically stealing a CD to
intentional piracy of software.
 Software piracy – is the unauthorized
and illegal duplication of copyrighted
software.
 Software license – is an agreement
that provides specific conditions for use
of the software, which users must
accept before using the software.

Computer Security: Risks and Safeguards (con’t)

 Information Theft – typically occurs for a variety of reasons –


organizations steal or buy stolen information to learn about
competitors and individuals steal credit card and telephone charge
card numbers to make purchases.
• Encryption- is the process of converting readable data into
unreadable characters by applying a formula that uses a code.
• Encryption key – the “code” both sender and receiver must
have.
 System Failure – which is a malfunction of a computer. System failures occur because of
electrical power problems, hardware component failure, or software error.
• Under voltage – occurs when the electrical power supply drops.
• Brownout – is a prolonged an under voltage
• Blackout – is complete power failure.
• Over voltage or power surge - occurs when the incoming electrical power increases significantly
above the normal 120 volts.
• Spike – momentary over voltage.
• Surge protector – is a device that uses special electrical components to smooth out minor voltage
errors, provide a stable current flow, and keep and over voltage from damaging computer
equipment.
• Uninterruptible power supply (UPS) – is a device that contains surge protection circuits and one
or more batteries that provide power during a temporary or permanent loss of power.

Computer Security: Risks and Safeguards (con’t)

 Backing Up – The Ultimate Safeguard:


 Backup – is a duplicate of a file, program, or disk that can be used if the original is
lost, damaged, or destroyed.
 Most schools have backup procedures policies that outline a regular plan of
copying and backing up important data and files.
Ethics and the Information Age
 Computer ethics – are moral guidelines that govern the use of computers, networks, and information system.
 Five areas of computer ethics frequently discussed (1) unauthorized use of computers, (2) hardware,
software, and information theft, (3) information privacy, (4) copyright, and (5) existence of objectionable
materials on the Internet.
 Information Privacy – is the right of individuals and organizations to deny or
restrict the collection and use of information about them.
 Unauthorized collection and use of information:
 Electronic profiles- combining this acquired data with other
information obtained from public sources, such as driver’s licenses
and vehicle registration, national marketing organizations create.

 Phishing – is a scam in which a perpetrator sends an official-looking email that


attempts to obtain personal and financial information from the recipient.
 Spam – is an unsolicited e-mail message or newsgroup posting sent to many
recipients at once.
 Average user receives more than 1,000 spam e-mail messages each year.
 Spam sent through instant messaging is called spim.
 Spam sent via Internet Telephony is called split.
 Email filtering is a service that blocks email messages from designated sources. You
can block unwanted e-mail messages by using an antispam program that attempts to
remove spam before it reaches your inbox.

 Privacy Laws
 A business or government agency collecting data about individuals should limit the information collected and only store what is
necessary to carry out the organization’s functions.
 Organizations must restrict data access to those who must use it to perform job duties.
 An organizations should release an individual’s personal information only after the individual has agreed to its disclosure.
 An organization must inform the individual that it is collecting data and give her/him the opportunity to determine the accuracy
of the data.
Ethics and the Information Age (con’t)

 Employee and Student Monitoring - uses computers to observe, record,


view, and review an individual’s use of a computer, including communications
such as e-mail, keyboard activity (used to measure productivity), and Internet
sites visited.
 Acceptable Use Policy (AUP) – provides specific guidance for using
school computers, networks, and the Internet.

 Copyright Laws
 Copyright – means the original author or creator of the work retains ownership of the work and has the exclusive right to
reproduce and distribute the creative work.
 Three areas of copyright directly impact today’s classroom’s (1) illegal copying or using copyrighted software programs, (2) fair
use laws and their application to the use of both printed copyrighted materials and copyrighted materials accessible on the
Internet, and (3) use of copyrighted materials on teacher and student Web pages.
 Fair use – The Copyright Act of 1976 established fair use and provided the guidelines that allow educators to use and copy
certain copyrighted materials for nonprofit educational purposes.
 Teacher and student Web pages
 Teachers and students in school districts all over the country are creating and
publishing heir own Web pages.
 Copyright laws do protect all original created by students and teachers and
published on the Web.
 Public domain Web sites – including software or creative works – is free from
copyright restrictions.
Internet Ethics and Objectionable Materials

Objectionable material on the internet, includes racist literature, obscene pictures and videos, gambling, and
age-restricted items such as cigarettes and alcohol.
 There are three different types of Internet materials that fall under the general term objectionable material:
1. Pornographic material.
2. Racist literature, gambling.
3. Incorrect, inaccurate or inappropriate material and information.

 Government Actions:
 Children’s Internet Protection Act - protects children from obscene, pornographic, and other information
considered to be harmful to minors.

 Parental Controls
 Available in Windows and Mac operating systems.
 Determine proper controls for children in different age groups.
 Monitor child’s use of computer; filtering software programs.
 Check Internet browser’s history.

 Educational Controls
 Acceptable Use Policies (AUP)
 A notice that use of a network is a privilege, not a right, behave as if you are a guest on the Internet.
 Rules concerning objectionable sites, and copyright issues.
 Outline proper use of equipment, safety and personal information.
 Consequences of violating rules.
 Curriculum Resource Pages: is
a teacher-created document or
Web page that contains hyperlinks
to teacher selected and evaluated
Web sites:
 Acts as guides for students.
 Sites are pre-evaluated by
teachers.
 Eliminates typing
mistakes when typing
URLs.

 Teacher observation: or supervision permits teachers to monitor their students actively and
continuously while they are on the Internet.
 Teacher observations is extremely important and, in most cases, the most
effective step in preventing students from accessing objectionable and
inappropriate materials on the internet.
 Instruct students on use of back button on the browser.
 All educators should understanding clearly the ethical issues and concepts for their
students and teach them to be ethical computer users.
Green Computing:
 Involves reducing the use of electricity and the
production of environmental waste while using a
computer.
 Society and schools have become aware of this
waste and are taking measures to combat it.
Health Issues:
 Ergonomics – is an applied science devoted to
incorporating comfort, efficiency, and safety into the design
of items in the workplace.

Computers and Health Issues:


 Musculoskeletal disorder (MSD) also called repetitive strain injury (RSI) –
is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
 The largest job-related injury and illness problems in the United States
today are repetitive strain injuries.
 Carpal Tunnel Syndrome (CTS) also called tendonitis – is inflammation of a
tendon due to some repeated motion or stress on the tendon. CTS is
inflammation of the nerve that connects the forearm to the palm of the wrist.
 Computer Vision Syndrome (CVS) – health related issues include: tired,
sore, burning, itching, or dry eyes.
Summary of Security Issues and Ethics in Education: Summary for Chapter Eight
• The livelihood of businesses, schools, and individuals depends on the computers
and networks in use every days.
• This increased reliance on computers and information sent over networks makes
it essential to take steps to protect the systems and information from known risks.
• At the same time, employees, teachers, and students also have an obligation to
use computers responsibly and not abuse the power computers provide.
• Educational technologies are tools, and their effectiveness is determined by the
knowledge, skill, experience, level of training, and ethics of the user.
• The educational technology knowledge you acquire should help you participate
more effectively in decisions on how to use computers and other educational
technologies, and how to use the Internet efficiently and ethically.

Summary of Teachers Discovering Computers:

• To be effective in using educational technology in their classrooms,


teachers must be computer literate, information literature, and most
importantly, integration literate.
• The textbook provided the knowledge and skills in all three areas, What
you have learned is only a beginning .
• You must continuously update your technology and technology integration
skills so you can use and integrate technology into your curriculum and in
so doing influence future generation in immensely positive ways.

Anda mungkin juga menyukai