Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

19
Chapter 8 Chapter 8 Security Security Issues and Issues and Ethics in Ethics in Education Education Chelsea Peugh Chelsea Evans

Transcript of Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Page 1: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Chapter 8Chapter 8

Security Issues and Security Issues and Ethics in EducationEthics in Education

Chelsea Peugh

Chelsea Evans

Page 2: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

With the growing use of technology, it is With the growing use of technology, it is important to ensure that computers and important to ensure that computers and software are protected from loss, software are protected from loss, damage, and misuse. This chapter helps damage, and misuse. This chapter helps identify risks to computers and software, identify risks to computers and software, and what you can do to minimize these and what you can do to minimize these risks.risks.

Page 3: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Computer security risk – any event or Computer security risk – any event or action that has the potential of causing a action that has the potential of causing a loss of computer equipment, software, loss of computer equipment, software, data and information, or processing data and information, or processing capability.capability.

One of these risks, such as viruses, are a One of these risks, such as viruses, are a result of deliberate acts that are against result of deliberate acts that are against the law. Any illegal act involving a the law. Any illegal act involving a computer, such as this, is referred to as a computer, such as this, is referred to as a computer crime.computer crime.

Page 4: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

VIRUSESVIRUSES A virus is a potentially damaging computer program A virus is a potentially damaging computer program

designed to affect your computer negatively without designed to affect your computer negatively without your knowledge or permission by altering the way it your knowledge or permission by altering the way it works.works.

Viruses spread systematically from one file to Viruses spread systematically from one file to another.another.

Viruses do not generate by chance. Creators of Viruses do not generate by chance. Creators of viruses write them to spread from file to file to cause viruses write them to spread from file to file to cause damage. This damage is called the virus payload. It damage. This damage is called the virus payload. It can be harmless or it can cause significant damage.can be harmless or it can cause significant damage.

Page 5: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

There are 3 main types of viruses: boot There are 3 main types of viruses: boot sector virus, file virus, and macro virus.sector virus, file virus, and macro virus.

Boot sector viruses replace the boot program Boot sector viruses replace the boot program used to start the computer with a modified used to start the computer with a modified infected version.infected version.

File viruses insert virus codes into program File viruses insert virus codes into program files. The virus then spreads to any program files. The virus then spreads to any program that accesses the infected file.that accesses the infected file.

Macro viruses use the macro language of an Macro viruses use the macro language of an application, such as word processing or a application, such as word processing or a spreadsheet program, to hide virus codes.spreadsheet program, to hide virus codes.

Page 6: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Malicious software ProgramsMalicious software Programs

There are 2 common variations of There are 2 common variations of computer viruses, also known as computer viruses, also known as malicious software programs.malicious software programs.

These 2 programs are known as worms These 2 programs are known as worms and trojan horses.and trojan horses.

Page 7: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Worms and Trojan HorsesWorms and Trojan Horses

A worm is a program that copies itself A worm is a program that copies itself repeatedly in a computer’s memory or on a repeatedly in a computer’s memory or on a network. This can possibly shut down the network. This can possibly shut down the computer or network.computer or network.

A trojan horse is a malicious software program A trojan horse is a malicious software program that hides within or is designed to look like a that hides within or is designed to look like a legitimate program. It is named after the Greek legitimate program. It is named after the Greek myth.myth.

Page 8: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Virus detection and removalVirus detection and removal

There is no completely effective way to keep a There is no completely effective way to keep a computer or network safe from viruses.computer or network safe from viruses.

Viruses are normally spread between Viruses are normally spread between computers by inserting an infected storage computers by inserting an infected storage medium into a computer, or downloading an medium into a computer, or downloading an infected file from the internet or an e-mail infected file from the internet or an e-mail attachment.attachment.

Using an antivirus program is one of the more Using an antivirus program is one of the more effective ways to protect against viruses. effective ways to protect against viruses. Antivirus programs are designed to detect, Antivirus programs are designed to detect, disinfect, and protect computers and networks.disinfect, and protect computers and networks.

Page 9: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Unauthorized access and Unauthorized access and useuse

Unauthorized access is the use of a computer or Unauthorized access is the use of a computer or network without permission.network without permission.

Cracker- an individual who tries to access a computer Cracker- an individual who tries to access a computer or network illegally.or network illegally.

Hacker- a person who tries to break into a computer, Hacker- a person who tries to break into a computer, often intending to steal or corrupt its data.often intending to steal or corrupt its data.

One way to prevent unauthorized access is to One way to prevent unauthorized access is to implement access controls. This can be done with user implement access controls. This can be done with user IDs and passwords. The best passwords are at least 8 IDs and passwords. The best passwords are at least 8 digits long, a combination of letters and numbers, and digits long, a combination of letters and numbers, and something that can be typed without looking at the something that can be typed without looking at the keyboard. The more creative the better.keyboard. The more creative the better.

Page 10: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Unauthorized use – is the use of a Unauthorized use – is the use of a computer or data for unapproved or computer or data for unapproved or possibly illegal activities. This can be possibly illegal activities. This can be something as simple as an employee something as simple as an employee using a work computer to send personal using a work computer to send personal e-mail. e-mail.

Page 11: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

FirewallsFirewalls A firewall is a security system consisting of hardware A firewall is a security system consisting of hardware

and/or software that prevents unauthorized access to and/or software that prevents unauthorized access to data and information on a network.data and information on a network.

Schools use firewalls to deny internet to outsiders and Schools use firewalls to deny internet to outsiders and to restrict both student and teacher access to sensitive to restrict both student and teacher access to sensitive date.date.

Many schools route all communications through a Many schools route all communications through a proxy server, which screens all incoming and outgoing proxy server, which screens all incoming and outgoing messages.messages.

Computer Vandalism takes many forms. Schools Computer Vandalism takes many forms. Schools usually have written policies for handling various types usually have written policies for handling various types of vandalism.of vandalism.

Page 12: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Software TheftSoftware Theft Software piracy – the unauthorized and illegal Software piracy – the unauthorized and illegal

duplication of copyrighted software. This is the duplication of copyrighted software. This is the most common form of software theft.most common form of software theft.

Software license – an agreement that provides Software license – an agreement that provides specific conditions for use of the software, specific conditions for use of the software, which users must accept before using the which users must accept before using the software. The most common is a single-user software. The most common is a single-user license agreement or end-user license license agreement or end-user license agreement (EULA). Users may install the agreement (EULA). Users may install the software on one computer, or one computer software on one computer, or one computer and one laptop. The software can not be and one laptop. The software can not be installed on a network.installed on a network.

Page 13: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Shareware and FreewareShareware and Freeware

Shareware and Freeware are two additional Shareware and Freeware are two additional types of software that require a license types of software that require a license agreement.agreement.

Shareware is software that is distributed for a Shareware is software that is distributed for a trial period. If you want to use the shareware trial period. If you want to use the shareware beyond the trial period, the developer expects beyond the trial period, the developer expects you to send a small fee.you to send a small fee.

Freeware is software provided at no cost to a Freeware is software provided at no cost to a user by an individual company.user by an individual company.

Page 14: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Network and Community/State site Network and Community/State site licenselicense

A network site license allows network users to A network site license allows network users to share a single copy of the software, which share a single copy of the software, which resides on the network server. Prices are resides on the network server. Prices are based on a fixed fee for an unlimited number of based on a fixed fee for an unlimited number of users.users.

A community/state site license gives an entire A community/state site license gives an entire region or state the right to install an unlimited region or state the right to install an unlimited number of educational copies of a particular number of educational copies of a particular software program on individual computers or a software program on individual computers or a network.network.

Page 15: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

System FailureSystem Failure System failure is a malfunction of the System failure is a malfunction of the

computer. They occur because of electrical computer. They occur because of electrical power problems, hardware component failure, power problems, hardware component failure, or software error.or software error.

The most common cause is an abrupt variation The most common cause is an abrupt variation in electrical power.in electrical power.

Two more common electrical power variations Two more common electrical power variations are undervoltages (power supply drops) and are undervoltages (power supply drops) and overvoltages (power surge over 120 volts) A overvoltages (power surge over 120 volts) A surge protector is a device that smoothes out surge protector is a device that smoothes out minor voltage errors to provide a stable current minor voltage errors to provide a stable current flow.flow.

Page 16: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Computer EthicsComputer Ethics

Computer ethics are the moral guidelines that Computer ethics are the moral guidelines that govern the use of computer, networks, and govern the use of computer, networks, and information systems. There are five areas of information systems. There are five areas of computer ethics.computer ethics.

1.1. Unauthorized use of computersUnauthorized use of computers2.2. Hardware, software, and information theftHardware, software, and information theft3.3. Information privacyInformation privacy4.4. Copyright Copyright 5.5. The existence of objectionable materials on The existence of objectionable materials on

the internet.the internet.

Page 17: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Objectionable Material and Objectionable Material and Children’s Internet Protection ActChildren’s Internet Protection Act

Objectionable material includes: racist Objectionable material includes: racist literature, obscene pictures and videos, literature, obscene pictures and videos, gambling, and age-restricted items.gambling, and age-restricted items.

The Children’s Internet Protection Act is used The Children’s Internet Protection Act is used to protect children from obscene, pornographic, to protect children from obscene, pornographic, and harmful information. This act requires that and harmful information. This act requires that all public computers install filtering software to all public computers install filtering software to block this kind of information. Parental controls block this kind of information. Parental controls can be used on personal home computers to can be used on personal home computers to prevent the same information from being prevent the same information from being accessed at home.accessed at home.

Page 18: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

Computers and health Computers and health issuesissues

Computer related heath issues include Computer related heath issues include tendonitis and carpal tunnel syndrometendonitis and carpal tunnel syndrome

Tendonitis is inflammation of a tendon due to Tendonitis is inflammation of a tendon due to repeated motion or stress on the tendon.repeated motion or stress on the tendon.

Carpal tunnel syndrome is inflammation of the Carpal tunnel syndrome is inflammation of the nerve that connects the forearm to the palm of nerve that connects the forearm to the palm of the wrist. This, like tendonitis, can be caused the wrist. This, like tendonitis, can be caused by repeated or forceful bending of the wrist.by repeated or forceful bending of the wrist.

Page 19: Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.

ErgonomicsErgonomicsErgonomics is an applied science devoted to Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into incorporating comfort, efficiency, and safety into the design of items in the workplace.the design of items in the workplace.

Viewing angle should be 20 degrees from eye to Viewing angle should be 20 degrees from eye to the center of the screen. The distance should be the center of the screen. The distance should be 18 – 28 inches.18 – 28 inches.

Elbows should be at 90 degrees and arms and Elbows should be at 90 degrees and arms and hands should be parallel to the floor.hands should be parallel to the floor.

The chair height should be adjustable and have The chair height should be adjustable and have 4 – 5 legs for stability.4 – 5 legs for stability.

Keyboard placement should be 20 – 28 inches Keyboard placement should be 20 – 28 inches depending on the height of the user.depending on the height of the user.