ying wang edn 303 fall 2008. objectives identify security risks that threaten home and school...

Post on 16-Dec-2015

215 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Ying Wang EDN 303Fall 2008

ObjectivesIdentify security risks that threaten home and

school computersDescribe how computer viruses and malicious

software programs work and the steps you can take to prevent viruses

Describe different ways schools safeguard computers and networks

Explain why computer backup is important and how it is accomplished

Define what is meant by information privacy and its impact on schools

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2

ObjectivesIdentify the components of copyright that

impact educationDescribe the ethical issues related to Internet

usage and steps schools are taking to address them

Identify safe and healthy uses of technology resources

Describe the emerging technologies that will transform traditional classrooms

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3

Computer Security: Risks and safeguardsComputer security risk - Any event or action that

has the potential of causing a loss of computer equipment, software, data and information, or processing capability

Any illegal act involving a computer generally is referred to as a computer crime

Computer VirusesNew virus programs found every dayBoot sector virusFile virusWormTrojan horseMacro virus

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education5

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education6

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education7

Computer Security: Risks and SafeguardsComputer Viruses

Logic bombTime bomb

Michelangelo virus

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8

Virus Detection and RemovalAntivirus programsPopular antivirus

programsMany options to using

antivirus softwareRescue disk

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education9

Computer Security: Risks and Safeguards

Computer Security: Risks and SafeguardsUnauthorized Access

and UseCrackers and

hackersAccess controls

Identification Authentication

Selecting a password

Protecting your password

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education10

Computer Security: Risks and SafeguardsPossessed Objects and Biometric Devices

A possessed object is any item that you must carry to gain access to a computer Badges, cards, smart cards, and keys

Personal Identification Number (PIN)Biometric devices authenticate a person’s

identity with a physical characteristic

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11

Computer Security: Risks and SafeguardsFirewall

A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network

Proxy serverPersonal firewall

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13

Computer Security: Risks and SafeguardsHardware Theft and Vandalism

Cable lock devicesPortable equipment warrants special

considerationsComputer vandalism

Cutting cables Deleting software Smashing computer

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14

Computer Security: Risks and SafeguardsSoftware Theft

Software piracySoftware license

Single-user license Multiple-user Network license Community/State license

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15

Computer Security: Risks and SafeguardsInformation Theft

Encryption Plain text Encrypted text

Encryption key

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education16

Computer Security: Risks and SafeguardsSystem Failure

Undervoltage Brownout Blackout

Overvoltage (powersurge) Spike

Surge protector Surge protector with phone line protection

Uninterruptible power supply (UPS)

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17

Computer Security: Risks and SafeguardsBacking Up – The Ultimate Safeguard

Backup Duplicate of a file, program, or disk that may be

used if the original is lost, damaged, or destroyed Backup procedures policies in schools and school

districts Backup programs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18

Ethics and the Information AgeComputer ethics

Moral guidelines that govern the use of computers, networks, and information systems

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education20

Ethics and the Information AgeInformation Privacy

The right of individuals and organizations to deny or restrict the collection and use of information about them

Unauthorized collection and use of information Electronic profiles Federal and state laws

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education22

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education23

Ethics and the Information AgePhishing

Email attempting to obtain personal and financial information

SpamAn unsolicited e-mail mess or newsgroup posting

sent to many recipients or newsgroups at onceAverage user receives more than 1,000 spam e-

mail messages each yearAnti-spam campaignsAnti-spam program

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24

Ethics and the Information AgePrivacy Laws

Business or government agencies should only collect information necessary to carry out their functions

Restrict data access to those who must use it to perform job duties

Release personal information only after agreement to disclosure by individual

Must inform the individual when collecting information

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25

Ethics and the Information AgeEmployee and Student Monitoring

Use of computers to observe, record, view, and review an individual’s use of a computer

Policies of computer useAcceptable Use Policy (AUP)

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26

Ethics and the Information AgeCopyright Laws

Copyright Act of 1976Illegal copyingFair use

Copyright information on Web pages

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education28

Ethics and the Information AgeCopyright Laws

Teacher and student Web pagesCopyright laws do

protect these pagesPublic domain Web

sitesCDs and DVDs with

images, graphics, audio, and video clips

Guidelines for creating Web pages

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education29

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education30

Internet Ethics and Objectionable MaterialsThree categories of objectionable material

Pornographic materialRacist literature, gamblingIncorrect or inappropriate material

Inaccurate information

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31

Internet Ethics and Objectionable MaterialsRecent Government Actions

Children’s Internet Protection Act Protects children from obscene, pornographic, and

other information considered to be harmful to minors

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32

Internet Ethics and Objectionable Materials

Parental ControlsRating systems

ICRA

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education33

Internet Ethics and Objectionable Materials

Parental ControlsFiltering software

programs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education34

Internet Ethics and Objectionable MaterialsParental Controls

Filtering softwareCheck Internet browser’s history

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35

Internet Ethics and Objectionable MaterialsEducational Controls

Acceptable Use Policies (AUP) Use of network is a privilege, not a right Behave as if you are a guest on the Internet Rules concerning objectionable sites Rules concerning copyright issues Outline proper use of equipment Online safety and personal information Consequences of violating rules

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 36

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education37

Internet Ethics and Objectionable MaterialsEducational Controls

Curriculum pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 38

Internet Ethics and Objectionable MaterialsEducational Controls

Teacher observation Final measure to prevent students from accessing

objectionable and inappropriate materials Instruct students on use of Back button on the

browser Understanding of ethical concepts

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 39

Health IssuesComputers and Health Issues

Musculoskeletal Disorder (MSD)Repetitive Strain Injury (RSI)Carpal Tunnel Syndrome (CTS)

Hand ExercisesComputer Vision Syndrome (CVS)

Techniques to ease eyestrain

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 40

Health IssuesErgonomics

An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 41

Emerging TechnologiesThe Web offers enormous potential for

expanding the classroom

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 42

Emerging TechnologiesThe World Wide Web

Most K-12 schools are on the InternetThe federal government is committed to high-

speed Internet access in every classroomSpeed will increaseFull-motion video on demandInstant access to Web-based educational

programs

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 43

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education44

Emerging TechnologiesEducational Software on DVD

Information, graphics, animations, video, and interactive links

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 45

Emerging TechnologiesAssistive Technologies

Technologies that modify or adapt the classroom for special learning needs

Individuals with Disabilities Act (IDEA) Amendment of 1997

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education46

Emerging TechnologiesFederal Accessibility Initiative

Technology should be available to people with disabilities

Section 508WebXACT

Text equivalents for all non-text elements Summaries of graphs and charts All information displayed in color available without

color

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 47

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education48

Emerging TechnologiesWeb- and Video-Enhanced Digital Textbooks

Web site is continuously updated and maintained

Web-Based Distance LearningAll instruction provided via the WebStill evolvingUseful for specialized classes not available in

all schools

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 49

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education50

Emerging TechnologiesWireless Technologies

Allows teachers and students to connect to a truly global network

Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction

Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 51

Chapter SummaryIdentify security risks that threaten home and

school computersDescribe how computer viruses and malicious

software programs work and the steps you can take to prevent viruses

Describe different ways schools safeguard computers and networks

Explain why computer backup is important and how it is accomplished

Define what is meant by information privacy and its impact on schools

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 52

Chapter SummaryIdentify the components of copyright that impact

educationDescribe the ethical issues related to Internet

usage and steps schools are taking to address them

Identify safe and healthy uses of technology resources

Describe the emerging technologies that will transform traditional classrooms

Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 53

top related