Code of Conduct
• A set of rules to guide behavior and
decisions.
• A code of conduct can outline Professional
behavior
– Doctor, Lawyer, Military, etc.
Acceptable Use Policies
• AUP = Acceptable use policy
– Guidelines that outline what an organization
finds acceptable or unacceptable for use of
the Internet
– Can apply to internet, computer, or network
usage
• Look at the school AUP
opyright and Licensing Laws
• The right to control how your art, literature or other work is used.
• Intent: to advance the progress of knowledge by giving the creator an economic incentive to create new works.
• It has to be tangible to be copyrighted.
• A document may be copyrighted even if it doesn’t state that it is.
Fair Use Laws
User must weigh four factors:• The purpose and character
of the use
• The amount and substantiality of the portion used.
• The effect on the potential market for the copyrighted work.
• The nature of the copyrighted work
Trade secrets and Piracy
• Loss of Intellectual Property in a business.
• Includes formulas, patterns, programs, data, technique, and processes.
• Customer Lists
• How can all this be protected?
Plagiarism & Internet Cheating
• Taking the work of
someone else and
submitting it as your own.
• Many view work on the
Internet as public domain.
• There are lots of
programs on the web to
detect plagiarism. http://www.members.optusnet.com.au/mattnrae/pic18%20copyright.jpg
Evaluating Information
Accuracy
WWW offers information from around the world.
• Information can appear fairly anonymous.
When you use an electronic library the information has already been evaluated by experts.
Consider the following:
• authorship,
• point of view or bias,
• verifiability,
• currency of information.
• How do you do this?
MALWARE
• Malware, short for malicious software, is
any software used to disrupt computer
operation, gather sensitive information, or
gain access to private computer systems
• 'Malware' is applied to both true (malicious)
malware and unintentionally harmful
software
Malware - Computer Virus
• A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the user
• Viruses can either be considered a Nuisance or Destructive
• Some viruses replicate themselves when they attach to a computer program. When a computer runs the infected program, the virus launches and embeds itself in the computer’s memory. It then looks for other programs or files to which it can attach. This process repeats each time an infected program launches.
• A trigger event may activate the virus. This can be a date or a specific set of input.
Examples of Viruses
• Email– E-mail viruses may find an individual’s address book and send copies of an
infected document to everyone listed.
• Trojan Horse– Named after the wooden horse the Greeks used to infiltrate Troy, a Trojan
Horse is a program that appears to be useful software, but instead it compromises your security and causes a lot of damage. Once it is downloaded and executed, the malicious code begins to work. The difference between Trojan Horses and viruses is that Trojan Horses do not replicate or spread on their own. They can only be transmitted intentionally via email or disk, or downloaded directly onto a PC. Many Trojan Horses are designed to steal your login ID and password and then email them to someone else who can make use of the account at your expense. Other Trojan Horses can display obscene messages or delete the contents of your hard drive.
• Worms– Worms are very similar to viruses in that they are computer programs that
replicate functional copies of themselves and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. The difference is that, unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs.
– Citation: http://ittraining.iu.edu/workshops/win_security/virus.html
Prevention
• Steps to help prevent or detect a virus.
– Be careful about what you open or download
from the internet
– Use a virus protection software
– Use a firewall and turn your computer off
when not in use
Computer Theft & Privacy
• The most popular item to steal are Laptops
so they can be sold of the data
• To keep your files and information safe and
to keep most people out of your files
– Use passwords
Hacking
• Hacking
– Unauthorized use of computer and network
resource
• The penalty for hacking
– It is a felony
• Hackers cost business money because of
Downtime and loss of data
Internet Controls
• Types of controls for internet safety
– Firewalls: form a barrier
– between two networks
– Filters: control what can be viewed on
Internet
– Parental Control: parents control what kids
do on Internet
Freeware & Shareware
• Freeware
– is copyrighted computer software which is made available
for use free of charge, for an unlimited time
• Shareware software
– typically obtained free of charge, either by downloading
from the Internet or other source. A user tries out the
program, and thus shareware has also been known as "try
before you buy". A shareware program is accompanied by
a request for payment, and the software's distribution
license often requires such a payment.
Public Domain
• This is non-copyrighted material available to
everyone, free-of-charge.
• Those works whose intellectual property
rights have expired, been forfeited, or are
inapplicable. Examples include the works of
Shakespeare and Beethoven.
– www.librivox.org
Trigger Events
• An event that activates a task often associated
with a computer virus.
– Time Bomb
• Watches for the PC clock to reach a certain date to
activate the virus.
– Example
» Michelangelo virus
» Damages files on March 6 the artist’s birthday
– Logic Bomb
• Watches for a specific set of input to activate the virus.
File Virus
• Virus that attaches to an application program.
– Example
• Chernobyl
• Notorious for overwriting a section of the hard
disk, making it impossible to access data.
Boot Sector Virus
• Infects the system files that your computer
uses every time it is turned on.
• Cause widespread damage and recurring
problems.
• Example
• Stoned Virus
• Every time you turn on your computer the
virus is activated and infects any non-write-
protected files including your hard disk.
Trojan Horse Virus
• Computer program that seems to perform
one function while actually doing something
else.
– Different from a virus because it does not make
copies of itself.
– Different tasks can be affected
– Stealing passwords
– Deleting files
Worm
• Software program designed to enter a
computer system usually through a network,
through security holes and then replicateS
itself.
– Spreads from computer to computer.