Chapter 8 - Computer Science Home

Report
Teachers Discovering Computers
Integrating Technology and
Digital Media in the Classroom
5th Edition
Chapter 8
Security Issues, Ethics, and Emerging
Technologies in Education
Chapter Objectives
 Identify security risks that threaten home and
school computers
 Describe how computer viruses and malicious
software programs work and the steps you can
take to prevent viruses
 Describe different ways schools safeguard
computers and networks
 Explain why computer backup is important and
how it is accomplished
 Define what is meant by information privacy and
its impact on schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
2
Chapter Objectives
 Identify the components of copyright that impact
education
 Describe the ethical issues related to Internet
usage and steps schools are taking to address
them
 Identify safe and healthy uses of technology
resources
 Describe the emerging technologies that will
transform traditional classrooms
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
3
Computer Security:
Risks and Safeguards
 Computer security risk - Any event or action that has
the potential of causing a loss of computer equipment,
software, data and information, or processing
capability
 Any illegal act involving a computer generally is
referred to as a computer crime
 Computer Viruses






New virus programs found every day
Boot sector virus
File virus
Worm
Trojan horse
Macro virus
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
4
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
5
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
6
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
7
Computer Security:
Risks and Safeguards
 Computer Viruses
 Logic bomb
 Time bomb
 Michelangelo virus
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
8
Computer Security:
Risks and Safeguards
 Virus Detection and
Removal
 Antivirus programs
 Popular antivirus
programs
 Many options to using
antivirus software
 Rescue disk
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
9
Computer Security:
Risks and Safeguards
 Unauthorized Access and
Use
 Crackers and hackers
 Access controls
 Identification
 Authentication
 Selecting a password
 Protecting your
password
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
10
Computer Security:
Risks and Safeguards
 Possessed Objects and Biometric Devices
 A possessed object is any item that you must carry
to gain access to a computer
 Badges, cards, smart cards, and keys
 Personal Identification Number (PIN)
 Biometric devices authenticate a person’s identity
with a physical characteristic
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
11
Computer Security:
Risks and Safeguards
 Firewall
 A security system consisting of hardware and/or
software that prevents unauthorized access to data
and information on a network
 Proxy server
 Personal firewall
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
12
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
13
Computer Security:
Risks and Safeguards
 Hardware Theft and Vandalism
 Cable lock devices
 Portable equipment warrants special
considerations
 Computer vandalism
 Cutting cables
 Deleting software
 Smashing computer
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
14
Computer Security:
Risks and Safeguards
 Software Theft
 Software piracy
 Software license
 Single-user license
 Multiple-user
 Network license
 Community/State license
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
15
Computer Security:
Risks and Safeguards
 Information Theft
 Encryption
 Plain text
 Encrypted text
 Encryption key
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
16
Computer Security:
Risks and Safeguards
 System Failure
 Undervoltage
 Brownout
 Blackout
 Overvoltage (powersurge)
 Spike
 Surge protector
 Surge protector with phone line protection
 Uninterruptible power supply (UPS)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
17
Computer Security:
Risks and Safeguards
 Backing Up – The Ultimate Safeguard
 Backup
 Duplicate of a file, program, or disk that may be
used if the original is lost, damaged, or destroyed
 Backup procedures policies in schools and school
districts
 Backup programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
18
Ethics and the Information Age
 Computer ethics
 Moral guidelines that govern the use of computers,
networks, and information systems
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
19
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
20
Ethics and the Information Age
 Information Privacy
 The right of individuals and organizations to deny
or restrict the collection and use of information
about them
 Unauthorized collection and use of information
 Electronic profiles
 Federal and state laws
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
21
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
22
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
23
Ethics and the Information Age
 Phishing
 Email attempting to obtain personal and financial
information
 Spam
 An unsolicited e-mail mess or newsgroup posting
sent to many recipients or newsgroups at once
 Average user receives more than 1,000 spam email messages each year
 Anti-spam campaigns
 Anti-spam program
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
24
Ethics and the Information Age
 Privacy Laws
 Business or government agencies should only
collect information necessary to carry out their
functions
 Restrict data access to those who must use it to
perform job duties
 Release personal information only after agreement
to disclosure by individual
 Must inform the individual when collecting
information
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
25
Ethics and the Information Age
 Employee and Student Monitoring
 Use of computers to observe, record, view, and
review an individual’s use of a computer
 Policies of computer use
 Acceptable Use Policy (AUP)
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
26
Ethics and the Information Age
 Copyright Laws
 Copyright Act of 1976
 Illegal copying
 Fair use
 Copyright information on Web pages
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
27
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
28
Ethics and the Information Age
 Copyright Laws
 Teacher and student
Web pages
 Copyright laws do
protect these pages
 Public domain Web
sites
 CDs and DVDs with
images, graphics,
audio, and video
clips
 Guidelines for
creating Web pages
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
29
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
30
Internet Ethics
and Objectionable Materials
 Three categories of objectionable material
 Pornographic material
 Racist literature, gambling
 Incorrect or inappropriate material
 Inaccurate information
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
31
Internet Ethics
and Objectionable Materials
 Recent Government Actions
 Children’s Internet Protection Act
 Protects children from obscene, pornographic, and
other information considered to be harmful to minors
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
32
Internet Ethics
and Objectionable Materials
 Parental Controls
 Rating systems
 ICRA
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
33
Internet Ethics
and Objectionable Materials
 Parental Controls
 Filtering software
programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
34
Internet Ethics
and Objectionable Materials
 Parental Controls
 Filtering software
 Check Internet browser’s history
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
35
Internet Ethics
and Objectionable Materials
 Educational Controls
 Acceptable Use Policies (AUP)
 Use of network is a privilege, not a right
 Behave as if you are a guest on the Internet
 Rules concerning objectionable sites
 Rules concerning copyright issues
 Outline proper use of equipment
 Online safety and personal information
 Consequences of violating rules
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
36
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
37
Internet Ethics
and Objectionable Materials
 Educational Controls
 Curriculum pages
 Acts as guides for students
 Sites are pre-evaluated by teachers
 Eliminates typing mistakes when typing URLs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
38
Internet Ethics
and Objectionable Materials
 Educational Controls
 Teacher observation
 Final measure to prevent students from accessing
objectionable and inappropriate materials
 Instruct students on use of Back button on the
browser
 Understanding of ethical concepts
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
39
Health Issues
 Computers and Health Issues
 Musculoskeletal Disorder (MSD)
 Repetitive Strain Injury (RSI)
 Carpal Tunnel Syndrome (CTS)
 Hand Exercises
 Computer Vision Syndrome (CVS)
 Techniques to ease eyestrain
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
40
Health Issues
 Ergonomics
 An applied science devoted to incorporating
comfort, efficiency, and safety into the design of
items in the workplace
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
41
Emerging Technologies
 The Web offers enormous potential for expanding
the classroom
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
42
Emerging Technologies
 The World Wide Web
 Most K-12 schools are on the Internet
 The federal government is committed to highspeed Internet access in every classroom
 Speed will increase
 Full-motion video on demand
 Instant access to Web-based educational
programs
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
43
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
44
Emerging Technologies
 Educational Software on DVD
 Information, graphics, animations, video, and
interactive links
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
45
Emerging Technologies
 Assistive Technologies
 Technologies that modify
or adapt the classroom
for special learning needs
 Individuals with
Disabilities Act (IDEA)
Amendment of 1997
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
46
Emerging Technologies
 Federal Accessibility Initiative
 Technology should be available to people with
disabilities
 Section 508
 WebXACT
 Text equivalents for all non-text elements
 Summaries of graphs and charts
 All information displayed in color available without
color
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
47
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
48
Emerging Technologies
 Web- and Video-Enhanced Digital Textbooks
 Web site is continuously updated and maintained
 Web-Based Distance Learning
 All instruction provided via the Web
 Still evolving
 Useful for specialized classes not available in all
schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
49
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
50
Emerging Technologies
 Wireless Technologies
 Allows teachers and students to connect to a truly
global network
 Wireless computers will ensure that educational
technology is used seamlessly and at the point of
instruction
 Small, inexpensive computers ensure that all children
have access to their lessons and the World from both
home and school
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
51
Chapter Summary
 Identify security risks that threaten home and school
computers
 Describe how computer viruses and malicious software
programs work and the steps you can take to prevent
viruses
 Describe different ways schools safeguard computers and
networks
 Explain why computer backup is important and how it is
accomplished
 Define what is meant by information privacy and its impact
on schools
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
52
Chapter Summary
 Identify the components of copyright that impact education
 Describe the ethical issues related to Internet usage and
steps schools are taking to address them
 Identify safe and healthy uses of technology resources
 Describe the emerging technologies that will transform
traditional classrooms
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education
53
Teachers Discovering Computers
Integrating Technology and
Digital Media in the Classroom
5th Edition
Chapter 8 Complete
Security Issues, Ethics, and Emerging
Technologies in Education

similar documents