Ict competency LU8 Computer Security Privacy and Ethics

Post on 07-Jul-2016

219 views 1 download

description

TMX1022 LU8 Computer Security Privacy and Ethics

transcript

TMX1022 ICT CompetencyLearning Unit 8: Computer Security, Privacy and

EthicsSemester 2, 2015/2016

Learning OutcomesBy the end of this unit, students will be able to:• Explain the concept of computer security and ethics• Identify the types of threats and the measures to

protect the computer from those threats• Discuss security measures for common security

issues• Explain the concept of privacy, intellectual property

and copyrights• Apply proper security and ethical steps in daily

computing• Demonstrate the best practices of netiquettes online

3

OUTLINE• What is Computer Security?• What are types of threats?• How can we protect our computer from these

threats?• What are Privacy, Ethics and Netiquettes ?

4

What is Computer Security?

“Techniques for ensuring that data stored in a computer cannot be read or compromised by any

individuals without authorization”

(Retrieved from www.webopedia.com)

5

What are the common threats of security?

6

Common ThreatsHuman Errors• Accidentally deleting data• Physically damaging the computer Theft• Physical theft - Steal the computer or its component• Virtual theft - Stealing and assuming other person’s

identity without consent and also software piracy

5

Malware

• Malware or malicious code (malcode) is short for malicious software.

• It is code or software that is specifically designed to damage, disrupt, steal, or inflict some other “bad” or illegitimate action on data, hosts, or networks.

• Three of the most common types of malware:– Viruses– Worms– Trojan

8

Viruses

• A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program.

• It spreads from one computer to another, leaving infections as it travels.

• Almost all viruses exists in executable file.

9

• Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.

10

Worms

• Computer worms are similar to viruses • they replicate functional copies of themselves – can cause the same type of damage.

• worms are standalone software – do not require a host program or human help to

propagate.

11

Trojan

• another type of malware named after the wooden horse the Greeks used to infiltrate Troy.

• It is a harmful piece of software that looks legitimate.

• Trojans do not reproduce by infecting other files nor do they self-replicate.

12

• Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.

13

What are the security measures to overcome these threats ?

14

Security Measures

• Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.

• Never open an e-mail attachment unless you are expecting it and it is from a trusted source

• Install a personal firewall program• Stay informed about the new virus alerts and

virus hoaxes

15

Macro Security Settings

• Set the macro security in programs so that you can enable or disable macros.

• Enable macros only if the document is from a trusted source and you are expecting it.

16

Antivirus Software

• Install an antivirus program on all of your computers.

• Update the software regularly• Scan all downloaded programs for viruses and

other malware• If the antivirus program flags an e-mail

attachment as infected, delete or quarantine the attachment immediately

17

What are Privacy, Ethics and Netiquettes?

18

Internet Privacy

• Internet privacy or online privacy covers the right of a person to have a "private space" or personal privacy in terms of storing or displaying of information pertaining to oneself on the Internet.

• It is the control of what a person can share online.

19

Intellectual Property

• intangible property that is the result of creativity, such as patents, copyrights, etc.

• IP is more difficult to be protected. • IP cannot be simply recovered if it is stolen. • It will take more efforts to to protect an IP. • It would be hard for you to know it until

someone else reports it to you or your discover it online.

20

Copyrights

• a legal right that allows the creator of an original work to have the exclusive rights to its use and distribution, usually for a limited time

• Copyrighted works or materials which are stolen and reproduced are known as "piracy" or "plagiarism".

21

Creative Commons

• Creative Commons is established to allow creators to communicate which rights they reserve, and which rights they waive for the benefit of recipients or other creators.

• It is not as strict as copyrights.

22

Plagiarism

• Plagiarism is the practice of taking someone else's work or ideas and passing them off as one's own

• This happens when you copied someone's work or idea without acknowledging or getting the permission from the original author

23

Computer Ethics

• Ethics is a set of moral principles that govern the behavior of a group or individual.

• Computer ethics is set of moral principles that regulate the use of computers.

KCEA 2009: Computation Thinking

Situations that require ethical decision

• Software copyrights• privacy • conflict of interest• use of work computers• software quality• hacking • social responsibility

Unit 5: Information Systems

• Confidentiality: Obligation not to disclose willingly any information that should be kept private.

• Personal use of employer’s equipment and computer facilities could lead to a conflict of interest.

26

How do I make ethical decisions?

• Take time to think of the situation and consequences before making a decision

• Gather relevant information from reliable sources.

• Talk to people whose judgement your respect• Consult a guidelines or code of professional

ethics

Netiquettes

• Online jargon for Internet etiquette• A series of customs or guidelines for

maintaining civilized and effective communications in online discussions and e-mail exchanges

Principles of Netiquette

• Put a meaningful title on the subject line• Use uppercase and lowercase letters• Check spelling• Be careful what you send• Be polite

29

• Be cautious when using sarcasm and humor• Notify recipients of viruses• Use smiley and text messaging shorthand

cautiously• Use the Bcc function for group mailings• Don’t send replies to all recipients.