+ All Categories
Home > Documents > Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204...

Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204...

Date post: 05-Jan-2016
Category:
Upload: marlene-rice
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
29
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009
Transcript
Page 1: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

EducationalComputing

David Goldschmidt, Ph.D.Computer Science

The College of Saint Rose

CIS 204Spring 2009

Page 2: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Web Site Design Process Steps to building a Web site:

Define objectives and intended audience of the Web site

Select the content to be presented Determine the navigational structure and layout Construct the individual Web pages Test your Web site (proofread content, verify

links) Obtain server space and a URL Publish (FTP), then publicize, your Web site Keep Web page content up-to-date

Page 3: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Local Area Networks

Local Area Network (LAN) is a networkof machines coveringa limited geographicalarea

Metropolitan AreaNetwork (MAN)covers more denselypopulated area

Page 4: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Wide Area Networks

Wide Area Network(WAN) covers multiplelocations Each location consists

of a LAN or MAN

LANs and WANs areoften private networks

Page 5: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Firewalls

What is a firewall ? A security system that prevents

unauthorized access to data and information on a network or computer

Prohibits accessfrom the InternetInternet

Page 6: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Computer Security

What is computer security risk? Any event or action that has the potential of

causing a loss or theft of computer equipment, software, data, information, or processing capability

What is computer crime? Examples? Any illegal act involving a computer e.g. unauthorized access, information/identity

theft, viruses, online predators, etc.

Page 7: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Acceptable Use Policies (AUP)

What is an acceptable use policy? Rules that govern the use of school and

school district computers, networks, and the Internet....

Rules concerning objectionable materials Rules concerning copyright Guidelines for proper use Guidelines for online safety of

personal information Consequences of breaking

the rules

Page 8: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Unauthorized Access and Use

What is unauthorized access? Accessing a computer

or network withoutpermission

What is unauthorized use? Using a computer or

data for unapprovedor illegal activities

protecting against unauthorized access

how do you best select a password?

Page 9: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Viruses

What is a computer virus? An illegal computer program that is

potentially damaging to your computer May cause corruption

or loss of data May cause software

to malfunction or asystem meltdown

May be a harmless prank

Page 10: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Viruses

Page 11: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Viruses

Page 12: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Antivirus Software

Antivirus software detects, disinfects, and protects computers and networks from viruses

Page 13: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Antivirus Software

How does antivirus software work? Detects programs attempting to write

new data to the boot program, theoperating system, etc.

Scans for known virus programs Information about known viruses

are downloaded frequently(daily or weekly)

Page 14: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Hardware Theft

Safeguard against hardware theft Keep equipment locked up Security systems (e.g. alarms, video

monitoring) Physical security devices

(e.g. cables, locks, etc.) Tracking device

Page 15: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Software Theft

What is software theft? Stealing software by stealing CDs or other

media, or illegally downloading and copying software

When software is purchased, the buyer typicallydoes not own the software! Instead, the buyer has

purchased the right touse the software

software license agreement

(must accept during installation)

Page 16: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Software Licenses

End-user license agreement (EULA) User may install software on only one

computer Or sometimes on one desktop and one laptop

computer User may not install software on a network

for multi-user use User may make one copy of software for

backup purposes User may not give copies to friends and

colleagues

Page 17: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Software Licenses

also freeware or shareware

Page 18: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Information Theft

Information and identity theft havebecome growing concerns Theft of credit card or bank account numbers Theft of social security numbers Theft of other private information

e.g. financial aid, grades, courses, library records, etc.

How can a school, organization, or individualprevent information theft?

Page 19: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Information Theft

Organizations can prevent information theft by: Not storing sensitive data (e.g. credit card

numbers, social security numbers) Encrypting data

that is stored Maintaining firewalls

and other networksecurity measures

Page 20: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Phishing

What is phishing? A scam in which an official-looking e-mail

or Web site attempts toobtain personalinformation

an attempt to bring you toa phony Web site and stealyour personal information

Page 21: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Spam

What is spam? Unsolicited e-mail messages selling

products or services, promoting (potentially phony) business opportunities, or advertising offensive materials

For more information, check out:http://its.strose.edu/ViewArticle.aspx?page_id=74

Page 22: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Computer Ethics

What is computer ethics? Moral guidelines that govern the use of

computers, networks, and information systems

Unauthorized access and use Hardware, software, and information theft Information privacy Copyright Existence of inappropriate materials on the

Internet

Page 23: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Computer Ethics

U.S. government laws concerning privacy:

Page 24: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Computer Ethics

U.S. government laws concerning privacy (cont.):

Page 25: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Computer Ethics

U.S. government laws concerning privacy (cont.):

Page 26: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Objectionable Materials

What types of objectionable materials areavailable on the Internet? Racist, sexist, or otherwise discriminatory

materials Pornographic materials Gambling Web sites Age-restricted materials (e.g. cigarettes,

alcohol, etc.) Incorrect or inaccurate information

easy to identify

not so easy to identify

Page 27: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Objectionable Materials

Government initiatives Children’s Internet Protection Act (2000)

Protect children from obscene, pornographic, and other information considered harmful to minors

Filtering software prevents Web browsers from displaying materials from targeted sites or sites containing certain keywords

Page 28: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Objectionable Materials

Parental controls via rating systems Internet Content Rating Association (ICRA) Web browser

reads rating ofWeb pages,and reactsaccordingly

Page 29: Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.

Objectionable Materials

Parental controls via filtering software Net Nanny

Relevantage groups?


Recommended