Date post: | 18-Dec-2015 |
Category: |
Documents |
Upload: | georgia-carr |
View: | 226 times |
Download: | 2 times |
Thomson Course TechnologyThomson Course Technology
Security Issues, Ethics, and Security Issues, Ethics, and Emerging Technologies in Emerging Technologies in
EducationEducation
Chapter 8Chapter 8
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
Computer security risk - Any event or Computer security risk - Any event or action that has the potential of causing a action that has the potential of causing a loss of computer equipment, software, loss of computer equipment, software, data and information, or processing data and information, or processing capabilitycapability
Computer VirusesComputer Viruses• New virus programs found every dayNew virus programs found every day• Boot sector virusBoot sector virus• File virusFile virus• WormWorm• Trojan horseTrojan horse• Macro virusMacro virus
Thomson Course TechnologyThomson Course Technology
Signs of a Virus InfectionSigns of a Virus Infection
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
Computer VirusesComputer Viruses• Logic bombLogic bomb• Time bombTime bomb
Michelangelo virusMichelangelo virus
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
Virus Detection Virus Detection and Removaland Removal• Antivirus programsAntivirus programs• Popular antivirus Popular antivirus
programsprograms• Many options to Many options to
using antivirus using antivirus softwaresoftware
• Rescue diskRescue disk
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
Unauthorized Unauthorized Access and UseAccess and Use• Crackers and Crackers and
hackershackers• Access controlsAccess controls
IdentificationIdentification AuthenticationAuthentication
• Selecting a Selecting a passwordpassword
• Protecting your Protecting your passwordpassword
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
FirewallFirewall• A security system consisting of A security system consisting of
hardware and/or software that prevents hardware and/or software that prevents unauthorized access to data and unauthorized access to data and information on a networkinformation on a network
• Proxy serverProxy server• Personal firewallPersonal firewall
Thomson Course TechnologyThomson Course Technology
Hardware Theft Hardware Theft and Vandalismand Vandalism• Cable lock devicesCable lock devices• Portable equipment Portable equipment
warrants special warrants special considerationsconsiderations
• Computer Computer vandalismvandalism
Cutting cablesCutting cables Deleting softwareDeleting software Smashing computerSmashing computer
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
Software TheftSoftware Theft• Software piracySoftware piracy• Software licenseSoftware license
Single-user licenseSingle-user license Product activationProduct activation Shareware and Shareware and
freewarefreeware Site licenseSite license Network site licenseNetwork site license Community site Community site
licenselicense
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
System FailureSystem Failure• UndervoltageUndervoltage
BrownoutBrownout BlackoutBlackout
• Overvoltage Overvoltage (powersurge)(powersurge)
SpikeSpike
• Surge protectorSurge protector Surge protector with Surge protector with
phone line phone line protectionprotection
• Uninterruptible Uninterruptible power supply (UPS)power supply (UPS)
Thomson Course TechnologyThomson Course Technology
Computer Security: Computer Security: Risks and SafeguardsRisks and Safeguards
Backup ProceduresBackup Procedures• BackupBackup
Duplicate of a file, program, or disk that may Duplicate of a file, program, or disk that may be used if the original is lost, damaged, or be used if the original is lost, damaged, or destroyeddestroyed
Backup procedures policies in schools and Backup procedures policies in schools and school districtsschool districts
Backup programsBackup programs
Thomson Course TechnologyThomson Course Technology
Ethics and the Information AgeEthics and the Information Age
Computer ethicsComputer ethics• Moral guidelines that govern the use of Moral guidelines that govern the use of
computers, networks, and information computers, networks, and information systemssystems
Thomson Course TechnologyThomson Course Technology
Thomson Course TechnologyThomson Course Technology
Thomson Course TechnologyThomson Course Technology
Ethics and the Information AgeEthics and the Information Age
PhishingPhishing• Email attempting to obtain personal and Email attempting to obtain personal and
financial informationfinancial information SpamSpam
• An unsolicited e-mail mess or newsgroup An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups posting sent to many recipients or newsgroups at onceat once
• Average user receives more than 1,000 spam Average user receives more than 1,000 spam e-mail messages each yeare-mail messages each year
• Anti-spam campaignsAnti-spam campaigns• Anti-spam programAnti-spam program
Thomson Course TechnologyThomson Course Technology
Ethics and the Information AgeEthics and the Information Age
Privacy LawsPrivacy Laws• Business or government agencies Business or government agencies
should only collect information should only collect information necessary to carry out their functionsnecessary to carry out their functions
• Restrict data access to those who must Restrict data access to those who must use it to perform job dutiesuse it to perform job duties
• Release personal information only after Release personal information only after agreement to disclosure by individualagreement to disclosure by individual
• Must inform the individual when Must inform the individual when collecting informationcollecting information
Thomson Course TechnologyThomson Course Technology
Ethics and the Information AgeEthics and the Information Age
Employee and Student MonitoringEmployee and Student Monitoring• Use of computers to observe, record, Use of computers to observe, record,
view, and review an individual’s use of a view, and review an individual’s use of a computercomputer
• Policies of computer usePolicies of computer use• Acceptable Use Policy (AUP)Acceptable Use Policy (AUP)
Thomson Course TechnologyThomson Course Technology
Ethics and the Information AgeEthics and the Information Age
Copyright LawsCopyright Laws• Copyright Act of 1976Copyright Act of 1976• Illegal copyingIllegal copying• Fair useFair use
Copyright information on Web pagesCopyright information on Web pages
Thomson Course TechnologyThomson Course Technology
Ethics and the Information AgeEthics and the Information Age Copyright LawsCopyright Laws
• Teacher and student Teacher and student Web pagesWeb pages
Copyright laws do Copyright laws do protect these pagesprotect these pages
Public domain Web Public domain Web sitessites
CD-ROM with CD-ROM with images, graphics, images, graphics, audio, and video audio, and video clipsclips
Guidelines for Guidelines for creating Web pagescreating Web pages
Thomson Course TechnologyThomson Course Technology
Thomson Course TechnologyThomson Course Technology
Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials
Three categories of objectionable Three categories of objectionable materialmaterial• Pornographic materialPornographic material• Racist literature, gamblingRacist literature, gambling• Incorrect or inappropriate materialIncorrect or inappropriate material
Inaccurate informationInaccurate information
Thomson Course TechnologyThomson Course Technology
Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials
Recent Government ActionsRecent Government Actions• Dot Kids Implementation and Efficiency Dot Kids Implementation and Efficiency
ActAct Every site designated .kids will be a safe Every site designated .kids will be a safe
zone for childrenzone for children
• Children’s Internet Protection ActChildren’s Internet Protection Act Protects children from obscene, Protects children from obscene,
pornographic, and other information pornographic, and other information considered to be harmful to minorsconsidered to be harmful to minors
Thomson Course TechnologyThomson Course Technology
Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials
Parental ControlsParental Controls• Rating systemsRating systems
ICRAICRA• Filtering software programsFiltering software programs• Check Internet browser’s historyCheck Internet browser’s history
Thomson Course TechnologyThomson Course Technology
Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials
Educational ControlsEducational Controls• Acceptable Use Policies (AUP)Acceptable Use Policies (AUP)
Use of network is a privilege, not a rightUse of network is a privilege, not a right Behave as if you are a guest on the InternetBehave as if you are a guest on the Internet Rules concerning objectionable sitesRules concerning objectionable sites Rules concerning copyright issuesRules concerning copyright issues Outline proper use of equipmentOutline proper use of equipment Online safety and personal informationOnline safety and personal information Consequences of violating rulesConsequences of violating rules
Thomson Course TechnologyThomson Course Technology
Internet Ethics Internet Ethics and Objectionable Materialsand Objectionable Materials
Educational ControlsEducational Controls• Curriculum pagesCurriculum pages
Acts as guides for studentsActs as guides for students Sites are pre-evaluated by teachersSites are pre-evaluated by teachers Eliminates typing mistakes when typing URLsEliminates typing mistakes when typing URLs
• Teacher observationTeacher observation Final measure to prevent students from accessing Final measure to prevent students from accessing
objectionable and inappropriate materialsobjectionable and inappropriate materials Instruct students on use of Back button on the Instruct students on use of Back button on the
browserbrowser Understanding of ethical conceptsUnderstanding of ethical concepts
Thomson Course TechnologyThomson Course Technology
Health IssuesHealth Issues
Computers and Health IssuesComputers and Health Issues• Musculoskeletal Disorder (MSD)Musculoskeletal Disorder (MSD)• Repetitive Strain Injury (RSI)Repetitive Strain Injury (RSI)• Carpal Tunnel Syndrome (CTS)Carpal Tunnel Syndrome (CTS)
Hand ExercisesHand Exercises
• Computer Vision Syndrome (CVS)Computer Vision Syndrome (CVS) Techniques to ease eyestrainTechniques to ease eyestrain
Thomson Course TechnologyThomson Course Technology
Health IssuesHealth Issues
ErgonomicsErgonomics• An applied science devoted to An applied science devoted to
incorporating comfort, efficiency, and incorporating comfort, efficiency, and safety into the design of items in the safety into the design of items in the workplaceworkplace
Thomson Course TechnologyThomson Course Technology
Emerging TechnologiesEmerging Technologies
The Web offers enormous potential The Web offers enormous potential for expanding the classroomfor expanding the classroom
Thomson Course TechnologyThomson Course Technology
Emerging TechnologiesEmerging Technologies
The World Wide WebThe World Wide Web• Most K-12 schools are on the InternetMost K-12 schools are on the Internet• The federal government is committed to The federal government is committed to
high-speed Internet access in every high-speed Internet access in every classroomclassroom
• Speed will increaseSpeed will increase• Full-motion video on demandFull-motion video on demand• Instant access to Web-based Instant access to Web-based
educational programseducational programs
Thomson Course TechnologyThomson Course Technology
Emerging TechnologiesEmerging Technologies
Educational Software on DVDEducational Software on DVD• Information, graphics, animations, Information, graphics, animations,
video, and interactive linksvideo, and interactive links
Thomson Course TechnologyThomson Course Technology
Emerging TechnologiesEmerging Technologies
Assistive Assistive TechnologiesTechnologies• Technologies that Technologies that
modify or adapt the modify or adapt the classroom for classroom for special learning special learning needsneeds
• Individuals with Individuals with Disabilities Act Disabilities Act (IDEA) Amendment (IDEA) Amendment of 1997of 1997
Thomson Course TechnologyThomson Course Technology
Emerging TechnologiesEmerging Technologies
Federal Accessibility InitiativeFederal Accessibility Initiative• Technology should be available to people Technology should be available to people
with disabilitieswith disabilities• Section 508Section 508• WebXACTWebXACT
Text equivalents for all non-text elementsText equivalents for all non-text elements Summaries of graphs and chartsSummaries of graphs and charts All information displayed in color available All information displayed in color available
without colorwithout color
Thomson Course TechnologyThomson Course Technology
Emerging TechnologiesEmerging Technologies
Web- and Video-Enhanced Digital Web- and Video-Enhanced Digital TextbooksTextbooks• Web site is continuously updated and Web site is continuously updated and
maintainedmaintained Web-Based Distance LearningWeb-Based Distance Learning
• All instruction provided via the WebAll instruction provided via the Web• Still evolvingStill evolving• Useful for specialized classes not Useful for specialized classes not
available in all schoolsavailable in all schools
Thomson Course TechnologyThomson Course Technology
Florida Virtual SchoolFlorida Virtual School
Thomson Course TechnologyThomson Course Technology
Emerging TechnologiesEmerging Technologies
A World Without WiresA World Without Wires• Allows teachers and students to connect to Allows teachers and students to connect to
a truly global networka truly global network• Wireless computers will ensure that Wireless computers will ensure that
educational technology is used seamlessly educational technology is used seamlessly and at the point of instructionand at the point of instruction
• Small, inexpensive computers ensure that Small, inexpensive computers ensure that all children have access to their lessons all children have access to their lessons and the World from both home and schooland the World from both home and school
Thomson Course TechnologyThomson Course Technology
ReferenceReference
This PowerPoint is an abbreviated This PowerPoint is an abbreviated version of the one provided for this version of the one provided for this class by the textbook publisher class by the textbook publisher Thomson Course Technology.Thomson Course Technology.