24
Computer Ethics Ms. Scales

Computer Ethics Ms. Scales. Computer Ethics Ethics the right thing to do Acceptable Use Policy A set of rules and guidelines that are set up to regulate

Embed Size (px)

Citation preview

Computer Ethics

Ms. Scales

Computer Ethics

Ethics the right thing to do

Acceptable Use Policy A set of rules and guidelines that are set up to

regulate Internet use and to protect the user. Also use to delegate general computer usage.

Code of Conduct The way we conduct ourselves in society

Computer Conduct Netiquette

A new term the refers to how you present yourself and treat others when online

Privacy The ability to keep yourself and your information

private from others

Protecting Your Computer

Online Safety Precautions taken to protect personal information

and images from being misused by others. Security Protection

of computer, computer files, or a computer network form use without permission of the owners

Password

A Code for the security protection to allow access to a computer or the computer programs.

Tips for Passwords: Mix of caps, lower case, numbers, symbols At least 8 character long Change it on a regular basis NEVER share your passwords with ANYONE

Malicious Conduct

Malicious Conduct Intentional destruction of another’s property with

disregard of consequences to others Vandalism

The intentional act of destroying computer files or computer networks

Examples… Identity Theft

Claiming someone else’s identity through their personal information, such as SS#, bank account #, etc…

Hacker An unauthorized person who secretly gains

access to other’s computers/ computer files. Software Piracy

Illegally copying software, distributing, and/or selling it.

Most Common Dangers Virus

A file that is meant to cause malicious harm to your computer These use to be really obvious when your computer

is infected, but these days the creator of these viruses have more sneaky plans sometimes

Worms These are files that replicate themselves from

one machine to another with out the need to be downloaded from the internet.

Typically are sent as attachments in emails

More dangers Trojans

These act like another type of file, but are really opening a backdoor on your computer to allow a hacker to gather information or to use your computer for other malicious activity, such as spamming, or hacking

Spyware A generic term for malicious software that ends up on your

computer to gather information about you and other files on your computer such as personal information, credit card information,

websites you have visited

More dangers

Backdoor A way into your computer, bypassing the normal

authentication procedures, this allows hackers to use your computer as they see fit

Downloaders This allows someone to download files from your

computer to their computer

More dangers

Hijackers These take control of various parts of your web

browser to redirect you to other websites that you were not trying to go to

Keyloggers This a malware that captures the keystrokes you

use from your keyboard and save them to send to a hacker later on.

Typically they are trying to find credit card numbers, social security numbers, pin numbers, usernames, and passwords

More dangers

Spybot These send information from your computer to

interested parties about your activities to gather info about you

Adbots These deliver unwanted advertisements to your

computers, think pop up! Though not usually harmful, can usually indicated more issues

Use of Social Networking sites Profile should be set to “Private” Never accept a friend request from someone

you don’t know, even if you have mutual friends.

Never give someone information about yourself unless you know them

Beware of predators

Internet Safety

Never open a program or file downloaded from the internet unless the source is trusted.

Beware of Malware Malware infiltrates your computer without

your knowledge Often steals information from the user

(passwords, etc.) Have an anti-malware program (Norton

Antivirus, etc.)

A few facts

19% of teens feel safer on line than in the real world 39% of students say they trust who they are chatting

with online 24% of students say they see nothing wrong with

chatting with a stranger online 10% of students have been asked to keep a

relationship online a secret

Children between 8 and 18 spend over an hour a day online

74% have a computer with internet access

Personal Information

Full name Age Address Phone number Parent’s names School Work info Passwords Usernames Mother’s Maiden nam

Once you have given it out, you can never take it back

You should only trust your parents online with personal info

Avoid putting personal photos online

Usernames and Profiles

Make them unique and generic Provide only the required information Resist the temptation to revel personal

information through usernames and profiles

Online Friends

Don’t ever meet people you only know online in person

You have NO idea who the person you are talking to online really is

Online friends are still strangers

Cyber bullying

More likely to occur online than in person (42% of students have been cyber bullied)

Avoid cyber bullying: Being kind to others online as well as in person Don’t type in ALL CAPS Don’t send messages with angry

Always tell an adult if you are being cyber bullied (58% of students don’t report it)

Free Stuff Online

Nothing is “free” on the internet Usually your personal information is at risk in

these situations Typically there are long term hidden costs Can lead to identity theft, viruses, having your

personal info sold

Attachments

These are added files to emails Sometimes can be real or legit stuff Could be a method to infect your computer

with a virus Only open an attachment from a email

address you and know and if the email looks ok (sometimes people’s emails get hacked)]

NEVER EVER open an .exe attachment (watch for these type of links too)

Online Protection

Use Antivirus software Use Adware and spyware software Update these programs regularly Run scans of your computer at least weekly