Upload
avis-barrett
View
215
Download
0
Embed Size (px)
Citation preview
Computer Ethics
Ethics the right thing to do
Acceptable Use Policy A set of rules and guidelines that are set up to
regulate Internet use and to protect the user. Also use to delegate general computer usage.
Code of Conduct The way we conduct ourselves in society
Computer Conduct Netiquette
A new term the refers to how you present yourself and treat others when online
Privacy The ability to keep yourself and your information
private from others
Protecting Your Computer
Online Safety Precautions taken to protect personal information
and images from being misused by others. Security Protection
of computer, computer files, or a computer network form use without permission of the owners
Password
A Code for the security protection to allow access to a computer or the computer programs.
Tips for Passwords: Mix of caps, lower case, numbers, symbols At least 8 character long Change it on a regular basis NEVER share your passwords with ANYONE
Malicious Conduct
Malicious Conduct Intentional destruction of another’s property with
disregard of consequences to others Vandalism
The intentional act of destroying computer files or computer networks
Examples… Identity Theft
Claiming someone else’s identity through their personal information, such as SS#, bank account #, etc…
Hacker An unauthorized person who secretly gains
access to other’s computers/ computer files. Software Piracy
Illegally copying software, distributing, and/or selling it.
Most Common Dangers Virus
A file that is meant to cause malicious harm to your computer These use to be really obvious when your computer
is infected, but these days the creator of these viruses have more sneaky plans sometimes
Worms These are files that replicate themselves from
one machine to another with out the need to be downloaded from the internet.
Typically are sent as attachments in emails
More dangers Trojans
These act like another type of file, but are really opening a backdoor on your computer to allow a hacker to gather information or to use your computer for other malicious activity, such as spamming, or hacking
Spyware A generic term for malicious software that ends up on your
computer to gather information about you and other files on your computer such as personal information, credit card information,
websites you have visited
More dangers
Backdoor A way into your computer, bypassing the normal
authentication procedures, this allows hackers to use your computer as they see fit
Downloaders This allows someone to download files from your
computer to their computer
More dangers
Hijackers These take control of various parts of your web
browser to redirect you to other websites that you were not trying to go to
Keyloggers This a malware that captures the keystrokes you
use from your keyboard and save them to send to a hacker later on.
Typically they are trying to find credit card numbers, social security numbers, pin numbers, usernames, and passwords
More dangers
Spybot These send information from your computer to
interested parties about your activities to gather info about you
Adbots These deliver unwanted advertisements to your
computers, think pop up! Though not usually harmful, can usually indicated more issues
Use of Social Networking sites Profile should be set to “Private” Never accept a friend request from someone
you don’t know, even if you have mutual friends.
Never give someone information about yourself unless you know them
Beware of predators
Internet Safety
Never open a program or file downloaded from the internet unless the source is trusted.
Beware of Malware Malware infiltrates your computer without
your knowledge Often steals information from the user
(passwords, etc.) Have an anti-malware program (Norton
Antivirus, etc.)
A few facts
19% of teens feel safer on line than in the real world 39% of students say they trust who they are chatting
with online 24% of students say they see nothing wrong with
chatting with a stranger online 10% of students have been asked to keep a
relationship online a secret
Children between 8 and 18 spend over an hour a day online
74% have a computer with internet access
Personal Information
Full name Age Address Phone number Parent’s names School Work info Passwords Usernames Mother’s Maiden nam
Once you have given it out, you can never take it back
You should only trust your parents online with personal info
Avoid putting personal photos online
Usernames and Profiles
Make them unique and generic Provide only the required information Resist the temptation to revel personal
information through usernames and profiles
Online Friends
Don’t ever meet people you only know online in person
You have NO idea who the person you are talking to online really is
Online friends are still strangers
Cyber bullying
More likely to occur online than in person (42% of students have been cyber bullied)
Avoid cyber bullying: Being kind to others online as well as in person Don’t type in ALL CAPS Don’t send messages with angry
Always tell an adult if you are being cyber bullied (58% of students don’t report it)
Free Stuff Online
Nothing is “free” on the internet Usually your personal information is at risk in
these situations Typically there are long term hidden costs Can lead to identity theft, viruses, having your
personal info sold
Attachments
These are added files to emails Sometimes can be real or legit stuff Could be a method to infect your computer
with a virus Only open an attachment from a email
address you and know and if the email looks ok (sometimes people’s emails get hacked)]
NEVER EVER open an .exe attachment (watch for these type of links too)