24
Issues for Computer Users, Electronic Devices, Computer and Safety

Issues for Computer Users, Electronic Devices, Computer and Safety

  • Upload
    hawa

  • View
    52

  • Download
    1

Embed Size (px)

DESCRIPTION

Issues for Computer Users, Electronic Devices, Computer and Safety. Objectives. Summarize the dangers of sharing personal information on the Internet. Explain how cookies and global unique identifiers endanger privacy. Identify techniques that intruders use to attack computer systems. - PowerPoint PPT Presentation

Citation preview

Page 1: Issues for Computer Users, Electronic Devices, Computer and Safety

Issues for Computer Users, Electronic Devices, Computer and Safety

Page 2: Issues for Computer Users, Electronic Devices, Computer and Safety

Objectives Summarize the dangers of sharing personal

information on the Internet.

Explain how cookies and global unique identifiers endanger privacy.

Identify techniques that intruders use to attack computer systems.

Discuss different types of cybercrime.

Summarize how computer crime costs businesses money.

Page 3: Issues for Computer Users, Electronic Devices, Computer and Safety

Objectives Describe ways criminals obtain passwords.

Discuss ways to protect your computer from being accessed by others.

Explain the criteria of a strong password.

Summarize ways to stay safe online.

Cyber Bullying

Computer Ethics You Tube Video

Page 4: Issues for Computer Users, Electronic Devices, Computer and Safety

Key Terms

Global Unique Identifier (GUID)

Computer Crime

Cybercrime

Downtime

Identity Theft

Phishing

Page 5: Issues for Computer Users, Electronic Devices, Computer and Safety

Key Terms

Scanning

Software Piracy

Spoof

Virus

Worm

Trojan Horse

Page 6: Issues for Computer Users, Electronic Devices, Computer and Safety

Key Terms

Time Bomb

Computer Crime and Intellectual Property Section (CCIPS)

Computer Hacking and Intellectual Property Project (CHIP)

National Infrastructure Protection Center (NIPC)

Page 7: Issues for Computer Users, Electronic Devices, Computer and Safety

Introduction

Computers are tools and, like other tools,

they are controlled by the person using them.

People can use computers to learn, to

communicate, and to have fun. However, people

can also use computers to snoop into another

person’s private life or to commit crimes.

Page 8: Issues for Computer Users, Electronic Devices, Computer and Safety

Privacy Online

Privacy in Cyberspace

Many consumers share personal informationabout themselves, their habits, and theirfinances. Sometime, however, such informationis gathered without a person’s knowledge orapproval.

Page 9: Issues for Computer Users, Electronic Devices, Computer and Safety

Privacy OnlinePrivacy in Cyberspace

New Technology and Your Privacy

Cookies is a small file that is saved to your harddrive when you visit some Web sites. Cookiesgives Web sites a way of storing information aboutyou in return.

Global Unique Identifiers is a unique identificationnumber that is generated by a piece of hardware orby a program.

Page 10: Issues for Computer Users, Electronic Devices, Computer and Safety

Used to set the level of your Internet

Security

Page 11: Issues for Computer Users, Electronic Devices, Computer and Safety

All About Cybercrime

Cybercrime Techniques

Many cybercrimes are based on the ability ofpeople to tap illegally into computer

networks. They may create a virus, worm, or TrojanHorse program to infiltrate computers anddamage or delete data. Viruses aredestructive computer programs that canmove from one operating system to another.

Page 12: Issues for Computer Users, Electronic Devices, Computer and Safety

All About Cybercrime

Cybercrime Techniques

Scanning - intruders develop programs that try

many different passwords until one works.

However, networks can be blocked from scanners

by limiting the number of failed attempts to log

onto the system. After three password failures, for

instance, the network can refuse access.

Page 13: Issues for Computer Users, Electronic Devices, Computer and Safety

All About Cybercrime

Spoofing – intruders use a false Internet Protocol

(IP) or e-mail address to gain access. Intruders

assume the IP address of a trusted source to enter a

secure network and distribute e-mails contain

Viruses.

Page 14: Issues for Computer Users, Electronic Devices, Computer and Safety

All About Cybercrime

Phishing – criminals use an official-looking e-mail

to lure victims into giving personal data such as

user name, passwords, bank account numbers,

or credit card details.

Time Bombs – are malicious programs is activated

by an event or set of circumstances.

Page 15: Issues for Computer Users, Electronic Devices, Computer and Safety

All About Cybercrime

Types of Cybercrime

Fraud – When someone steals your personalinformation, he or she can impersonate you andmake credit card purchases in your name or accessyour bank accounts. This is called Identity theft.

Software piracy – is the illegal copying of computerprograms. Software piracy affects software publishers. They lose money when people use illegal copies ofprograms to avoid paying for legitimate copies

Page 16: Issues for Computer Users, Electronic Devices, Computer and Safety

All About CybercrimeTypes of Cybercrime

Cyber-bullying – is the use of the Internet and

related technologies to harm or harass other people,

in a deliberate, repeated, and hostile manner. As it has

become more common in society, particularly among

young people, legislation and awareness campaigns have

arisen to combat it.

http://www.youtube.com/watch?v=IPHpx9wefig

Page 17: Issues for Computer Users, Electronic Devices, Computer and Safety

The High Cost of Computer Crimes

The Internet has opened the door to new

kinds of crime and new ways of carrying out

traditional crimes. Cyber Crimes involves

using the Internet. Computer crime is any

act that violates state or federal laws and

involves using a computer. Computer crime

causes businesses to lose money in the

following ways.

Page 18: Issues for Computer Users, Electronic Devices, Computer and Safety

The High Cost of Computer Crimes

Downtime – workers cannot work because a

network is temporarily not available. A

company can lose business if customers are

affected by downtime.

Page 19: Issues for Computer Users, Electronic Devices, Computer and Safety

Fighting CybercrimesThere are several government organizations that

assist in fighting Cybercrimes.

Computer Crime and Intellectual Property section

(CCIPS) – The Department of Justice created a

special group to advise and train federal

prosecutors and local law enforcement on

Cybercrime.

Page 20: Issues for Computer Users, Electronic Devices, Computer and Safety

Fighting Cybercrimes

Computer Hacking and Intellectual Property

section (CHIP) – law enforcement officials and

prosecutors work together to pursue cybercrime.

National Infrastructure Protection Center (NIPC) –

ensures that the nation’s computer system could

continue to operate in the case of an attack.

Page 21: Issues for Computer Users, Electronic Devices, Computer and Safety

Avoiding CybercrimePassword Theft

Many computer crimes start when an unauthorizeduser hacks, or gains unauthorized entry, into acomputer network. This often happens when theintruder learns the password to access the victim’scomputer and the network. Following are wayssuch criminals learn passwords. Packet sniffers –method of finding another’s passwords and cardnumbers.

Page 22: Issues for Computer Users, Electronic Devices, Computer and Safety

Protecting Your Personal Data

Using Strong Password – Whenever you create a

password, don’t use things like family names, four

letter nicknames, or birth dates. You should use a

combination of at least six to ten Upper - and

lowercase letters, numbers, and symbols (*, #, $,

%, or &).

Page 23: Issues for Computer Users, Electronic Devices, Computer and Safety

Protecting Your Personal Data

Avoid Site Registration – do not fill out a

registration form unless the site clearly says that

the data will not be shared with other people

without your approval.

Page 24: Issues for Computer Users, Electronic Devices, Computer and Safety

Cyber Etiquette for Students

http://www.youtube.com/watch?v=swi2Ukr6XZ4