3.05 protect your computer and information unit 3 internet basics

14
3.05 Protect Your Computer and 3.05 Protect Your Computer and Information Information Unit 3 Unit 3 Internet Basics Internet Basics

Upload: lewis-hopkins

Post on 04-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

3.05 Protect Your Computer and Information3.05 Protect Your Computer and Information

Unit 3 Unit 3 Internet BasicsInternet Basics

Page 2: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Introduction• Many consumers enjoy sharing digital files, such as music, movies, photos,

and software. • File-sharing software that connects your computer to a network of

computers is often available for free. • File-sharing can pose several risks.

– When connected to a file-sharing network, you may allow others to copy files you didn’t intend to share.

– You might download a virus or bit of spyware that makes your computer vulnerable to hackers.

– You might also break the law by downloading material that is copyright protected.

Page 3: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Introduction• At the end of this lesson, student will be able to:

– Practice safe, ethical, and legal use of technology systems and digital content. (ACOS 13)

– Explain consequences of unsafe and illegal use of technology systems and digital content (ACOS 13.B1)

Page 4: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Lesson

• A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer.

• Hackers search the Internet the way some telemarketers automatically dial random phone numbers.

• They send out pingscalls to thousands of computers and wait for responses. • Firewalls prevent your computer from responding to these random calls. • A firewall blocks communications to and from sources you don’t permit. • To avoid spyware in the first place, download software only from sites you know

and trust. • Piggybacking spyware can be an unseen cost of many “free” programs. • Don’t click on links in pop-up windows or in spam email.

Page 5: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Lesson• 4 steps to protect your computer

– Keep firewall turned on – Keep software & operating system up-to-date – Keep antivirus software up to date – Keep antispyware technology up to date

Page 6: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Lesson• Firewalls

– Firewalls restrict network traffic which can pass through them, based on a set of system administrator defined rules

– A firewall consists of • a server (with special software) connected on one side to the external network (usually the

Internet) • and on the other side to the computer system being protected. • All incoming and outgoing data between the protected computer system and the network

passes through the firewall • The firewall server

– accepts connection requests – decides whether the connection should be made – and, if permissible, completes the connection

– A firewall helps protect your computer from hackers who might try to delete information crash your computer or even steal your passwords or credit card numbers

Page 7: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Lesson• Antivirus software

– Consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware)

– To cause problems in software or hardware, a virus program has to run (execute its code)

– Antivirus software, which detects and eliminates viruses before they run, is the only way to protect computers against damage.

Page 8: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Lesson• Consequences of

Unsafe and Illegal Use of Technology – Identity theft – Hard drive crashes; loss of information – You can become a victim of

• Online predator • cyberbullying

Page 9: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Lesson• How to Protect Yourself

– Only open emails from trusted sources – Be aware of phishing schemes – Keep antivirus software updated – Keep firewall turned on – Never give out personal information – If you are a victim, tell your parent or a teacher

Page 10: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Review

• Here are some steps you can take to protect your computer and your data: – keep firewall turned on – keep software/operating system and antivirus/antispyware software

up to date. – frequently back up your computer files because data may be

destroyed, your hard drive may crash, or your laptop stolen.

Page 11: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Task

• Pretend that you are having a debate on School Internet Use and Computer Security.

• On each of the issues below, pick a side—you are either for or against the issue.

• In a debate, you must abide by the one-sentence rule, which means that you must make your point clear in one sentence only.

• When the opposing side makes a statement in which you disagree, you may have a one-sentence rebuttal.

• Here is an example of a statement for the side that more computer security is needed: “Copying downloaded music is illegal.”

• Here is an example of a statement that less computer security is needed: “Information should be shared to enhance society.”

Page 12: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Task cont.• Issues

1. Since classroom computers are for educational purposes only, your teacher has the right and the responsibility to read your computer files. Should your teacher read your files?

2. Should students and even teachers be prevented from installing software on their school computers?

3. Should your school block MP3 files? 4. Should your teachers allow you to visit Facebook/MySpace?

Page 13: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Task cont.

• Decide which side you are on for each of the four issues on the previous slide.

• These responses must follow this format: – “I agree because (and state why)” OR – “I disagree because (and state why)”.

• Type your responses in Microsoft Word– Save to your F Drive in your Unit 3 Folder as

• 3.05 Discussion: Computer Security

Page 14: 3.05 Protect Your Computer and Information Unit 3 Internet Basics

Are you finished?• You should have 15 things saved on your F Drive in your Unit 3

Folder.1. 3.01 Network Tutorial2. 3.01 How Networks Work3. 3.01 History and Internet Dropbox4. 3.02 Skills Check 35. 3.02 Boolean QC Chart6. 3.02 How Stuff Works Brain Quiz7. 3.02 Searching the Web Dropbox8. 3.03 Intel Education9. 3.03 Tutorial for Info Power10. 3.03 Side Trip11. 3.03 Evaluating Web Sites Dropbox12. 3.04 On Guard Online Spyware Quiz13. 3.04 Practice14. 3.04 Vocabulary Practice15. 3.05 Discussion: Computer Security

• So, are you finished?