ict competency lu8 computer security privacy and ethics
DESCRIPTION
TMX1022 LU8 Computer Security Privacy and EthicsTRANSCRIPT
TMX1022 ICT CompetencyLearning Unit 8: Computer Security, Privacy and
EthicsSemester 2, 2015/2016
Learning OutcomesBy the end of this unit, students will be able to:• Explain the concept of computer security and ethics• Identify the types of threats and the measures to
protect the computer from those threats• Discuss security measures for common security
issues• Explain the concept of privacy, intellectual property
and copyrights• Apply proper security and ethical steps in daily
computing• Demonstrate the best practices of netiquettes online
3
OUTLINE• What is Computer Security?• What are types of threats?• How can we protect our computer from these
threats?• What are Privacy, Ethics and Netiquettes ?
4
What is Computer Security?
“Techniques for ensuring that data stored in a computer cannot be read or compromised by any
individuals without authorization”
(Retrieved from www.webopedia.com)
5
What are the common threats of security?
6
Common ThreatsHuman Errors• Accidentally deleting data• Physically damaging the computer Theft• Physical theft - Steal the computer or its component• Virtual theft - Stealing and assuming other person’s
identity without consent and also software piracy
5
Malware
• Malware or malicious code (malcode) is short for malicious software.
• It is code or software that is specifically designed to damage, disrupt, steal, or inflict some other “bad” or illegitimate action on data, hosts, or networks.
• Three of the most common types of malware:– Viruses– Worms– Trojan
8
Viruses
• A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program.
• It spreads from one computer to another, leaving infections as it travels.
• Almost all viruses exists in executable file.
9
• Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.
10
Worms
• Computer worms are similar to viruses • they replicate functional copies of themselves – can cause the same type of damage.
• worms are standalone software – do not require a host program or human help to
propagate.
11
Trojan
• another type of malware named after the wooden horse the Greeks used to infiltrate Troy.
• It is a harmful piece of software that looks legitimate.
• Trojans do not reproduce by infecting other files nor do they self-replicate.
12
• Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.
13
What are the security measures to overcome these threats ?
14
Security Measures
• Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
• Never open an e-mail attachment unless you are expecting it and it is from a trusted source
• Install a personal firewall program• Stay informed about the new virus alerts and
virus hoaxes
15
Macro Security Settings
• Set the macro security in programs so that you can enable or disable macros.
• Enable macros only if the document is from a trusted source and you are expecting it.
16
Antivirus Software
• Install an antivirus program on all of your computers.
• Update the software regularly• Scan all downloaded programs for viruses and
other malware• If the antivirus program flags an e-mail
attachment as infected, delete or quarantine the attachment immediately
17
What are Privacy, Ethics and Netiquettes?
18
Internet Privacy
• Internet privacy or online privacy covers the right of a person to have a "private space" or personal privacy in terms of storing or displaying of information pertaining to oneself on the Internet.
• It is the control of what a person can share online.
19
Intellectual Property
• intangible property that is the result of creativity, such as patents, copyrights, etc.
• IP is more difficult to be protected. • IP cannot be simply recovered if it is stolen. • It will take more efforts to to protect an IP. • It would be hard for you to know it until
someone else reports it to you or your discover it online.
20
Copyrights
• a legal right that allows the creator of an original work to have the exclusive rights to its use and distribution, usually for a limited time
• Copyrighted works or materials which are stolen and reproduced are known as "piracy" or "plagiarism".
21
Creative Commons
• Creative Commons is established to allow creators to communicate which rights they reserve, and which rights they waive for the benefit of recipients or other creators.
• It is not as strict as copyrights.
22
Plagiarism
• Plagiarism is the practice of taking someone else's work or ideas and passing them off as one's own
• This happens when you copied someone's work or idea without acknowledging or getting the permission from the original author
23
Computer Ethics
• Ethics is a set of moral principles that govern the behavior of a group or individual.
• Computer ethics is set of moral principles that regulate the use of computers.
KCEA 2009: Computation Thinking
Situations that require ethical decision
• Software copyrights• privacy • conflict of interest• use of work computers• software quality• hacking • social responsibility
Unit 5: Information Systems
• Confidentiality: Obligation not to disclose willingly any information that should be kept private.
• Personal use of employer’s equipment and computer facilities could lead to a conflict of interest.
26
How do I make ethical decisions?
• Take time to think of the situation and consequences before making a decision
• Gather relevant information from reliable sources.
• Talk to people whose judgement your respect• Consult a guidelines or code of professional
ethics
Netiquettes
• Online jargon for Internet etiquette• A series of customs or guidelines for
maintaining civilized and effective communications in online discussions and e-mail exchanges
Principles of Netiquette
• Put a meaningful title on the subject line• Use uppercase and lowercase letters• Check spelling• Be careful what you send• Be polite
29
• Be cautious when using sarcasm and humor• Notify recipients of viruses• Use smiley and text messaging shorthand
cautiously• Use the Bcc function for group mailings• Don’t send replies to all recipients.