1 / 0

Computer Safety and Ethics

Computer Safety and Ethics. Morrison / Wells. Introduction. As a computer user, you have certain responsibilities that govern your use of technology, including the following guidelines and policies, exercising ethical conduct online, and maintaining a safe work environment. 2. 2.

elana
Download Presentation

Computer Safety and Ethics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Safety and Ethics

    Morrison / Wells
  2. Introduction As a computer user, you have certain responsibilities that govern your use of technology, including the following guidelines and policies, exercising ethical conduct online, and maintaining a safe work environment. 2 2
  3. Computer Security Risks

  4. Security Risks Wireless networks create serious risks if it is not properly secured. Examples- Your next door neighbor can easily use your broadband connection if it is not password protected. This normally does not cause harm or damage to your network, but it could slow down your Internet access. Or you could be charged for actual usage, which would mean additional costs. 4 4
  5. Security Risks (continued) Example—an unauthorized used could also tap into your connection for illegal or criminal activity. If the unauthorized user is part of the network and is working behind a gateway device, any activity coming from the intruder could appear to be coming from your computer, meaning you could be held responsible for the illegal activity. 5 5
  6. Security Risks Example—An intruder could connect directly to your computer, bypassing any firewalls. Once connected, the intruder can scrutinize your computer for personal information such as tax records and other personal information. The intruder could use a sniffer to find usernames and passwords. 6 6
  7. Security Risks (continued) A sniffer is a program that hackers use to capture IDs and passwords on a network. To access an unsecured wireless connection, a hacker only needs a computer with a wireless network card and eavesdropping software that can be downloaded free from the internet. 7 7
  8. Using Network Protection Change your default password (write it down so that you can refer to it if needed. Turn on some form of encryption—several forms of encryption technologies are available Turn off the network during extended periods when you are not using it. 8 8
  9. Computer Hacking Hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system. Hackers usually are computer experts who enjoy having the power to invade someone else’s privacy. They can steal, change or damage data stored on a computer. 9 9
  10. Security Risks (continued) Most servers have built-in security features, but they need to be turned on and the server’s security setting configured. Firewalls are essential. 10 10
  11. Internet and Network Attacks Every unprotected computer is susceptible to the first type of computer security risk---a computer virus, worm and/ Trojan horse.
  12. Viruses A computer virus is a program that has been written, usually by a hacker, to cause corruption of data on a computer. 12 12
  13. Viruses (continued) How a virus can spread 13 13
  14. Worm Worms makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks and don’t have to attach themselves to other files to infect your computer.
  15. Trojan Horse A Trojan horse is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse.
  16. Malware Computer viruses, worms, and Trojan horses are classified as malware (short for malicious software), which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. A keylogger is a malicious program that records keystrokes.
  17. Avoiding Data Loss Save frequently and back up data regularly. 17 17
  18. Safeguarding Against Software Threats To protect against viruses: use strong passwords, Never open an e-mail attachment unless you are expecting it and it is from a trusted source, Install a personal firewall program, download and install the latest security updates for your operating system, and use an up-to-date antivirus program. 18 18
  19. Safeguarding Against Software Threats A firewall is hardware and/or software that protects the network’s resources from intrusion by users on another network such as the Internet. All networked and online computer users should implement a firewall solution. Currently, more than 180,000 known viruses, worms, and Trojan horse programs exist.
  20. Preserving Privacy Any time you submit information on the Internet, it can possibly be gathered and used. Phishing attempts to steal private data by posing as a trustworthy entity. Phishing message 20 20
  21. Preserving Privacy (continued) Cookies and Spyware: Clean up unnecessary cookies on your computer frequently with a utility program. Spyware tracks your Web habits and can be harmful as well as annoying. Avoiding spyware infection 21 21
  22. Securing Data The best way to protect data is to effectively control the access to it using passwords or login information. 22 22
  23. Safeguarding Against Software Threats
  24. Using the Internet Safely and Legally Information on the safe use of computers can be found on numerous Web sites, in books and magazines, and other similar media. 24 24
  25. Technology Changes and Individual Responsibilities It is your responsibility to stay informed about changes and advancements in computer technology, product upgrades, and virus threats. Be a responsible computer user by recycling products such as paper and ink cartridges and donating unneeded computer hardware. Consider volunteering to help others learn to use computers effectively. 25 25
  26. Network Types

  27. Network Types Networks are divided into two main types: local area networks (LANs) and wide area networks (WANs). 27 27
  28. Network Types (continued) Local Area Networks: Most LANs connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area. Wireless LAN 28
  29. Network Types (continued) Wide Area Networks: A WAN covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries. Network types include: Client/server network: Server manages resources Peer-to-peer network: All computers are equal Intranet: Used within an organization Extranet: Specific outside users can access Internet: Global network allows worldwide connection 29 29
  30. Health Concerns of Computer Users

  31. Maintaining a Safe Computing Environment Make sure you use a computer in a way that supports your comfort, health, and safety. Sitting in the same position for long periods of time causes muscle fatigue and discomfort. Staring at a computer screen can cause eye strain Change your position as you use a computer to encompass a range of motion and sight. 31 31
  32. Maintaining a Safe Computing Environment Pay attention to your posture, lighting, and activity level. Avoid setting a notebook computer directly on your lap or on a soft, flexible surface such as a cushion, which might obstruct air vents and cause the computer to overheat. Use a cooling pad to keep air flowing around the notebook and the battery or AC adapter 32 32
  33. Introduction Accidents can happen anywhere. YOU keep our learning environment safe! Remember......SAFETY
  34. General Office Safety Common causes of office accidents include the following Slipping, tripping, and falling hazards Burning, cutting, and pinching hazards Improper lifting and handling techniques Unobservant and inattentive people Improper office layout and arrangements Dangerous electrical wiring
  35. Falls Trips and falls are the number one cause of accidents in the classroom. Falls are one of the most common accidents anywhere!
  36. What about Falls? Statistics show that the majority (60 percent) of falls happen on the same level resulting from slips and trips. The remaining 40 percent are falls from a height.
  37. What causes same level falls? Wet floors Cluttered floors Tripping over one’s own feet
  38. Prevent Slipping and Tripping! Keep aisles, walkways and stairs free of clutters. Make wider turn around corners to see who is coming towards you. If you spot a spill, clean it up or report it immediately. When walking on a slippery surface, slow down and take smaller steps and keep a hand free for balance.
  39. Prevent Slipping and Tripping! Walk, never run in halls and classrooms. Don’t change direction suddenly or stop quickly. Wear the right kind of shoes and keep the soles clean for better traction. Choose shoes that fit, and tie your shoe laces. Keep aisles and walkways clear. Good housekeeping is everyone’s job!
  40. Preventing Cuts and Punctures Cuts and punctures happen when people use everyday office supplies without exercising care. Tips: When sealing envelopes, use a liquid dispenser, not your tongue. Be careful when using scissors, staples, letter openers and box openers. Avoid picking up broken glass with your hands.
  41. Chair Safety Never lean back in a chair--you could do a “sitting back flip.” Never roll your chair around the classroom--you could do a “moving back flip.”
  42. Reaching High Whenever you need to reach a height, use a stool or stepladder. NEVER stand on chairs, especially those with wheels!
  43. Maintaining a Safe Computing Environment Review product safety guidelines provided with your computer and any electronic devices. If you are maintaining computer equipment yourself, pay attention to icons and other symbols that warn about the hazards of electrical shock, excessive heat or sharp edges. 43 43
  44. Computer Safety Hazards of working with a computer are divided into two areas: physical; and psychological The piece of equipment which causes the most problems is the monitor.
  45. Physical Problems Eye problems The most severe eye problem in working with the monitor is eyestrain. Some computer users suffer from eyestrain, blurred vision, and burning eyes.
  46. Physical Problems What causes eye problems? Lighting conditions: less light is needed to operate computers. Windows create a glare on the monitor. Bright colors of walls. Small fonts. Improper machine maintenance.
  47. Are you at risk? Working at the computer can cause problems such as: eyestrain persistent fatigue back pain tendonitis Carpal Tunnel Syndrome
  48. Computer Related Injuries Avoid or minimize eyestrain by using a high-resolution monitor, providing adequate and properly positioned lighting and take regular breaks to allow eye muscles to relax. 48 48
  49. Physical Stress Physical stress and eye problems are closely related because both problems are caused by poor design and improper use of equipment. Can cause back, neck, and shoulder pain as well as headaches and fatigue. Posture is very important to avoid physical stress and a serious medical condition later.
  50. Preventing Stress To prevent stress and prevent fatigue, it is important to take mini-breaks (not many breaks) Or a quick pick-me-up,, breath deeply several times by inhaling through your nose and exhaling through your mouth.
  51. Certain postures are uncomfortable and hazardous to your health. The following may lead to a serious condition: Working with inadequate back support Head tilted back or forward Shoulders hunched Wrists bent Feet unsupported Postural Hazards
  52. Psychological Stress Examples are: Pressure of a supervisor watching you work. Timed writings. Fear of computers taking over jobs. Fear of not making production. Boring, repetitive tasks.
  53. A Healthy, Efficient Work Environment Includes: A smoke-free workplace; Noise control; No obstacles over which to trip; No visual distractions
  54. Computer Related Injuries Take precautions to avoid eyestrain, back problems, and repetitive strain injury (RSI), which can result when a person makes too many of the same motions over a long period of time. A well-designed work area, use of ergonomic furniture, good posture, and changing positions throughout the day are effective ways to minimize these types of injuries. 54 54
  55. Internet Safety

    Standard A7, E5, E6 Ms. C. Brailsford Taken from InternetSafety101.org
  56. What is Social Networking? Social network is a Virtual Communities Used to: Chat, IM, post pictures and videos, and blog (journal) They provide access to real-time and asynchronous communication features; blogging tools; photo-, music-, and video-sharing features; and the ability to post original creative work—all linked to a unique profile that can be customized and updated on a regular basis
  57. Dangers of Social Networking Public profiles put kids at a much greater risk to: Receive a message from a stranger Meet with a stranger Be harassed by peers
  58. Dangers of Social Networking Other concerns of social networking sites: Lack of age-verification mechanisms  Posting provocative pictures and videos Easy access for predators and cyberbullies Excessive or addictive access Access to unhealthy “groups”
  59. Video Networking Online video networking sites like YouTube and Ustream allow anyone to upload and share videos they produce, copy or find.  People who view the videos can also generally share the videos with friends, link to other videos, rate videos and post comments about the videos. 
  60. Statistics 72% of teens have a social networking profile and nearly half (47%) have a public profile viewable by anyone. Teens often include the following information on their social networking profiles:[4] o   Real age (50%) o   Photos of themselves (62%) o   City they live in (41%) o   School name/location (45%) o   Videos of friends (16%) o   Videos of themselves (14%) o   Their cell phone number (14%) o   Places where they typically go (9%)
  61. Stats continued 59% of teens perceive that public blogs or social networking sites are unsafe. 76% of teens are at least somewhat concerned that posting information publicly could negatively impact future. 26% of teens know someone something bad has happened to because of information or photos posted online
  62. Tips for Social Networking Be careful about what you post.  Harassment, inappropriate content, hate speech and the like should never be posted on video and social networking sites and should be reported if ever encountered.  People aren’t always who they say they are.  Only add people to your friends list and your video network that you know in the real life. 
  63. Tips for Social Networking Be honest about your age. Be aware of phishing scams and other ploys to get your personal information: Never supply personal information to anyone through social networking sites.  Only post videos that your parents approve.
  64. Cyberbullying Cyberbullying is willful and repeated harm (i.e., harassing, humiliating, or threatening text or images) inflicted through the Internet, interactive technologies, or mobile phones.
  65. Stats on Cyberbullying 43% of teens aged 13 to 17 report that they have experienced some sort of cyberbullying in the past year.  More girls are cyberbullys than boys (59% girls and 41% boys). Cyberbullies spend more time online than other teens overall (38.4 hours compared to 26.8 hours). Cyberbullies are more likely to have engaged in sexting (31% vs. 19% for teens overall). 34% of those who have had any engagement in cyberbullying have been both a cyberbully and been cyberbullied.
  66. Stats on Cyberbullying 68% of teens agree that cyberbullying is a serious problem with today’s youth. Reasons cyberbullies said they engaged in cyberbullying: o   To show off to friends (11%) o   To be mean (14%) o   Something else (16%) o   To embarrass them (21%) o   For fun or entertainment (28%) o   They deserved it (58%) o   To get back at someone (58%)
  67. Stats on Cyberbullying 81% of youth agree that bullying online is easier to get away with than bullying in person.  80% think it is easier to hide online bullying from parents than in-person bullying. Cyberbulling Video
  68. Mobile Devices The development of new technologies including portable music devices, gaming devices, mobile phones and PDAs has increased the benefits and the threats that children face.  These threats include: Easy access to pornography, violent content and other inappropriate sites Cyberbullying and harassment Contact by a sexual predator Picture and video uploads (youth use camera and video functions on their cell phones to take and post inappropriate and sexual content)
  69. Mobile Devices Direct access to social networking sites Texting while driving/distracted driving Addictions Sexting Difficulty for parents to monitor content and contacts accessed Phone scams, which are designed to steal personal details or money, often via text. You might not know you or your children have been scammed, so it’s important to check invoices or online statements carefully for any unusual charges
  70. Mobile Devices Tips for Teens:  Be smart. Don’t text and drive. No text message is worth being distracted while you drive. Be in control. Remember it’s your phone. You decide if and when to send and read texts so take control. Consider turning your phone off, setting it to silent or even storing it in the glove box before hitting the road. Be caring. Never send a text message to a friend that is driving to meet you, or to anyone you know is likely behind the wheel. Be a BFF. Friends don’t let each other text and drive.
More Related