ict competency lu8 computer security privacy and ethics
DESCRIPTION
TMX1022 LU8 Computer Security Privacy and EthicsTRANSCRIPT
![Page 1: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/1.jpg)
TMX1022 ICT CompetencyLearning Unit 8: Computer Security, Privacy and
EthicsSemester 2, 2015/2016
![Page 2: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/2.jpg)
Learning OutcomesBy the end of this unit, students will be able to:• Explain the concept of computer security and ethics• Identify the types of threats and the measures to
protect the computer from those threats• Discuss security measures for common security
issues• Explain the concept of privacy, intellectual property
and copyrights• Apply proper security and ethical steps in daily
computing• Demonstrate the best practices of netiquettes online
![Page 3: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/3.jpg)
3
OUTLINE• What is Computer Security?• What are types of threats?• How can we protect our computer from these
threats?• What are Privacy, Ethics and Netiquettes ?
![Page 4: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/4.jpg)
4
What is Computer Security?
“Techniques for ensuring that data stored in a computer cannot be read or compromised by any
individuals without authorization”
(Retrieved from www.webopedia.com)
![Page 5: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/5.jpg)
5
What are the common threats of security?
![Page 6: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/6.jpg)
6
Common ThreatsHuman Errors• Accidentally deleting data• Physically damaging the computer Theft• Physical theft - Steal the computer or its component• Virtual theft - Stealing and assuming other person’s
identity without consent and also software piracy
![Page 7: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/7.jpg)
5
Malware
• Malware or malicious code (malcode) is short for malicious software.
• It is code or software that is specifically designed to damage, disrupt, steal, or inflict some other “bad” or illegitimate action on data, hosts, or networks.
• Three of the most common types of malware:– Viruses– Worms– Trojan
![Page 8: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/8.jpg)
8
Viruses
• A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program.
• It spreads from one computer to another, leaving infections as it travels.
• Almost all viruses exists in executable file.
![Page 9: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/9.jpg)
9
• Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.
![Page 10: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/10.jpg)
10
Worms
• Computer worms are similar to viruses • they replicate functional copies of themselves – can cause the same type of damage.
• worms are standalone software – do not require a host program or human help to
propagate.
![Page 11: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/11.jpg)
11
Trojan
• another type of malware named after the wooden horse the Greeks used to infiltrate Troy.
• It is a harmful piece of software that looks legitimate.
• Trojans do not reproduce by infecting other files nor do they self-replicate.
![Page 12: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/12.jpg)
12
• Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.
![Page 13: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/13.jpg)
13
What are the security measures to overcome these threats ?
![Page 14: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/14.jpg)
14
Security Measures
• Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
• Never open an e-mail attachment unless you are expecting it and it is from a trusted source
• Install a personal firewall program• Stay informed about the new virus alerts and
virus hoaxes
![Page 15: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/15.jpg)
15
Macro Security Settings
• Set the macro security in programs so that you can enable or disable macros.
• Enable macros only if the document is from a trusted source and you are expecting it.
![Page 16: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/16.jpg)
16
Antivirus Software
• Install an antivirus program on all of your computers.
• Update the software regularly• Scan all downloaded programs for viruses and
other malware• If the antivirus program flags an e-mail
attachment as infected, delete or quarantine the attachment immediately
![Page 17: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/17.jpg)
17
What are Privacy, Ethics and Netiquettes?
![Page 18: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/18.jpg)
18
Internet Privacy
• Internet privacy or online privacy covers the right of a person to have a "private space" or personal privacy in terms of storing or displaying of information pertaining to oneself on the Internet.
• It is the control of what a person can share online.
![Page 19: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/19.jpg)
19
Intellectual Property
• intangible property that is the result of creativity, such as patents, copyrights, etc.
• IP is more difficult to be protected. • IP cannot be simply recovered if it is stolen. • It will take more efforts to to protect an IP. • It would be hard for you to know it until
someone else reports it to you or your discover it online.
![Page 20: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/20.jpg)
20
Copyrights
• a legal right that allows the creator of an original work to have the exclusive rights to its use and distribution, usually for a limited time
• Copyrighted works or materials which are stolen and reproduced are known as "piracy" or "plagiarism".
![Page 21: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/21.jpg)
21
Creative Commons
• Creative Commons is established to allow creators to communicate which rights they reserve, and which rights they waive for the benefit of recipients or other creators.
• It is not as strict as copyrights.
![Page 22: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/22.jpg)
22
Plagiarism
• Plagiarism is the practice of taking someone else's work or ideas and passing them off as one's own
• This happens when you copied someone's work or idea without acknowledging or getting the permission from the original author
![Page 23: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/23.jpg)
23
Computer Ethics
• Ethics is a set of moral principles that govern the behavior of a group or individual.
• Computer ethics is set of moral principles that regulate the use of computers.
![Page 24: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/24.jpg)
KCEA 2009: Computation Thinking
Situations that require ethical decision
• Software copyrights• privacy • conflict of interest• use of work computers• software quality• hacking • social responsibility
![Page 25: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/25.jpg)
Unit 5: Information Systems
• Confidentiality: Obligation not to disclose willingly any information that should be kept private.
• Personal use of employer’s equipment and computer facilities could lead to a conflict of interest.
![Page 26: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/26.jpg)
26
How do I make ethical decisions?
• Take time to think of the situation and consequences before making a decision
• Gather relevant information from reliable sources.
• Talk to people whose judgement your respect• Consult a guidelines or code of professional
ethics
![Page 27: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/27.jpg)
Netiquettes
• Online jargon for Internet etiquette• A series of customs or guidelines for
maintaining civilized and effective communications in online discussions and e-mail exchanges
![Page 28: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/28.jpg)
Principles of Netiquette
• Put a meaningful title on the subject line• Use uppercase and lowercase letters• Check spelling• Be careful what you send• Be polite
![Page 29: Ict competency LU8 Computer Security Privacy and Ethics](https://reader035.vdocuments.site/reader035/viewer/2022070508/577c78641a28abe0548fe75e/html5/thumbnails/29.jpg)
29
• Be cautious when using sarcasm and humor• Notify recipients of viruses• Use smiley and text messaging shorthand
cautiously• Use the Bcc function for group mailings• Don’t send replies to all recipients.