lesson 30 computer safety and ethics

22
1 Lesson 30 Computer Safety and Ethics Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition Morrison / Wells

Upload: travis-bright

Post on 30-Dec-2015

34 views

Category:

Documents


1 download

DESCRIPTION

Lesson 30 Computer Safety and Ethics. Computer Literacy BASICS: A Comprehensive Guide to IC 3 , 3 rd Edition. Morrison / Wells. Objectives. Explain how to maintain a safe working environment and use computer equipment in a way that prevents personal injury - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Lesson 30 Computer Safety and Ethics

1

Lesson 30Computer Safety and Ethics

Computer Literacy BASICS: A Comprehensive Guide to IC3, 3rd Edition

Morrison / Wells

Page 2: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E222

Objectives

Explain how to maintain a safe working environment and use computer equipment in a way that prevents personal injury

Identify injuries that can result from the use of computers for long periods of time

Identify software threats and risks to data Understand methods you can use to prevent data loss Identify various security measures

Page 3: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E333

Objectives (continued)

Identify the principles regarding when information can or cannot be considered personal

Identify the risks associated with electronic commerce Understand how computer use can affect your privacy

and personal security Identify how to stay informed about changes and

advancements in technology Understand how to be a responsible user of

computers

Page 4: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Vocabulary

browser hijacking brute force attacks hacking hardware firewall keylogger private key public key repetitive strain injury

(RSI)

Secure Sockets Layer (SSL)

sniffer spyware strong password Transport Layer Security

(TLS)

444

Page 5: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Introduction

As a computer user, you have certain responsibilities that govern your use of technology, including the following guidelines and policies, exercising ethical conduct online, and maintaining a safe work environment.

555

Page 6: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Maintaining a Safe Computing Environment

Make sure you use a computer in a way that supports your comfort, health, and safety.

Pay attention to your posture, lighting, and activity level.

Review product safety guidelines provided with your computer and any electronic devices.

666

Page 7: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Computer Related Injuries

Take precautions to avoid eyestrain, back problems, and repetitive strain injury (RSI), which can result when a person makes too many of the same motions over a long period of time.

A well-designed work area, use of ergonomic furniture, good posture, and changing positions throughout the day are effective ways to minimize these types of injuries.

777

Page 8: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Security Risks

Wireless networks create serious risks if it is not properly secured.

Using Network Protection: Password-protect your wireless network and

turn on some form of encryption. Computer Hacking: Use firewalls to prevent hackers from

invading computers.

888

Page 9: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Security Risks (continued)

Avoiding Data Loss:

Save frequently and back up data regularly.

999

Page 10: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Security Risks (continued)

Safeguarding Against Software Threats:

To protect against viruses, use strong passwords, download and install the latest security updates for your operating system, and use an up-to-date antivirus program.

101010

Page 11: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Access Restrictions

System administrators and users often restrict access to files, storage devices, various computers, networks, the Internet, or specific Internet sites to protect data and other users.

Firewalls do not protect data from employees. When using software to monitor computer

usage, protecting users should be balanced with preserving privacy.

111111

Page 12: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Private Property—But Not Yours

Generally, any information gathered from a company’s computer system is company property and not an individual worker’s personal property.

Many organizations have computer network usage policies that provide guidelines for using the organization’s systems ethically, professionally, and legally.

121212

Page 13: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

E-Commerce Issues

Before providing personal or credit card information on an e-commerce site, verify that the site is secure.

TSL and SSL technology enables encryption of sensitive information by establishing a private communication channel.

To protect private information:– Use a secure browser– Check privacy policies– Keep personal information private

131313

Page 14: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Preserving Privacy

Any time you submit information on the Internet, it can possibly be gathered and used.

Phishing attempts to steal private data by posing as a trustworthy entity.

141414

Phishing message

Page 15: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Preserving Privacy (continued)

Cookies and Spyware:

Clean up unnecessary cookies on your computer frequently with a utility program.

Spyware tracks your Web habits and can be harmful as well as annoying.

151515

Avoiding spyware infection

Page 16: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Securing Data

The best way to protect data is to effectively control the access to it using passwords or login information.

161616

Page 17: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Using the Internet Safely and Legally

Information on the safe use of computers can be found on numerous Web sites, in books and magazines, and other similar media.

171717

Page 18: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E

Technology Changes and Individual Responsibilities

It is your responsibility to stay informed about changes and advancements in computer technology, product upgrades, and virus threats.

Be a responsible computer user by recycling products such as paper and ink cartridges and donating unneeded computer hardware.

Consider volunteering to help others learn to use computers effectively.

181818

Page 19: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E1919

Summary

In this lesson, you learned: Make sure you use a computer in a way that

supports your comfort, health, and safety. When you use a computer, take precautions to avoid chronic physical maladies such as repetitive motion injuries, eyestrain, and back problems that can arise over time. Ergonomic design, which adapts equipment and the workplace to fit the worker, can help to prevent repetitive strain injuries.

19

Page 20: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E2020

Summary (continued)

When setting up your wireless network, your first step should be to change the default password to protect access to the network.

Computer hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system.

To avoid data loss, you can use techniques and devices for preventing power interruptions. You can also devise and follow a regular procedure for backing up your data.

20

Page 21: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E2121

Summary (continued)

A virus is a program that has been written, usually by a hacker, to corrupt data on a computer. The virus is attached to a file and spreads from one file to another once the program is executed. To protect your computer against virus damage, use up-to-date antivirus software, download and install security updates for your operating system, and avoid opening files sent via e-mail from people you do not know.

System administrators and users often restrict access to files, storage devices, various computers, networks, the Internet, or specific Internet sites.

21

Page 22: Lesson 30 Computer Safety and Ethics

Le

sso

n 3

0

Morrison / Wells CLB: A Comp Guide to IC3 3E2222

Summary (continued)

If you work for a company that provides you with e-mail services, the information you send is available to the company and is the company’s property.

TSL and SSL technology enables encryption of sensitive information by establishing a private communication channel. Data transmitted through this channel is encrypted during transmission.

Nearly all schools, government agencies, companies, libraries, and other similar institutions have written policies and guidelines regarding Internet usage.

22