Introduction to Programming
Download
Report
Transcript Introduction to Programming
Educational
Computing
Computer Security
and Ethics
David Goldschmidt, Ph.D.
Computer Science
The College of Saint Rose
Firewalls
What is a firewall ?
A security system that prevents unauthorized access to
data and information on a network or computer
Prohibits access
from the Internet
Internet
Computer Security
What is computer security risk?
Any event or action that has the potential of causing a
loss or theft of computer equipment, software, data,
information, or processing capability
What is computer crime? Examples?
Any illegal act involving a computer
e.g. unauthorized access, information/identity theft,
viruses, online predators, etc.
Acceptable Use Policies (AUP)
What is an acceptable use policy?
Rules that govern the use of school and school district
computers, networks, and the Internet....
Rules concerning objectionable materials
Rules concerning copyright
Guidelines for proper use
Guidelines for online safety of
personal information
Consequences of breaking
the rules
Unauthorized Access and Use
What is unauthorized access?
Accessing a computer
or network without
permission
What is unauthorized use?
Using a computer or
data for unapproved
or illegal activities
how do you best select a password?
Viruses
What is a computer virus?
An illegal computer program that is potentially damaging
to your computer
May cause corruption
or loss of data
May cause software
to malfunction or a
system meltdown
May be a harmless prank
Viruses
Viruses
Antivirus Software
Antivirus software detects, disinfects, and protects
computers and networks from viruses
Antivirus Software
How does antivirus software work?
Detects programs attempting to write
new data to the boot program, the
operating system, etc.
Scans for known virus programs
Information about known viruses
are downloaded frequently
(daily or weekly)
Hardware Theft
Safeguard against hardware theft
Keep equipment locked up
Security systems (e.g. alarms, video monitoring)
Physical security devices
(e.g. cables, locks, etc.)
Tracking device
Software Theft
What is software theft?
Stealing software by stealing CDs or other media, or
illegally downloading and copying software
When software is purchased, the buyer typically
does not own the software!
Instead, the buyer has
purchased the right to
use the software
Software Licenses
End-user license agreement (EULA)
User may install software on only one computer
Or sometimes on one desktop and one laptop computer
User may not install software on a network
for multi-user use
User may make one copy of software for
backup purposes
User may not give copies to friends and colleagues
Software Licenses
also freeware or shareware
Information Theft
Information and identity theft have
become growing concerns
Theft of credit card or bank account numbers
Theft of social security numbers
Theft of other private information
e.g. financial aid, grades, courses, library records, etc.
How can a school, organization, or individual
prevent information theft?
Information Theft
Organizations can prevent information theft by:
Not storing sensitive data (e.g. credit card numbers,
social security numbers)
Encrypting data
that is stored
Maintaining firewalls
and other network
security measures
Phishing
What is phishing?
A scam in which an official-looking e-mail or Web site
attempts to
obtain personal
information
Spam
What is spam?
Unsolicited e-mail messages selling products or services,
promoting (potentially phony) business opportunities, or
advertising offensive materials
For more information, check out:
http://www.strose.edu/officesandresources/technology_services/networkphones/livenetworkstatistics
Computer Ethics
What is computer ethics?
Moral guidelines that govern the use of computers,
networks, and information systems
Unauthorized access and use
Hardware, software, and information theft
Information privacy
Copyright
Existence of inappropriate materials on the Internet
Computer Ethics
U.S. government laws concerning privacy:
Computer Ethics
U.S. government laws concerning privacy (cont.):
Computer Ethics
U.S. government laws concerning privacy (cont.):
Objectionable Materials
What types of objectionable materials are
available on the Internet?
Racist, sexist, or otherwise discriminatory materials
easy to identify
Pornographic materials
Gambling Web sites
Age-restricted materials (e.g. cigarettes, alcohol, etc.)
Incorrect or inaccurate information
Objectionable Materials
Government initiatives
Children’s Internet Protection Act (2000)
Protect children from obscene, pornographic, and other
information considered harmful to minors
Filtering software prevents Web browsers from displaying
materials from targeted sites or sites containing certain
keywords
Objectionable Materials
Parental controls via rating systems
Internet Content Rating Association (ICRA)
Web browser
reads rating of
Web pages,
and reacts
accordingly
Objectionable Materials
Parental controls via filtering software
Net Nanny
Relevant
age groups?