Introduction to Programming

Download Report

Transcript Introduction to Programming

Educational
Computing
Computer Security
and Ethics
David Goldschmidt, Ph.D.
Computer Science
The College of Saint Rose
Firewalls

What is a firewall ?

A security system that prevents unauthorized access to
data and information on a network or computer

Prohibits access
from the Internet
Internet
Computer Security

What is computer security risk?


Any event or action that has the potential of causing a
loss or theft of computer equipment, software, data,
information, or processing capability
What is computer crime? Examples?


Any illegal act involving a computer
e.g. unauthorized access, information/identity theft,
viruses, online predators, etc.
Acceptable Use Policies (AUP)

What is an acceptable use policy?

Rules that govern the use of school and school district
computers, networks, and the Internet....

Rules concerning objectionable materials
Rules concerning copyright
Guidelines for proper use
Guidelines for online safety of
personal information
Consequences of breaking
the rules




Unauthorized Access and Use

What is unauthorized access?


Accessing a computer
or network without
permission
What is unauthorized use?

Using a computer or
data for unapproved
or illegal activities
how do you best select a password?
Viruses

What is a computer virus?




An illegal computer program that is potentially damaging
to your computer
May cause corruption
or loss of data
May cause software
to malfunction or a
system meltdown
May be a harmless prank
Viruses
Viruses
Antivirus Software

Antivirus software detects, disinfects, and protects
computers and networks from viruses
Antivirus Software

How does antivirus software work?


Detects programs attempting to write
new data to the boot program, the
operating system, etc.
Scans for known virus programs

Information about known viruses
are downloaded frequently
(daily or weekly)
Hardware Theft

Safeguard against hardware theft




Keep equipment locked up
Security systems (e.g. alarms, video monitoring)
Physical security devices
(e.g. cables, locks, etc.)
Tracking device
Software Theft

What is software theft?


Stealing software by stealing CDs or other media, or
illegally downloading and copying software
When software is purchased, the buyer typically
does not own the software!

Instead, the buyer has
purchased the right to
use the software
Software Licenses

End-user license agreement (EULA)

User may install software on only one computer




Or sometimes on one desktop and one laptop computer
User may not install software on a network
for multi-user use
User may make one copy of software for
backup purposes
User may not give copies to friends and colleagues
Software Licenses
also freeware or shareware
Information Theft

Information and identity theft have
become growing concerns



Theft of credit card or bank account numbers
Theft of social security numbers
Theft of other private information


e.g. financial aid, grades, courses, library records, etc.
How can a school, organization, or individual
prevent information theft?
Information Theft

Organizations can prevent information theft by:



Not storing sensitive data (e.g. credit card numbers,
social security numbers)
Encrypting data
that is stored
Maintaining firewalls
and other network
security measures
Phishing

What is phishing?

A scam in which an official-looking e-mail or Web site
attempts to
obtain personal
information
Spam

What is spam?

Unsolicited e-mail messages selling products or services,
promoting (potentially phony) business opportunities, or
advertising offensive materials

For more information, check out:
http://www.strose.edu/officesandresources/technology_services/networkphones/livenetworkstatistics
Computer Ethics

What is computer ethics?

Moral guidelines that govern the use of computers,
networks, and information systems

Unauthorized access and use
Hardware, software, and information theft
Information privacy
Copyright
Existence of inappropriate materials on the Internet




Computer Ethics

U.S. government laws concerning privacy:
Computer Ethics

U.S. government laws concerning privacy (cont.):
Computer Ethics

U.S. government laws concerning privacy (cont.):
Objectionable Materials

What types of objectionable materials are
available on the Internet?





Racist, sexist, or otherwise discriminatory materials
easy to identify
Pornographic materials
Gambling Web sites
Age-restricted materials (e.g. cigarettes, alcohol, etc.)
Incorrect or inaccurate information
Objectionable Materials

Government initiatives

Children’s Internet Protection Act (2000)


Protect children from obscene, pornographic, and other
information considered harmful to minors
Filtering software prevents Web browsers from displaying
materials from targeted sites or sites containing certain
keywords
Objectionable Materials

Parental controls via rating systems


Internet Content Rating Association (ICRA)
Web browser
reads rating of
Web pages,
and reacts
accordingly
Objectionable Materials

Parental controls via filtering software

Net Nanny

Relevant
age groups?