SlideShare a Scribd company logo
1 of 25
Lesson 31
Computer Safety
and Ethics
Computer Literacy
BASICS: A
Comprehensive Guide
to IC3, 4th Edition

1

Morrison / Wells
Objectives



Lesson 31



2





Maintain a safe computing environment.
Prevent computer-related injuries.
Identify security risks.
Set access restrictions.
Understand workplace privacy.
Avoid e-commerce problems.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Objectives (continued)



Lesson 31



Protect privacy on the Internet.
Use the Internet safely and legally.
Practice responsibility as a computer user.

3

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Vocabulary




Lesson 31



4





browser hijacking
brute force attacks
hacking
hardware firewall
keylogger
private key
public key

Morrison / Wells








repetitive strain
injury (RSI)
sniffer
spyware
strong password
Transport Layer
Security (TLS)
CLB: A Comp Guide to IC3 4E
Maintaining a Safe Computing
Environment


Lesson 31






5

Make sure you use a computer in a way that
supports your comfort, health, and safety.
Pay attention to your posture, lighting, and
activity level.
Review product safety guidelines provided
with your computer or any other electronic
device.
See www.osha.gov for guidelines.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Preventing Computer-Related
Injuries

Lesson 31



6

Take precautions to
avoid chronic physical
maladies such as
eyestrain, back
problems, and repetitive
strain injury (RSI), which
can result when a person
makes too many of the
same motions over a
long period of time.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Security Risks

Lesson 31



7




An intruder could use a sniffer, which is a
program that hackers use to capture user
names and passwords on a network.
Using Network Protection:
When setting up a wireless network, change
the default password and turn on some form
of encryption.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Security Risks
(continued)


Lesson 31



8



Computer Hacking:
Computer hacking involves invading
someone else’s computer, usually for
personal gain or the satisfaction of defeating
a security system.
If the network is large, a hardware firewall
that controls the computers from one point
should be implemented.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Security Risks
(continued)


Lesson 31



9




Avoiding Data
Loss:
Save frequently.
Use surge
protectors.
Back up important
files regularly.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Security Risks
(continued)

Lesson 31



10



Safeguarding Data
Against Software
Threats:
Use strong
passwords, install
latest security
updates, use an upto-date antivirus
program.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Security Risks
(continued)


Lesson 31







11

Safeguarding Data Against Software Threats
(continued):
A strong password is both complex and secure.
Strong passwords are more resistant to brute
force attacks, which use a script or program to
log on to an account using hundreds of words or
phrases stored in a dictionary file.
A keylogger is a malicious program that records
keystrokes.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Identifying Security Risks
(continued)


Lesson 31



12



Safeguarding Data
Against Software Threats
(continued):
Hackers often use spyware
to control your browser, a
practice called browser
hijacking.
You can also use
antispyware software such
as Windows Defender to
protect your system.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Setting Access Restrictions

Lesson 31



13



System administrators and users often
restrict access to files, storage devices,
computers, networks, the Internet, or specific
Internet sites to protect data and other users.
Software is available that lets you monitor
computer usage, including Web sites, e-mail
messages, social networks, instant
messaging and chats, and applications.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Understanding Workplace Privacy

Lesson 31



14



Any information gathered from a company’s
computer system is company property and
not an individual worker’s personal property.
The employee normally has no right to
personal privacy regarding those issues.
Many organizations have computer or
network usage policies that provide
guidelines for using the organization’s
systems ethically, professionally, and legally.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Avoiding E-Commerce Problems
Before providing personal information or
credit card information on an e-commerce or
similar site, first verify that the site is secure.

Lesson 31



15

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Avoiding E-Commerce Problems
(continued)

Lesson 31



16



Several companies provide a Transport Layer
Security (TLS) or Secure Sockets Layer (SSL)
certificate for e-commerce sites, sites that
process sensitive data, and sites that require
privacy and security requirements.
An SSL certificate consists of a public key and
a private key. The public key encrypts
information and the private key deciphers the
information.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Protecting Privacy on the Internet
Phishing is a type of computer fraud that
attempts to steal your private data.

Lesson 31



17

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Protecting Privacy on the Internet
(continued)


Lesson 31








18

Cookies and Spyware:
Clean up the unnecessary cookies on your computer
frequently with a utility program designed for that
purpose.
Spyware can be harmful as well as annoying.
Securing Data:
The best way to protect data is to effectively control the
access to it.
Use strong passwords, use code names or aliases, and
always sign off of public computers.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Using the Internet Safely and
Legally

Lesson 31



19



Nearly all institutions
have written policies
and guidelines
regarding Internet
usage.
The Department of
Justice and other
government agencies
provide resources for
Internet safety.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Practicing Responsibility as a
Computer User

Lesson 31



20



It is your responsibility to stay informed about
changes and advancements in computer
technology, product upgrades, and virus
threats.
Recycle products such as used computer
paper and ink cartridges.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Lesson 31

Summary

21

In this lesson, you learned:
 Make sure you use a computer in a way that
supports your comfort, health, and safety. When you
use a computer, take precautions to avoid chronic
physical maladies such as repetitive motion injuries,
eyestrain, and back problems that can arise over
time. Ergonomic design, which adapts equipment
and the workplace to fit the worker, can help to
prevent repetitive strain injuries.
Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)


Lesson 31



22



When setting up your wireless network, your first
step should be to change the default password to
protect access to the network.
Computer hacking involves invading someone else’s
computer, usually for personal gain or the
satisfaction of defeating a security system.
To avoid data loss, you can use techniques and
devices for preventing power interruptions. You can
also devise and follow a regular procedure for
backing up your data.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)

Lesson 31



23

A virus is a program that has been written, usually
by a hacker, to corrupt data on a computer. The
virus is attached to a file and spreads from one
file to another when the program is executed. To
protect your computer against virus damage, use
up-to-date antivirus software, download and
install security updates for your operating system,
and avoid opening files sent via e-mail from
people you do not know.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)

Lesson 31



24



System administrators and users often
restrict access to files, storage devices,
various computers, networks, the Internet, or
specific Internet sites.
If you work for a company that provides you
with e-mail services, the information you
send is available to the company and is the
company’s property.

Morrison / Wells

CLB: A Comp Guide to IC3 4E
Summary (continued)

Lesson 31



25



TSL and SSL technology enables encryption of
sensitive information by establishing a private
communication channel. Data transmitted
through this channel is encrypted during
transmission.
Nearly all schools, government agencies,
companies, libraries, and other similar
institutions have written policies and guidelines
regarding Internet usage.

Morrison / Wells

CLB: A Comp Guide to IC3 4E

More Related Content

What's hot

Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31cpashke
 
IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)
IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)
IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)Leonel Rivas
 
TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1Leonel Rivas
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systemscpashke
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersAlithea Barbosa
 
LAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative TechnologyLAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative TechnologyAbdullah Al Mamun
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network securityTrishla Thakur
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Manila Central University
 
Modern computer network technologies
 Modern computer network technologies Modern computer network technologies
Modern computer network technologiesSujon Kumar Dey
 
Chapter 7
Chapter 7Chapter 7
Chapter 7uabir
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletPittock
 
WiFi for mobile networks
WiFi for mobile networksWiFi for mobile networks
WiFi for mobile networkst_bindseil
 

What's hot (20)

Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
 
IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)
IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)
IP Addressing Semi - Detailed Lesson Plan (TLE ICT 10)
 
TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1TLE ICT CSS 10 Information and task sheet 2.1 day 1
TLE ICT CSS 10 Information and task sheet 2.1 day 1
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Computer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating SystemsComputer Literacy Lesson 1: Computer and Operating Systems
Computer Literacy Lesson 1: Computer and Operating Systems
 
Campus Area Network Security
Campus Area Network SecurityCampus Area Network Security
Campus Area Network Security
 
Synopsis
SynopsisSynopsis
Synopsis
 
Computer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answersComputer Worksheet Class 8 with answers
Computer Worksheet Class 8 with answers
 
LAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative TechnologyLAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative Technology
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
 
Modern computer network technologies
 Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
network
networknetwork
network
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Consider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutletConsider introducing the overall objective of the network design/tutorialoutlet
Consider introducing the overall objective of the network design/tutorialoutlet
 
WiFi for mobile networks
WiFi for mobile networksWiFi for mobile networks
WiFi for mobile networks
 
Pace IT - Introduction to_IPv4 (part 1)
Pace IT - Introduction to_IPv4 (part 1)Pace IT - Introduction to_IPv4 (part 1)
Pace IT - Introduction to_IPv4 (part 1)
 

Similar to Lesson 31

Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30cpashke
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdfFahadZaman38
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacythinkict
 
Meeting 15. network security
Meeting 15. network securityMeeting 15. network security
Meeting 15. network securitySyaiful Ahdan
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 

Similar to Lesson 31 (20)

Computer Literacy Lesson 30
Computer Literacy Lesson 30Computer Literacy Lesson 30
Computer Literacy Lesson 30
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Lesson 03
Lesson 03Lesson 03
Lesson 03
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Notacd02
Notacd02Notacd02
Notacd02
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Notacd02
Notacd02Notacd02
Notacd02
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
 
Meeting 15. network security
Meeting 15. network securityMeeting 15. network security
Meeting 15. network security
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 

More from Tracie King

The career search project
The career search projectThe career search project
The career search projectTracie King
 
The career search project word
The career search project wordThe career search project word
The career search project wordTracie King
 
Roles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamRoles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamTracie King
 
Interface: Creating the connection
Interface: Creating the connectionInterface: Creating the connection
Interface: Creating the connectionTracie King
 
Gameplay: Creating the Experience
Gameplay:  Creating the ExperienceGameplay:  Creating the Experience
Gameplay: Creating the ExperienceTracie King
 
Game Story and Character Development
Game Story and Character DevelopmentGame Story and Character Development
Game Story and Character DevelopmentTracie King
 
Production and Management: Developing the Process
Production and Management: Developing the ProcessProduction and Management: Developing the Process
Production and Management: Developing the ProcessTracie King
 
98 374 Lesson 02-slides
98 374 Lesson 02-slides98 374 Lesson 02-slides
98 374 Lesson 02-slidesTracie King
 
98 374 Lesson 01-slides
98 374 Lesson 01-slides98 374 Lesson 01-slides
98 374 Lesson 01-slidesTracie King
 
98 374 Lesson 06-slides
98 374 Lesson 06-slides98 374 Lesson 06-slides
98 374 Lesson 06-slidesTracie King
 
98 374 Lesson 05-slides
98 374 Lesson 05-slides98 374 Lesson 05-slides
98 374 Lesson 05-slidesTracie King
 
98 374 Lesson 04-slides
98 374 Lesson 04-slides98 374 Lesson 04-slides
98 374 Lesson 04-slidesTracie King
 
98 374 Lesson 03-slides
98 374 Lesson 03-slides98 374 Lesson 03-slides
98 374 Lesson 03-slidesTracie King
 

More from Tracie King (20)

The career search project
The career search projectThe career search project
The career search project
 
The career search project word
The career search project wordThe career search project word
The career search project word
 
Roles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the TeamRoles and Responsibilities: Developing the Team
Roles and Responsibilities: Developing the Team
 
Interface: Creating the connection
Interface: Creating the connectionInterface: Creating the connection
Interface: Creating the connection
 
Gameplay: Creating the Experience
Gameplay:  Creating the ExperienceGameplay:  Creating the Experience
Gameplay: Creating the Experience
 
Game Story and Character Development
Game Story and Character DevelopmentGame Story and Character Development
Game Story and Character Development
 
Production and Management: Developing the Process
Production and Management: Developing the ProcessProduction and Management: Developing the Process
Production and Management: Developing the Process
 
98 374 Lesson 02-slides
98 374 Lesson 02-slides98 374 Lesson 02-slides
98 374 Lesson 02-slides
 
98 374 Lesson 01-slides
98 374 Lesson 01-slides98 374 Lesson 01-slides
98 374 Lesson 01-slides
 
98 374 Lesson 06-slides
98 374 Lesson 06-slides98 374 Lesson 06-slides
98 374 Lesson 06-slides
 
98 374 Lesson 05-slides
98 374 Lesson 05-slides98 374 Lesson 05-slides
98 374 Lesson 05-slides
 
98 374 Lesson 04-slides
98 374 Lesson 04-slides98 374 Lesson 04-slides
98 374 Lesson 04-slides
 
98 374 Lesson 03-slides
98 374 Lesson 03-slides98 374 Lesson 03-slides
98 374 Lesson 03-slides
 
Max2015 ch01
Max2015 ch01Max2015 ch01
Max2015 ch01
 
Max2015 ch03
Max2015 ch03Max2015 ch03
Max2015 ch03
 
Max2015 ch02
Max2015 ch02Max2015 ch02
Max2015 ch02
 
Max2015 ch05
Max2015 ch05Max2015 ch05
Max2015 ch05
 
Max2015 ch04
Max2015 ch04Max2015 ch04
Max2015 ch04
 
Max2015 ch06
Max2015 ch06Max2015 ch06
Max2015 ch06
 
Max2015 ch07
Max2015 ch07Max2015 ch07
Max2015 ch07
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Lesson 31

  • 1. Lesson 31 Computer Safety and Ethics Computer Literacy BASICS: A Comprehensive Guide to IC3, 4th Edition 1 Morrison / Wells
  • 2. Objectives   Lesson 31  2    Maintain a safe computing environment. Prevent computer-related injuries. Identify security risks. Set access restrictions. Understand workplace privacy. Avoid e-commerce problems. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 3. Objectives (continued)   Lesson 31  Protect privacy on the Internet. Use the Internet safely and legally. Practice responsibility as a computer user. 3 Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 4. Vocabulary    Lesson 31  4    browser hijacking brute force attacks hacking hardware firewall keylogger private key public key Morrison / Wells      repetitive strain injury (RSI) sniffer spyware strong password Transport Layer Security (TLS) CLB: A Comp Guide to IC3 4E
  • 5. Maintaining a Safe Computing Environment  Lesson 31    5 Make sure you use a computer in a way that supports your comfort, health, and safety. Pay attention to your posture, lighting, and activity level. Review product safety guidelines provided with your computer or any other electronic device. See www.osha.gov for guidelines. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 6. Preventing Computer-Related Injuries Lesson 31  6 Take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injury (RSI), which can result when a person makes too many of the same motions over a long period of time. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 7. Identifying Security Risks Lesson 31  7   An intruder could use a sniffer, which is a program that hackers use to capture user names and passwords on a network. Using Network Protection: When setting up a wireless network, change the default password and turn on some form of encryption. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 8. Identifying Security Risks (continued)  Lesson 31  8  Computer Hacking: Computer hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system. If the network is large, a hardware firewall that controls the computers from one point should be implemented. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 9. Identifying Security Risks (continued)  Lesson 31  9   Avoiding Data Loss: Save frequently. Use surge protectors. Back up important files regularly. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 10. Identifying Security Risks (continued) Lesson 31  10  Safeguarding Data Against Software Threats: Use strong passwords, install latest security updates, use an upto-date antivirus program. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 11. Identifying Security Risks (continued)  Lesson 31    11 Safeguarding Data Against Software Threats (continued): A strong password is both complex and secure. Strong passwords are more resistant to brute force attacks, which use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file. A keylogger is a malicious program that records keystrokes. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 12. Identifying Security Risks (continued)  Lesson 31  12  Safeguarding Data Against Software Threats (continued): Hackers often use spyware to control your browser, a practice called browser hijacking. You can also use antispyware software such as Windows Defender to protect your system. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 13. Setting Access Restrictions Lesson 31  13  System administrators and users often restrict access to files, storage devices, computers, networks, the Internet, or specific Internet sites to protect data and other users. Software is available that lets you monitor computer usage, including Web sites, e-mail messages, social networks, instant messaging and chats, and applications. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 14. Understanding Workplace Privacy Lesson 31  14  Any information gathered from a company’s computer system is company property and not an individual worker’s personal property. The employee normally has no right to personal privacy regarding those issues. Many organizations have computer or network usage policies that provide guidelines for using the organization’s systems ethically, professionally, and legally. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 15. Avoiding E-Commerce Problems Before providing personal information or credit card information on an e-commerce or similar site, first verify that the site is secure. Lesson 31  15 Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 16. Avoiding E-Commerce Problems (continued) Lesson 31  16  Several companies provide a Transport Layer Security (TLS) or Secure Sockets Layer (SSL) certificate for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements. An SSL certificate consists of a public key and a private key. The public key encrypts information and the private key deciphers the information. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 17. Protecting Privacy on the Internet Phishing is a type of computer fraud that attempts to steal your private data. Lesson 31  17 Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 18. Protecting Privacy on the Internet (continued)  Lesson 31      18 Cookies and Spyware: Clean up the unnecessary cookies on your computer frequently with a utility program designed for that purpose. Spyware can be harmful as well as annoying. Securing Data: The best way to protect data is to effectively control the access to it. Use strong passwords, use code names or aliases, and always sign off of public computers. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 19. Using the Internet Safely and Legally Lesson 31  19  Nearly all institutions have written policies and guidelines regarding Internet usage. The Department of Justice and other government agencies provide resources for Internet safety. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 20. Practicing Responsibility as a Computer User Lesson 31  20  It is your responsibility to stay informed about changes and advancements in computer technology, product upgrades, and virus threats. Recycle products such as used computer paper and ink cartridges. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 21. Lesson 31 Summary 21 In this lesson, you learned:  Make sure you use a computer in a way that supports your comfort, health, and safety. When you use a computer, take precautions to avoid chronic physical maladies such as repetitive motion injuries, eyestrain, and back problems that can arise over time. Ergonomic design, which adapts equipment and the workplace to fit the worker, can help to prevent repetitive strain injuries. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 22. Summary (continued)  Lesson 31  22  When setting up your wireless network, your first step should be to change the default password to protect access to the network. Computer hacking involves invading someone else’s computer, usually for personal gain or the satisfaction of defeating a security system. To avoid data loss, you can use techniques and devices for preventing power interruptions. You can also devise and follow a regular procedure for backing up your data. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 23. Summary (continued) Lesson 31  23 A virus is a program that has been written, usually by a hacker, to corrupt data on a computer. The virus is attached to a file and spreads from one file to another when the program is executed. To protect your computer against virus damage, use up-to-date antivirus software, download and install security updates for your operating system, and avoid opening files sent via e-mail from people you do not know. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 24. Summary (continued) Lesson 31  24  System administrators and users often restrict access to files, storage devices, various computers, networks, the Internet, or specific Internet sites. If you work for a company that provides you with e-mail services, the information you send is available to the company and is the company’s property. Morrison / Wells CLB: A Comp Guide to IC3 4E
  • 25. Summary (continued) Lesson 31  25  TSL and SSL technology enables encryption of sensitive information by establishing a private communication channel. Data transmitted through this channel is encrypted during transmission. Nearly all schools, government agencies, companies, libraries, and other similar institutions have written policies and guidelines regarding Internet usage. Morrison / Wells CLB: A Comp Guide to IC3 4E