Unit 15- Technology in Society-Safety

Download Report

Transcript Unit 15- Technology in Society-Safety

TECHNOLOGY IN SOCIETY,
SAFETY & ETHICS
Unit 15
Objectives
■
■
■
■
■
■
■
Describe how devices are commonly used in daily life
Identify security risks and protect data
Restrict access to devices and protect against viruses
Confirm e-commerce safety
Protect your privacy on the Internet
Maintain a healthy computing environment
Explain why it’s important to use computers legally and
responsibly
Computers in Everyday Life
■ What is e-commerce?
– Business/Shopping online
■ What does the cashier do with your food at Shop Rite?
– Scan it with optical laser
■ What is the cashier’s computer system called?
– POS System- Point of Sale System
■ When you use the ATM or a credit card, what does the
machine read on your card?
– Magnetic strip or chip
■ What do you call people who work from home?
– Telecommuting
Addressing Security Risks
■ Avoid Data Loss
– Battery backup UPS
– Backup files
■ Restrict Access
– Use firewall
– Use strong passwords
■ Protect Against Malware
– Use anti-virus software
■ Use Secure Websites
Network Security Solutions
■ Be careful who you hire
– People who don’t follow rules
■ Back up data off-site
■ Biometric security
– Fingerprint reader
– Voice pattern
– Retina scan
Passwords
■ Don’t use easy, common words
■ Mistakes:
Password Tips
■ Most common password is…password
– Also 123456
Top 25 worst
passwords of 2015
■ Tips & Advice:
Strong Password
Checker from
Microsoft
Viruses
■ Program written to cause disruption
– Attached to a file or email
– Spreads
■ Worm- copies itself across network & slows it down
■ Time Bomb- damage at certain time/date
■ Trojan Horse- looks like something good, but isn’t
■ Protect with Antivirus software
– Update regularly
– Be careful opening emails
– Scan attachments first
Virus Protection
■ Prevents virus install &
helps remove it
■ Enable auto-update
– New virus’ made everyday
■ Be careful what you
download
– AV might not catch them
all
■ Name some AV software
Unwanted Email
■ Spam
– Unsolicited ads
– Don’t reply to junk emails
■ Typically, an e-mail message is sent to multiple recipients who did not ask to
receive it.
■ E-mail messages are not considered spam if a user has signed up to
receive them.
Spam
■ Spammers collect email addresses from:
– Chatrooms, websites, customer lists, viruses getting them
from your address book, other spammers that sell lists
■ Spam:
– Advertises products & services that may not be real
– Collects email addresses to sell to other spammers
– May put malware on your PC
Spam Facts- FYI
■ 1978 - An e-mail spam is sent to 600 addresses
■ 1994 - First large-scale spam sent to 6000 newsgroups, reaching millions of
people.
■ 2005 - 30 billion per day
■ 2006 - 55 billion per day
■ 2013- 97 billion per day
■ 90% of email sent is spam!
Spam
■ Be careful giving out your email
– Do not publish it online
■ Check privacy statements
– They may share your email address
■ DO NOT reply to junk mails
– They’ll know they have a valid email
address
– You’ll get more junk!
■ Use the junk email filter
Phishing
■ Steals your personal info
– Spoofed sites & emails
■
■
■
■
Emails that appear to come from original source
Asks you to change password
Link takes you to copied site
User collects your info
Spam vs. Phishing
■ How does it arrive?
■ Spam: Sneaks in the back door
■ Phishing: Walks in the front door
■ How does it make its offer?
■ Spam: Looks bad, seems far-fetched
■ Phishing: Looks plausible, seems credible
■ What is it trying to do?
■ Spam: Tries to sell you something /steal email
■ Phishing: Tries to steal information/identity from you
Review
■ What’s worse, spam or phishing?
■ Let’s Play
–
–
–
–
Phishing Scams- Avoid the Bait
Spam Scam Slam
Follywood Squares
Phishing IQ Test
Secure Sites- TLS & SSL
■ Password DOES NOT mean secure
■ Secure Socket Layer (SSL)
– Encrypts the data (credit card #’s, etc.)
– URL will begin with https://
■ Log Off after leaving site
– Why?
Secure Sites
Online Buying Advice
■ Use a PC you know is secure
■ Make sure firewalls & anti-virus software are enabled
■ Make sure AutoComplete is on if you are not using your PC
■ Buy from reputable websites
■ Make sure store is secure
■ Review the privacy policy so you know what they do with your
personal information
■ Log off at end of session
Safe Guidelines
■ Virus program scan all emails (in & out)
■ Virus program subscription
– Schedule scan
■ Review emails & IMs before sending
– ISP can filter emails as well
■ Understand netiquette & company rules
■ Encrypt emails with private info
■ Save & backup your emails
– Remember the “paper trail”
■ Follow laws
Review
■ T or F. Email paper trails cannot be used as legal documents.
■ Junk email is also called _______.
■ ______ refers to good manners when communicating electronically.
■ ______ tries to get/steal your private info.
■ ______ is just annoying!
Cookies
■ Many sites require cookies
– Small text file
– Stored on your HD
■ Contains customer id info
– Personalizes your web visit
– When you visit the site, the ID# in cookie is sent to web site to
look up history of your past visits
■ Profiles are formed from your activities
Cookie Example- Good Cookie
Cookie Example- Third Party Cookie
■ Hosting the banner on servers and using third-party cookies, an
advertising company is able to track the browsing of users across
these two sites.
Cookie Example
Play Video
Cookie Options in Browser
■ Tools, Internet Options,
Privacy Tab
■ Delete: Tools, Internet
Options, Browsing History,
Delete
Review- 4Q
■ Where are cookies stored?
– On your HD
■ Why are 3rd party cookies bad?
– The ads follow you
■ What is contained in cookies?
– Customer ID #
■ Where can you delete cookies in IE?
– Tools, Internet Options, Browsing History
Injuries
■ Repetitive Strain Injury (RSI)/Carpal Tunnel
–
–
–
–
–
Repeated motions of joints
Game players, constant users
Take breaks, walk around, stretch
Use ergonomic furniture
Eye strain (lighting, breaks)
Techniques to Avoid Injury
■ Sit straight
■ Feet flat on floor
■ Wrist up- not resting on
keyboard
■ Don’t look at keyboard
■ Elbows bent at 90 degree
angle
■ Sit about arm’s length
from monitor
Exercising Ethical Behavior
■ Proper behavior
– Follow rules & consider how your actions will affect others
■ Use software legally
– Follow EULA
Extra Stuff 1- Traceroute
■ Traceroute (tracert)
– A test to show the path data travels through routers
– Also confirms connectivity
Extra Stuff 2- IP Address
■ What’s your IP Address?
– At Command Prompt, type ipconfig
– In Windows, go to Network & Sharing Center, click name of
your network in “View Your Active Networks” and click Details
Extra Stuff 3- Twitter
■ Tweeps
– Twitter followers
■ Twitterati
– Twitter users who attract thousands of followers
■ Tweetup
– Meetup of people who use Twitter
TECHNOLOGY IN SOCIETY,
SAFETY & ETHICS
Unit 15