Chapter 22 Computer Benefits and Risks 1

advertisement
Chapter 22
Computer Benefits and
Risks
1
What’s Inside and on the CD?
• In this chapter, you will learn:
– How computers affect society, your health, and the
environment
– About potential risks computers pose to your privacy
and security
– Tips for:
• Protecting privacy and security
• Avoiding scams
• Spotting hoaxes
• Thwarting identity thieves
Practical Computer Literacy, 2nd edition
Chapter 22
2
How do computers benefit society?
Practical Computer Literacy, 2nd edition
Chapter 22
3
How do computers benefit society?
• Computers have transformed many aspects of the way
we live:
– Socializing
– News
– Education
– Business
– Manufacturing
– Banking
– Shopping
– Travel
Practical Computer Literacy, 2nd edition
Chapter 22
4
How do computers benefit society?
• Computers of all sizes contribute to the modern digital
world
– Complex distributed computer reservation systems
– Law enforcement databases
– Premises security
– Weather prediction
– Embedded computers
– Handheld digital devices
Practical Computer Literacy, 2nd edition
Chapter 22
5
How can I avoid computer-related
health risks?
• Many spend long hours gazing at a computer monitor
and typing on a keyboard
– Computers are an important part of work environment
– Telecommuters or “teleworkers” use home-based
computers and telecommunications equipment
• Health problems of prolonged computer use include:
– Eye strain
– Musculoskeletal strain related to improper arrangement of:
• Chair
• Desk
• Computer
– Contribute to repetitive motion injuries
• Take frequent breaks to rest eyes and move muscles
Practical Computer Literacy, 2nd edition
Chapter 22
6
How can I avoid computer-related
health risks?
• Ergonomics is the study of work and work environment
– The “science of designing a job to fit worker, rather then
worker to fit job”
– Adequate lighting and ventilation important
– Wrist rest can reduce risk of carpal tunnel syndrome
– Adjustable chairs and desks allow you to position
equipment and maintain good posture
• Make sure work areas are safe
– Equipment on secure surface and have adequate air
circulation
– Cables should be adequately stowed to prevent tripping or
being fire hazard – don’t overload electrical circuits
Practical Computer Literacy, 2nd edition
Chapter 22
7
How can I avoid computer-related
health risks?
Practical Computer Literacy, 2nd edition
Chapter 22
8
How do computers affect the
environment?
• Millions of computers are discarded every year
• Billions of printer ink cartridges, floppy disks, CDs, and
DVDs end up in landfills
• Computers contain toxic materials which can threaten
groundwater
Practical Computer Literacy, 2nd edition
Chapter 22
9
How do computers affect the
environment?
• Computer owners can take some simple steps to have
positive effect on environment
– Recycle consumable products such as paper
– Use electronic documents
– Refill or recycle printer ribbons, ink, and toner
cartridges
– Donate old computer, monitor, and printer to
charitable organization
– Dispose of malfunctioning equipment at facility
designed to handle electronic waste
Practical Computer Literacy, 2nd edition
Chapter 22
10
How do computers affect the
environment?
– Recycle used floppy
disks, CDs, and DVDs,
when possible
– Computers use
electricity and are
becoming more and
more efficient
• To reduce power
consumption,
configure computer to
enter standby mode
Practical Computer Literacy, 2nd edition
Chapter 22
11
How can I protect my data from loss
and damage?
• Threats to data and computer equipment come from
many sources
• A thief can physically break into your home or office,
steal your computer, and get access to all the data it
contains
• Consider following tips:
–
–
–
–
–
Keep your computer secure
Establish password access to your computer
Use a surge strip or UPS
Save your files frequently
Keep your computer’s hard disk tuned up
Practical Computer Literacy, 2nd edition
Chapter 22
12
How can I protect my data from
damage and theft?
– Pay attention to restore points
– Make regular backups
Practical Computer Literacy, 2nd edition
Chapter 22
13
How can I protect my computer from
intrusions?
• Hackers can gain access to your computer, often without
your knowledge
• Consider these tips to protect your computer from
intrusion:
– Use encryption software
– Use a firewall when connected to a network
– Use a router to filter out unauthorized network traffic
– Activate encryption on wireless networks
Practical Computer Literacy, 2nd edition
Chapter 22
14
How can I protect my computer from
intrusions?
Practical Computer Literacy, 2nd edition
Chapter 22
15
How can I protect my computer from
viruses?
• Malicious code refers to any program or set of
instructions designed to surreptitiously enter computer
and disrupt its normal operations
– Most prevalent types include viruses, worms, and
Trojan horses
Practical Computer Literacy, 2nd edition
Chapter 22
16
How can I protect my computer from
viruses?
• A computer virus is set of program instructions that
attaches to a file, reproduces itself, and spreads to other
files. Virus can:
– Corrupt files
– Destroy data
– Display an irritating message
– Disrupt computer operations
– Key characteristic is ability to lurk in computer for
days or months – easy to spread to other computers
Practical Computer Literacy, 2nd edition
Chapter 22
17
How can I protect my computer from
viruses?
• A Trojan horse is a computer program that seems to
perform one function while actually doing something else
– Not designed to make copies of self
– Notorious for stealing passwords
– Can delete files and cause other problems
• A Blended threat combines more than one type
malicious code, such as Trojan horse and virus
Practical Computer Literacy, 2nd edition
Chapter 22
18
How can I protect my computer from
viruses?
• A Worm is designed to spread from one computer to
another over local area networks and Internet
– Mass-mailing worm makes use of infected computer
information to mail itself to every one listed in e-mail
address book
– Denial of service attack designed to generate a lot
of network activity to overwhelm network’s processing
capability
Practical Computer Literacy, 2nd edition
Chapter 22
19
How can I protect my computer from
viruses?
• Most malicious code is stored in executable files, usually
.exe but some have .sys, .drv, .com, .bin, .vbs, .scr, or
.ovl
– Can’t infect computers unless opened
• Common sources of viruses and Trojan horses are
floppy disks, homemade CDs, and disreputable Web
sites that offer fun stuff
• E-mail attachments are another common source
Practical Computer Literacy, 2nd edition
Chapter 22
20
How can I protect my computer from
viruses?
• Data file with .doc or .xls extension can contain a macro
virus
– Activated when its corresponding document or
spreadsheet opened
– Most software that executes macros have built-in
security
Practical Computer Literacy, 2nd edition
Chapter 22
21
How can I protect my computer from
viruses?
• Antivirus software is a set of utility programs that looks
for and eradicates viruses, Trojan horses, and worms
– Typically, kept running in background to check files
and e-mail messages as downloaded
• A Virus signature is a section of code that can be used
to identify known virus
– Most antivirus software can be configured to
automatically download any updates
Practical Computer Literacy, 2nd edition
Chapter 22
22
How can I protect my computer from
viruses?
Practical Computer Literacy, 2nd edition
Chapter 22
23
How can I protect my computer from
viruses?
• To protect against malicious codes, take following steps:
– Install antivirus software and keep it running in
background
– Before downloading a file, make sure the source is
reputable
– Whenever you receive a disk, scan it with antivirus
software before using
– Never open an e-mail attachment unless you know
who it’s from
– Watch for information about the latest virus threats
– Keep your antivirus up-to-date
Practical Computer Literacy, 2nd edition
Chapter 22
24
How can I protect my computer from
viruses?
Practical Computer Literacy, 2nd edition
Chapter 22
25
Can I depend on companies to respect
my privacy?
• Personal information is defined as any data that can be
associated with you as individual by:
– Name
– Social security number
– Physical address
– Telephone number
• Personal information is already stored in many business
and government organizations
– Databases typically protected by privacy policy and
procedures of organization that maintains data
Practical Computer Literacy, 2nd edition
Chapter 22
26
Can I depend on companies to respect
my privacy?
• Information security refers to techniques used to
protect information from unauthorized access, damage,
disclosure, loss, modification, or use
– Staff members aware of responsibilities
• Voluntary security and privacy measures have not
proven to be sufficient
– Some laws and rules are in place
Practical Computer Literacy, 2nd edition
Chapter 22
27
Can I depend on companies to respect
my privacy?
• Whenever you divulge personal information, read the
entire document or screen carefully, looking for any
check box you might have to select or deselect to keep
data from distribution
Practical Computer Literacy, 2nd edition
Chapter 22
28
How can I protect my privacy online?
• Privacy violations take place when personal information
is distributed or tracked without permission
• Spyware is any technology that surreptitiously gathers
information
• If you click third party banner ad, an ad-serving cookie
could be created tracking your shopping activities
• Check the list of cookies on your computer, typically
generated by sites never visited and sometimes
containing word “ad” or “log”
Practical Computer Literacy, 2nd edition
Chapter 22
29
How can I protect my privacy online?
Practical Computer Literacy, 2nd edition
Chapter 22
30
How can I protect my privacy online?
• A Clear GIF or “Web bug” is 1X1 pixel graphic on Web
page and can be used to send cookies to third-party
– Simply viewing page sets cookie
• Several software products are designed to block adserving cookies, clear GIFs, and other spyware
Practical Computer Literacy, 2nd edition
Chapter 22
31
How can I protect my privacy online?
• You can violate your own privacy by releasing
information unintentionally about yourself
– Consider whether access to protected Web site
worth information required
• You might inadvertently supply information in e-mail
messages sent using computer at school or work
– Under certain circumstances, legal for schools and
business to read your e-mail
– Creative work created on their computer could be
considered theirs
Practical Computer Literacy, 2nd edition
Chapter 22
32
How can I protect my privacy online?
• To avoid compromising your privacy:
– Do not reveal e-mail unless you want correspondence from
them
– Be careful posting physical address and phone number in
online public forums, bulletin boards, or online resume
– Be wary about sharing information about your family and
friends
– Use alias when using chat rooms and do not divulge personal
information
– Be wary of online surveys
– When registering for account or password, supply minimum
information
– After using a public computer, make sure you sign out, log off,
delete temporary Internet files, and shut down Windows
– Regard e-mail like postcard rather then sealed letter
Practical Computer Literacy, 2nd edition
Chapter 22
33
Are children safe online?
• Web site filtering blocks access to certain sites
• Parents should consider following guidelines to keep
children safe online:
– Supervise as much as possible
– Keep computer public
– Install filtering software
Practical Computer Literacy, 2nd edition
Chapter 22
34
Are children safe online?
Practical Computer Literacy, 2nd edition
Chapter 22
35
Can I prevent online identity theft?
• Identity theft occurs when someone obtains your
personal information and uses it without permission to
commit crime
• Consider these tips to thwart identity thieves:
– Don’t divulge personal information
– Shred your trash
Practical Computer Literacy, 2nd edition
Chapter 22
36
Can I prevent online identity theft?
– Guard your mail
– Protect your identification documents
– Divulge your Social Security number only when
absolutely necessary
– Keep track of computer data
– Keep passwords secret
– Keep informed
Practical Computer Literacy, 2nd edition
Chapter 22
37
How can I avoid scams and hoaxes?
• Scam artists have been around long before computers
• Phishing is the use of fraudulent Web sites and e-mail
links to trick people into revealing personal information
• Legitimate businesses never send unsolicited e-mail
asking for account numbers or passwords
Practical Computer Literacy, 2nd edition
Chapter 22
38
How can I avoid scams and hoaxes?
• Technologies have potential to reduce e-mail scams
– Digital certificate – issued by certificate authority
that vouches for certificate holder’s identity
Practical Computer Literacy, 2nd edition
Chapter 22
39
How can I avoid scams and hoaxes?
• “Advance fee fraud” schemes gross hundreds of millions
of dollars each year
• Begins with request for bank account number; escalate
to pleas for money to initiate transaction
• Never respond to an unsolicited request that seeks
personal information or involves transfer of funds
Practical Computer Literacy, 2nd edition
Chapter 22
40
How can I avoid scams and hoaxes?
• A virus hoax warns of devastating new virus, describes
eradicating procedure and encourages notification of
friends
– Before any action, check one of antivirus sites, such
as
• symantic.com
• f-secure.com
• mcafee.com
• hoaxbusters.ciac.org
Practical Computer Literacy, 2nd edition
Chapter 22
41
What should I know about intellectual
property online?
• Intellectual property refers to intangibles, e.g., ideas,
music, art, photos, logos, movies, and creative,
intellectual programs
– Idea that is important, not particular expression of
idea
• Many laws and regulations have been established to
govern use and distribution of intellectual property online
and offline
– Trademarks – protect corporate logos and product
names
– Patents protect inventions from being used with out
permission of inventor
Practical Computer Literacy, 2nd edition
Chapter 22
42
What should I know about intellectual
property online?
– United States Digital Millennium Copyright Act of
1998 updated many key aspects of intellectual
property law to meet new digital realities
– Copyrights protect works such as software, photos,
movies, and music
– Copyright law makes it illegal to copy and distribute
protected works without permission of author
Practical Computer Literacy, 2nd edition
Chapter 22
43
What should I know about intellectual
property online?
• Copyright law does not prohibit all copying
• To determine whether you can use material under fair
use regulations, make sure it fits following criteria:
– You are using material for educational purposes or
critical review
– The work has been previously published in some
manner
– You are not using substantial part of entire work
– Your use doesn’t provide level of functionality that
replaces work
Practical Computer Literacy, 2nd edition
Chapter 22
44
What should I know about intellectual
property online?
• Failure to cite source of copied material or pretending it
is your own is plagiarism
– Unethical and unlawful
• Libel defined as false and malicious statements used to
damage reputation of living person
– Always cross-check material attributed to source –
especially if controversial
• If intended use of material is not covered by fair use,
obtain author’s permission
Practical Computer Literacy, 2nd edition
Chapter 22
45
What should I know about intellectual
property online?
• Copy protection refers to any physical method to
prevent works from being copied
• Copy protection methods can be hacked and
circumvented
• Expect further developments in copyright law, anti-piracy
campaigns, and copy protection
Practical Computer Literacy, 2nd edition
Chapter 22
46
How can I keep informed about
technology related issues?
• Numerous sources provide access to information:
– Computer publications
– Mailing lists and RSS feeds
– Professional organizations
– Corporate sites
– Consumer reviews
– School and work policies
– Laws and regulations
Practical Computer Literacy, 2nd edition
Chapter 22
47
How can I keep informed about
technology related issues?
Practical Computer Literacy, 2nd edition
Chapter 22
48
Download