COMPUTERS PART OF YOUR LIFE GRADE 11 THE

  • Slides: 21
Download presentation
COMPUTERS, PART OF YOUR LIFE – GRADE 11

COMPUTERS, PART OF YOUR LIFE – GRADE 11

THE DARK SIDE OF COMPUTING Module 1. 6 “Guns don’t kill people, people kill

THE DARK SIDE OF COMPUTING Module 1. 6 “Guns don’t kill people, people kill people”

CONTENT Human and social aspects Information accuracy Data protection The criminal side of things

CONTENT Human and social aspects Information accuracy Data protection The criminal side of things Social engineering Computer misuse Invasion of privacy Malware Test and Improve

HUMAN AND SOCIAL ASPECTS – the technical aspects of protecting ourselves from human errors

HUMAN AND SOCIAL ASPECTS – the technical aspects of protecting ourselves from human errors in computing

INFORMATION ACCURACY Errors and failures of computer systems can be caused by. . .

INFORMATION ACCURACY Errors and failures of computer systems can be caused by. . . Bad programming • logic errors • missing data validation techniques Poor training • make mistakes • lose trust in system Poor procedures • poor procedures for capturing data or generating reports • poorly designed forms that people fill in • poorly designed data flow

Errors and failures lead to inaccurate information and have negative consequences Breakdown in user

Errors and failures lead to inaccurate information and have negative consequences Breakdown in user trust Incorrect or delayed decision-making Decreased product quality

Breakdown in user trust • People make excuses not to use it • They

Breakdown in user trust • People make excuses not to use it • They run manual backup systems • Increased workload – less efficient

 Incorrect or delayed decision-making ? People do not trust the information ? They

Incorrect or delayed decision-making ? People do not trust the information ? They delay making decisions / make wrong decision ? It can cost money or even lives ?

Decreased product quality • Poor information accuracy leads to decreased product quality • People

Decreased product quality • Poor information accuracy leads to decreased product quality • People who use information (= ourselves) must learn how to analyse / interpret / judge the quality of information

DATA PROTECTION Control access to physical data Control access to computers Limit and control

DATA PROTECTION Control access to physical data Control access to computers Limit and control use of portable storage

THE CRIMINAL SIDE OF THINGS

THE CRIMINAL SIDE OF THINGS

SOCIAL ENGINEERING The use of deception to manipulate or ‘con’ someone into giving out

SOCIAL ENGINEERING The use of deception to manipulate or ‘con’ someone into giving out confidential information or into giving access to their computer or premises This can be used to impersonate them, to install malware, or for other fraudulent purposes

Typical examples of social engineering are when you get emails. . . telling you

Typical examples of social engineering are when you get emails. . . telling you that you have won the lottery offering you a job or a business opportunity telling you of an unexpected inheritance telling you there is a problem with your online banking details

Best protection against social engineering Remember – ‘if it sounds too good to be

Best protection against social engineering Remember – ‘if it sounds too good to be true, then it probably is’ Know the people you work with and don’t trust strangers around data Be sceptical of offers that need something from you THINK before you act

COMPUTER MISUSE Where computer resources are used without permission or for tasks not authorised

COMPUTER MISUSE Where computer resources are used without permission or for tasks not authorised by the owner of the computer Cuts productivity and ‘steals’ both computer time and work time

INVASION OF PRIVACY Looking at your boyfriend’s/girlfriend’s SMS messages on their phone without their

INVASION OF PRIVACY Looking at your boyfriend’s/girlfriend’s SMS messages on their phone without their knowing . . it invades their privacy as much as any company that tracks what you do on the internet

Consequences of invasion of privacy Loss of productivity Identity theft Your online view of

Consequences of invasion of privacy Loss of productivity Identity theft Your online view of reality is ‘customised’ to match what companies think you will like

MALWARE Malware takes many forms – ransomware, viruses, spyware, keyloggers, Trojans Ransomware Viruses Spyware

MALWARE Malware takes many forms – ransomware, viruses, spyware, keyloggers, Trojans Ransomware Viruses Spyware Keyloggers Trojans

The social consequences of malware Financial cost • Cost to prevent infection • Ransomware

The social consequences of malware Financial cost • Cost to prevent infection • Ransomware – direct financial cost Lost productivity • Time wasted on recovery • Pay people to remove malware • Costs passed on to consumer Personal implications • • Less trust in others Possibility of fraud Life more complicated – passwords for everything Time wasted – dealing with spam, etc.

TEST AND IMPROVE USE SUMMARY FOR REVISION

TEST AND IMPROVE USE SUMMARY FOR REVISION

WRITTEN MODULE ACTIVITY

WRITTEN MODULE ACTIVITY