Nothing Special   »   [go: up one dir, main page]

Empowerment Lesson 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL

SENIOR HIGH SCHOOL


OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY

Name: _______________________________ Year Level: ___________________

Section: _____________________________

ONLINE SAFETY AND INFORMATION SECURITY

Learning Objectives
1. Define computer ethics and know the ethical issues related to the use of computer
2. Apply online safety, security, ethics, and etiquette standards and practices in ICT

Review/Lesson Preview
From our previous class, we have discussed about the current state of ICT in the Philippines, online systems and
its functions, and the current trends in both online systems and ICT devices. Below are questions for our review.
1. What are the six (6) components of ICT?
1.___________________________ 2. _________________________ 3.________________________
4.___________________________ 5. _________________________ 6.________________________

2. What is Classification of technology according to its use?


1.___________________________ 2. _________________________ 3.________________________
4.___________________________ 5. _________________________ 6.________________________

Lessons & Concepts

While there is no official list of netiquette rules or guidelines, the general idea is to respect others online. What is
ethics?

Ethics or moral philosophy is a branch of philosophy that involves systematizing, defending, and recommending
concepts of right and wrong conduct.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Computer Ethics

Computer ethics are a set of moral standards that govern the use of computers. It is society's views about the use
of computers, both hardware and software.

Importance of Computer Ethics

Computer ethics essentially protect individuals online from predation: they prevent breach of privacy, identify
theft, interference with work and unlawful use of proprietary software, among other events. Computer ethics
govern the behavior of users online, and date back to 1992.

Without the study of ethics, there can be no government and no laws. Without an ethical system in place, all
actions are equally acceptable and no one is safe from his neighbor. Ethics seeks to protect parties that cannot
speak for themselves. It is a major factor in industries that deal with human and their actions.

Ethical problems related to the use of computers and internet


• Privacy Concerns
▪ Hacking – is unlawful intrusion into a computer or a network. A hacker can intrude through the
security levels of a computer system or network and can acquire unauthorised access to other
computers.
▪ Malware – means malicious software which is created to impair a computer system. Common
malware are viruses, spyware, worms and trojan horses. A virus can delete files from a hard drive
while a spyware can collect data from a computer.
▪ Data Protection – also known as information privacy or data privacy is the process of safeguarding
data which intends to influence a balance between individual privacy rights while still authorizing
data to be used for business purposes.
▪ Anonymity – is a way of keeping a user’s identity masked through various applications.
• Intellectual Property Rights
• Copyright – is a form of intellectual property that gives proprietary publication, distribution and
usage rights for the author. This means that whatever idea the author created cannot be employed
or disseminated by anyone else without the permission of the author.
• Plagiarism – is an act of copying and publishing another person’s work without proper citation.
It’s like stealing someone else’s work and releasing it as your own work.
• Cracking – is a way of breaking into a system by getting past the security features of the system.
It’s a way of skipping the registration and authentication steps when installing a software.
• Software License – allows the use of digital material by following the license agreement.
Ownership remains with the original copyright owner, users are just granted licenses to use the
material based on the agreement.
o Accuracy of information stored

.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY

The Ten Commandments of computer ethics


(From Computer Ethics Institute)
1 Thou shalt not use a computer to harm other people.
2 Thou shalt not interfere with other people's computer work.
3 Thou shalt not snoop around in other people's files.
4 Thou shalt not use a computer to steal.
5 Thou shalt not use a computer to bear false witness.
6 Thou shalt not use or copy software for which you have not paid.
7 Thou shalt not use other people's computer resources without authorization.
8 Thou shalt not appropriate other people's intellectual output.
9 Thou shalt think about the social consequences of the program you write.
10 Thou shalt use a computer in ways that show consideration and respect

Cyber Security & Information Security


These two words “Cyber Security” and “Information Security” are generally used as synonyms in security
terminology, and create a lot of confusion among security professionals

Following Venn diagram can be helpful to understand the differences.

Reference- Center for Cyber and Information Security (https://ccis.no/cyber-security-versus-information-security/)


ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Notice that cyber security (right set) includes everything and everyone that can be accessed through cyberspace. So, one could
argue that everything in this world is vulnerable through ICT. However, going by the definition of cyber security, we should
protect which is to be protected, because of the security challenges posed by the use of ICT.

Cybersecurity: The ability to protect or defend the use of cyberspace from cyber attacks.
Information Security (1): The protection of information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Information Security (2): Protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide —

1) integrity, which means guarding against improper information modification or destruction, and includes ensuring
information non-repudiation and authenticity;

2) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for
protecting personal privacy and proprietary information; and

3) availability, which means ensuring timely and reliable access to and use of information.

Activity 1. Identify what is asked on each number.


_________________1. is unlawful intrusion into a computer or a network. A hacker can intrude through
the security levels of a computer system or network and can acquire unauthorised access to other
computers.
_________________2. means malicious software which is created to impair a computer system. Common
malware are viruses, spyware, worms and trojan horses. A virus can delete files from a hard drive while
a spyware can collect data from a computer
_________________3. Copyright – is a form of intellectual property that gives proprietary publication,
distribution and usage rights for the author. This means that whatever idea the author created cannot be
employed or disseminated by anyone else without the permission of the author
_________________4. is an act of copying and publishing another person’s work without proper citation. It’s
like stealing someone else’s work and releasing it as your own work.
_________________5. is a way of breaking into a system by getting past the security features of the
system. It’s a way of skipping the registration and authentication steps when installing a software

Activity 2. Record Yourself.


Option 1: Using your mobile phone or any recording media record yourself reciting the ten (10) commandments
of computer ethics. Post this on your social media account and tag your classmates and your teacher

Option 2: recite the ten commandments in front of the class.


ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
Independent Learning:

Directions: Choose the letter that will best answer the ff. questions. Write the letter of your choice.

1. One example of a computer ethic commandment is:


a. You cannot snoop on others' computers
b. You cannot share a flashdrive
c. You cannot have multiple computers
d. You cannot share pictures online
2. Ethical behavior that should be modeled in a classroom is:
a. Mutual respect
b. Trust
c. Equality
d. All of these are correct
3. Ethical behavior that should be modeled in a classroom is:

a. Downloading as much music as you want


b. Using any website you want
c. Using information from the internet in student projects
d. Letting students search whatever they want

Case Study:
"The Captain Knows BEST"

A tale of two designs

Fred Fredson, an experienced consultant, is working on a contract with the U.S. Navy to develop a critical system. The
system will manage the processing of some very dangerous materials.

The exposure of two sailors to these materials and their subsequent deaths led Captain Birk to request the redesign of the
system used to manage these materials. The only one in his area with any computer training, he saw a way to use computer
technology to significantly reduce the dangers of this process.

Fred is one of a small number of people who have worked with the type of computer used to manage this process. During
several meetings with Captain Birk, Fred has gathered the external requirements for the system. Fred then designs the
system which he believes will best control the process.

Captain Birk requests that he be shown Fred's internal software design for the system. Fred, who has taken great pains to
develop a system that can be proven to be highly reliable and clearly demonstrated to do what has been requested, welcomes
the opportunity to show the details of his work. Fred arranges a meeting with the captain.

At the meeting, halfway into Fred's presentation, Fred is interrupted by the captain who says that the design of the software
is not the way he wants it. The captain then describes how he wants the software designed. Fred is greatly concerned
because he believes that there is no adequate way to test the software if it follows the captain's design.
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY

Fred tries gently to point this out to the captain. But the subtle reasons for this are missed by the captain who accuses Fred
of merely having an egotistical commitment to his own design. The meeting ends acrimoniously with the captain saying that
if Fred does not agree to the new design then the contract will be cancelled.

Fred calls you and asks for your help. He relates his belief that if the contract is cancelled that the navy will not deal with
this problem again until there is another death. Fred reminds you of his expertise in testing. He assures you that he designed
the software so that the testing would yield a very high level of confidence that the software would be safe and would resolve
the problem that led to the two deaths. He further assures you that even though you could not prove that the captain's design
was wrong, Fred could not think of any tests that could demonstrate the reliability of the captain's design. Fred could
provide no assurance that the captain's design was reliable and would not at a later date cause significant problems if it were
adopted.

He knows that you have been concerned with ethical and legal issues and asks for your advice.
Write down your advice below:

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

______________________________________________________________________________________________________

Closure Activity:

1. Using the internet read about “Cyberbullying” and in 300 words write your personal insights about
the topic.
OR READ THE CYBERBULLYING REFERENCE AT THE END OF THIS LESSON

Feedback:

How do you feel about the activity?

_____________________________________________________________________________________________

____________________________________________________________________________________________

References:

https://www.dinwiddie.k12.va.us/app/uploads/2018/12/Cyberbullying.pdf
https://techterms.com/definition/netiquette
https://teachcomputerscience.com/computer-ethics/
https://www.cisoplatform.com/profiles/blogs/understanding-difference-between-cyber-security-information
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
https://www.researchgate.net/topic/Computer-Ethics
CYBERBULLYING REFERENCE
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY
ALUBIJID NATIONAL COMPREHENSIVE HIGH SCHOOL
SENIOR HIGH SCHOOL
OPEN HIGH SCHOOL

EMPOWERMENT TECHNOLOGY

You might also like