1 / 13

Ethics and Safet y Management

Vs. Ethics and Safet y Management . By: Ton y Aiello. Health Safety. When using a computer for long periods of time, you can cause health risks ranging from minor to major. Ex. RSIs (Repetitive Strain Injury) Blood Clots Back Issues (Lumbar) Headaches/Migraines Arthritis .

aldona
Download Presentation

Ethics and Safet y Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vs. Ethics and Safety Management By: TonyAiello

  2. Health Safety When using a computer for long periods of time, you can cause health risks ranging from minor to major. Ex. • RSIs (Repetitive Strain Injury) • Blood Clots • Back Issues (Lumbar) • Headaches/Migraines • Arthritis

  3. There are several ways to avoid health issues concerning computers. Ex. • Using ErgonomicEquipment/High Resolution Monitor • Avoid sitting in the same position for a full use period • Adjust background lighting • Taking breaks every half hour or less

  4. Security Risks As with many other things computers have security risks. These risks can range from miniscule to extremely harmful. The main risks are identity theft, data corruption, and viruses. These risks are caused hackers or crackers.

  5. Computer hackers and crackers are generally computer experts who gain satisfaction from defeating a security system and can steal, change, or damage stored data.

  6. The leading programs used by hackers and crackers to damage or steal data are • Sniffers (Search for important data) • Dictionary Attackers (Uses a file of words to solve passwords) • Keyloggers(Records all actions) • Spyware (Checks actions, searches for data) • Trojans (Damages files) • Worms (Multiplies itself)

  7. Along with hackers and crackers, a power outage or mechanical failure could result in severe damage or complete loss of data. That’s why it is essential to backup your data on an external storage device and save your data every so often. It is also not a bad idea to get an uninterruptible power supply like a battery to support your system in a power outage.

  8. Access Restrictions To help safeguard against hackers, viruses, Trojans, and worms, it is smart to set a strong router password. A strong password (contains at least one letter, number, or special character.) protects against brute force attacks, also called dictionary attacks which use a program that tries various words or phrases in the dictionary file to find your password. It is also important to beware aware of tactics such as phising or the fraudulent use of a similar site to obtain someone’s information such as PIN numbers.

  9. Private Property Contrary to common belief, if you do any activities on a company or organization’s computers, the information that is saved is considered their property and can be used for legitimate purposes. This is why companies usually have a policy form that must be signed before you can use their computers.

  10. E-Commerce Before you make any transactions on the internet it is imperative that you check the site to ensure it is secure. Sites such as godaddy.com present a Transport Layer Security (TLS) or Secure Sockets Layer (SSL) certificate for sites that process sensitive data.

  11. Both SSL and TLS programs implement a private key and a public key. The private key deciphers the information where as the public key encrypts. This form of encryption is called asymmetriccryptography. Cryptography is the process of encrypting and deciphering data. Cryptography is derived from the Latin word Kratos which meant hidden.

  12. Changes and Responsibilities As with the constantly changing work place, the internet is changing as well. So it is crucial to always stay up to date with acceptable usage rules. A good example of incorrect and unethical usage is the rising issue of software piracy in companies. Instead of a company purchasing a network version of a software program, they buy the basic version for extremely less and upload it to every computer in their possession.

  13. Image Locations – • http://www.e4hats.com/_e/Black_Band_Wool_Felt_Hat/product/bb002ft-black/Black_Band_Wool_Felt • http://www.weschenfelder.co.uk/files/imagecache/main_product_shot/%252F2440+Trilby.JPG • http://www.1stwebdesigner.com/design/things-work-makes-freelancer-sad/ • http://3.bp.blogspot.com/_UTnMsP0jyxY/TLhs3ura4nI/AAAAAAAAACc/Rtio301IsrM/s1600/ergonomics_simpsons_poster_s1112__53445.gif • http://www.toonpool.com/cartoons/Hackers_103007 • http://www.un-interruptiblepower.co.uk/graphics/uninterruptiblepower_suppli.jpg • http://obiblog.files.wordpress.com/2008/08/data-pic.jpg • http://www.gizmodo.com.au/2011/07/theres-a-botnet-called-tdl-4-thats-virtually-indestructible/ • http://databasementor.com/wp-content/uploads/crestockimages/1331889-ms.jpg • http://www.sciencephoto.com/image/350257/530wm/T4650205-Computer_virus-SPL.jpg • http://computersafetytips.files.wordpress.com/2008/12/computer-worm.jpg • http://computerht.com/wp-content/uploads/2008/01/computer-how-to-spyware-cool-pic.gif • http://www.modssl.org/docs/2.0/mod_ssl.jpg • http://www.zytrax.com/tech/survival/asymmetric.gif • http://robcma.files.wordpress.com/2011/02/got-ethics.jpg Information Location – • Morrison, C., & Wells, D. J. (2011). Computer literacy basics, a comprehensive guide to ic3. (3rd ed., pp. Mod3-151 - Mod3-167). Course Technology Ptr.

More Related