4. Identify safeguards against hardware theft and vandalism
hardware theft = stealing computer equipment
hardware vandalism = defacing or destroying computer equipment
Safeguards Against Hardware Theft And Vandalism
Restricted access (locked doors and windows)
Alarm systems
Cables
Locking devices for hard disk, other drives
5. Explain the ways software manufacturers protect against software piracy.
Safeguards Against Software Theft
1. license agreement
single-user license agreement end-user license agreement (EULA).
Install on one computer
Make one copy as backup
Give or sell only after removing from first source
2. product activation = links particular computer to particular software
6. Discuss how encryption works, and explain why it is necessary
7. Discuss the types of devices available that protect computers from
system failure
8. Explain the options available for backing up computer resources.
9. Identify risks and safeguards associated with wireless communications.
10. Discuss ways to prevent health-related disorders and injuries due to computer use.
11. Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.
Decisions and actions are based on the accuracy of information.Just because something is on the web does not mean that it is accurate.Concerns about the ethics of using computers to alter output.
Intellectual property rights
Ideas
Inventions writings
Art
Processes
Company and product names
Logos
Codes of Conduct = guidelines for acceptable information technology behavior
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering.
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering.
Electronic profiles - Read the privacy statements that come to you and keep a copy of what you choose
Cookies = small text file that contains information about you or your preferences
Spyware = program placed on user’s computer without the user’s knowledge that secretly collects information about the user.
Spam = unsolicited email message or newsgroup posting
Privacy laws
Federal laws dealing specifically with computers:
Electronic Communications Privacy Act (ECPA)
Computer Matching and Privacy Protection Act
Computer Fraud and Abuse Acts
Fair Credit Reporting Act.
Content filtering = There is no censorship on the Internet.