Computer Ethics.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Security, Privacy, and Ethics Online Computer Crimes.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
New Data Regulation Law 201 CMR TJX Video.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Crimes Career & Technology Education Department.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
CONTENTS What is Virus ? Types of computer viruses.
Presented by : vijitha.k
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Computer Ethics, Viruses, and Copyrights
Viruses & Destructive Programs
Computer Safety and Ethics
Intro to Malware Attacks
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Information Technology
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Why Computer Security Need???
Computing Issues that Affect Us All
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Related to data, hardware, and software
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Ethics, Viruses, and Copyrights
BCT 2.00 Analyze Technology Issues
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
What is Information Security?
Computer Security By: Muhammed Anwar.
Computing Issues that Affect Us All
Technology Mrs. Huddleston
Computing Issues that Affect Us All
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Computer Ethics

Software Copyright Commercial software is covered by Copyrights. You have to pay for it and register to have the license. You should do the following: Copy the software only for back up. Don’t share the software with other people. Copying the software over the network should be under the terms of license agreement. Software piracy is a crime.

Licensing When you buy a software you purchase a license to use it not for copyright. There is a license agreement that written on the back of the carton or in the software installation start. There are two type of license: A Single user license : can install the software into only one computer. A multi-use license : can install the software into a number of computers, the number that is specified by the license agreement.

Software Commercial software: Any software you buy is a commercial software. ”Has copy rights”. Trail Software: Software where you can install it via the internet or CD’s for a period of time, after this period the software will stop working . ”Has copy rights”. Free Software : Software that is distributed freely on the internet , there is no payment. ”Has copy rights”. Public Software: It is public , free, without copy rights .

Backups Copy your software, files and information. Use it when your original copies are damaged. Backups can be made by different methods: Copy onto external HD, CD’s, DVD’s, … etc. Backups must be made on regular basis. Can use automatic back-up programs. Keep it in a secure and safe place. Keep different copies in different places. Label it. Disks should be write-protected.

Information Security Information Security: is a system of guarantees for protecting information technology against disasters, system failure, unauthorized access that can result in damage or loss. Security not only involved physical security, but also the security of the data. Do the following: Computer must be protected from damage (hardware, software). Data must be backed up and protected from viruses. Password must be used. Use encryption and decryption cods. Use anti-viruses.

Privacy Means maintaining data confidentiality and no one is authorized to access them. You should follow these points to protect the privacy of others: Use of data: for one or more people or for specified purposes. Retention of data: shall not kept for longer than necessary. Disclosing information: for anything than the purpose. Security. Rights for the person to access his information.

Access Access for only who have a legitimate right to access to them through the following: User Passwords User Authentication User Authorization

Computer Crimes Computer Crimes : Are the unlawful uses of any component of a computer system. Computer crimes issues such as: fraud , espionage, fraud, vandalism and theft issues.

Theft The theft of a laptop computer will causes the access to a confidential files, and loss of important contact details. Never leave your laptops, PDAs in a public places.

Viruses They are software programs, which are written with the intention of causing inconvenience and disruption of series damages in a computer system. Viruses Spread ways: Computer networks. Copying and distribution of illegal software through the internet. Email attachments.

Viruses cont. Types of viruses: Worms. Time bombs. Boot-sector virus. File virus. Multipartite virus. Macro viruses. Trojan horse.

Protecting from Viruses It is important to keep the Anti-virus software up-to-date. (updated) Example on famous anti viruses: Avira, Norten , Avast..etc Do the following if don’t have the last update: Do not use CD from unreliable source. Use only registered software. Never open an e-mail attachment unless it is from a reliable source. Keep regular back-up.

Symptoms of Virus Attack Computer runs slower then usual Screen sometimes flicker System crashes for no reason Files/directories sometimes disappear Display a message

Personal Data With computing systems became personal data stored in all areas (health - banks - telecommunications companies, electricity and water - Internet companies - government entities - insurance companies - social security, etc.) Your personal data is no longer yours alone (the possibility of counterfeiting and Change) There is legislation that protects personal data have been enacted in some countries. Ex: you can check if your ID used in somewhere (work field)without you know by check this out: http://mol.gov.sa/Services/Inquiry/SaudiEmpInquiry.aspx?m=4

Computer Ethics Set of rules that’s controls the use and the users of the computer and the result data. The data processor or the data user must know that: It is personal data shall be processed, fairly and lawfully. To use the data for the purpose that it was collected. To keep the information accurate and up to date. To keep the data safe and never disclose it to other. To retain the information only as long as required. To provide access to person whom the data refers to, upon request.

Computer Ethics The following data types are excluded from the ethics above: Data for national security protection. Data of retirement salaries. Personal data for family purposes.