Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMPUTER ETHICS.

Similar presentations


Presentation on theme: "COMPUTER ETHICS."— Presentation transcript:

1 COMPUTER ETHICS

2 INTRODUCTION Ethics is a set of moral principles that govern the behavior of a group or individual.  likewise, computer ethics is set of moral principles that regulate the use of computers.

3 Common issues of computer ethics
 Some common issues of computer ethics include intellectual property rights such as copyrighted electronic content, privacy concerns, and how computers affect society.

4 Contd…. For example, while it is easy to duplicate copyrighted electronic or digital content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical.

5 INTELLECTUAL You have certainly heard the word property before: it is generally used to mean a possession, or more specifically, something to which the owner has legal rights. You might have also encountered the phrase intellectual property. This term has become more commonplace during the past few years, especially in the context of computer ethics. But what exactly does it refer to?

6 Contd… Intellectual property refers to creations of the intellect (hence, the name): inventions, literary and artistic works, symbols, names, images, and designs used in commerce are a part of it. Intellectual property is usually divided into two branches, namely industrial property which broadly speaking protects inventions and copyright, which protects literary and artistic works.

7 CATEGORISING INTELLECTUAL PROPERY
Intellectual property is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, commercial names, designations and geographic indications (location specific brands) etc. Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs, sculptures, and architectural designs.

8 Copy rights Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.

9 History of copy right Copyright came about with the invention of the printing press and with wider public literacy. As a legal concept, its origins in Britain were from a reaction to printers' monopolies at the beginning of the 18th century. Charles II of England was concerned by the unregulated copying of books and passed the Licensing of the Press Act 1662 by Act of Parliament.

10 WHAT IT CAN PROTECT AND WHAT NOT
In summary, copyright laws protect intellectual property which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. But unlike protection of inventions, copyright law protects only the form of expressions of ideas, not the ideas themselves. Remember that a created work is considered protected as soon as it exists, and a public register of copyright protected work is not necessary.

11 COPY RIGHT ON INTERNET But what of works made available to the public on the Internet? Are they at all protected by copyright? Once again, yes! For works made available over a communications network (such as the Internet), the copyright protects original authorship. But, according to the Copyright Law, it does not protect ideas, procedures, systems, or methods of operation. This means that once such an online work has been made public, nothing in the copyright laws prevents others from developing another work based on similar principles, or ideas.

12 NETIQUTTES Netiquette are about the various risks related to using the Internet. It is about proper ways in which to use a network and to determine whether information is reliable, while emphasizing four important points given in next slides.

13 REAL PEPOLE EXIST BEHIND THE COMPUTERS
You are dealing with people, not machines. So think twice before you click on Send button in the mail/chat window You are not the only one using the network Keep these other people in mind when you say something on a network.

14 PROTECT YOUR PRIVACY Just as you would in the real world, be aware of risks, fraud and false information which exists on the Internet. Use common sense when deciding whether information is valid. Don't trust or spread further any information about which you are in doubt. Always try to obtain reliable information. Protect your personal information to keep someone from using it in an unethical way. (For example, when you enter a prize contest, your name, address, and phone number may be given to a dealer of personal information.)

15 AVOID SPAMMING Spamming is sending unsolicited bulk and/or commercial messages over the Internet. Spamming is morally bad if it is intended to destroy and done by infringing on the right of privacy of others. It could be good if the message sent benefits the recipients, like giving out warnings or useful information to others.

16

17

18

19 HELP MAKING NETWORK BETTER
The existence of the information society is based on give and take. Making a contribution is an essential part of being a good network user. For example, if you make a request and find the information you receive helpful, write a summary and report what you learned , publish it on the Net or give links to others.

20 SOFTWARE PRIVACY Software piracy is morally bad when someone reproduces a copy of the software and sells it for profit, produces exactly the same or similar version without giving proper credit to the original author, or simply produces it and distributes it to others. It is not immoral to copy the software if someone who has a licensed copy of the software and simply makes a backup copy of the original. One back-up copy of the commercial software can be made, but the back-up copy cannot be used except when the original package fails or is destroyed.

21 CREATION OF WORMS AND COMPUTER VIRUS
Creation of worms and computer viruses is morally bad when it is intended for malicious purposes like to steal information or destroying of data. However, it could be used like a vaccine – poison to kill another poison – to cure or prevent a potentially destructive system from wreaking havoc (causing widespread destruction) in the network. The way some worms and viruses work could be used to gather information that could help protect the majority of computer users.

22 PLAGIARISM Plagiarism is copying someone else's work and then passing it off as one's own. It is morally bad because it is an act of stealing. Copying programs written by other programmers and claiming it as your own could be an act of plagiarism. It involves lying, cheating, theft, and dishonesty.

23 FILE PRIVACY Any computer document produced either by an individual in his private home or in his office should remain private. No one has should open any document unless authorized by the individual who created the file himself.

24 Computer Ethics and Legal Issues

25 Definition Computer Ethics
Is a system of moral standards or moral values used as a guideline for computer users Code of Ethics Is a guideline in ICT that help determine whether a specific computer action is ethical or unethical Intellectual Property Is works created by inventors, authors and artists Privacy Refers to the right of individuals and companies to deny or restrict the collection and use of information about them Computer Crime Is any illegal acts involving computers Cyber Law Is any laws relating to protect the Internet and other online communication technologies

26 Differentiate between ethics and law
As a guideline to computer users As a rule to control computer users Computers users are free to follow or ignore the code of ethics Computers users must follow the regulations and law Universal, can be applied anywhere, all over the world Depend on country and state where the crime is committed To produce ethical computers users To prevent misuse of computers Not following ethics are called immoral Not obeying laws are called crime

27 Intellectual Property Laws
Four types of Intellectual Property are: Intellectual Property Patents Trademark Design Copyright Patents for inventions Trademarks for brand identity Design for product appearance Copyright for materials

28 Privacy Ways of making personal data more privates:
Install personal firewall Clear your history file when you are browsing Purchase goods with cash, rather than credit card

29 Authentication Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system.

30 Four commonly authentication methods:
User identification Possessed object Biometric device Callback system Four commonly authentication methods:

31 A) User identification
Is a unique combination of characters (letter, number or symbol) that identify specific user Examples: pin number password

32 B) Possessed object Is a any item that you must carry to gain access to computer of computer facility Examples: ATM card credit card smart card

33 C) Biometric device Is a device that translates personal characteristics into digital code that is compared with the digital code stored in the database Examples: fingerprint reader iris scanner hand geometric scanner signature verification system

34 Controversial Contents and Control
PORNOGRAPHY SLANDER is any form media or material (like books, video or photos) that show erotic behavior and intended to cause sexual excitement the effects of pornography on society are: Can lead to criminal acts such as exploitation of women Can lead to sexual addiction Can develop lower moral values towards other people Can erode good religious, cultural, behaviors and beliefs is a false spoken statement about someone, intended to damage his or her reputation the effects of slander on society are: Can develop society that disregards on honesty and truth Can lead to bad habits of spreading rumors and untruth Can cause people to have negative attitudes toward another person

35 Internet Filtering Keyword blocking Site blocking Web rating system

36 Computer Crimes Why we need cyber law?
Cyber laws are made to force people to be good To give protection against the misuse of computers and computer criminal activities Examples of cyber abuse on the users: Sending a computer virus via Harassment through Hacking into your school's database to change your examination results

37 Malaysian Cyber Law Computer Crime Act 1997
Copyright (Amendment) Bill 1997 Digital Signature Act 1997 Telemedicine Bill 1997 Communication and Multimedia Act 1998 Digital Signature Regulations 1998

38 4 examples of computer crimes:
Computer fraud - is the crime of obtaining money by deceiving (to trick) people through the use of computers such as hoaxes, program fraud, investment schemes and claim of expertise on certain fields Copyright infringement - is a violation of the rights secured by a copyright. It occurs when you break the copyright laws such as copying movie, software or CD’s illegally

39 Computer theft – is defined as the unauthorized used of another person’s property such as transfer of payment to the wrong accounts, get online material with no cost and tap into the data transmission lines Computer attack – is defined as any activities taken to disrupt the equipments of computers systems, change processing controls and corrupt stored data

40 Ethical codes Ethical codes fill gaps in laws and regulation that fail to reach or simply can not be applied. It is a guide of principles designed to help professionals conduct their business ethically. This code of ethics can also describe ethical values of a company or organization and reflect its mission. How employees are to approach different issues, and how these standards should be enforced.

41 Association of Information Technology Professionals(AITP)
CyberSecurity Institute (CSI) Independent Computer Consultants (ICCA) Information Systems Security Association (ISSA) Association for Computer Operations Management(AFCOM) Computing Technology Industry Association(CompTIA) The existence of these bodies is made necessary due to the lack of respect for ethics in society in general, requiring not only the validation of this types of bodies but also their power to enforce sanctions when ethical violation are made evident.

42 IT Code of Ethics SANS IT Code of Ethics general guidelines are:
Because there are many different independent groups for IT Code of Ethics, there are many different ideas about what guidelines there should be. SANS IT Code of Ethics general guidelines are: I will strive to know myself and be honest about my capability. I will conduct my business in a manner that assures the IT profession is considered one of integrity and professionalism. I respect privacy and confidentiality.

43 ICCP Code of Ethics are:
A high standard of skill and knowledge. A confidential relationship with people served. Public reliance upon the standards of conduct and established practice. The observance of an ethical code.

44 Ethical Dilemma An ethical dilemma is a complex situation that often involves an apparent mental conflict between moral imperatives (an essential or urgent thing), in which to obey one would result in transgressing (go beyond the limits of ) another.

45 Computer ethical hacking
An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system or network is not.

46

47 Contd.. A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.

48 VIRUSES AND OTHER DESTRUCTIVE PROGRAMS
-                    A VIRUS IS A COMPUTER PROGRAM THAT EXECUTES WHEN AN INFECTED PROGRAM IS EXECUTED. THEREFORE, ONLY EXECUTABLE FILES CAN BE INFECTED  -  BY DEFINITION, A VIRUS INFECTS OTHER PROGRAMS WITH COPIES OF ITSELF o     MAY SIMPLY CLONE ITSELF o     MAY DAMAGE OTHER PROGRAMS AND DATA o     SOME SELF-DESTRUCT WHEN DONE -  VIRUS PROGRAMS ARE OFTEN QUITE SMALL, ONLY A FEW LINES OF CODE -   CAN BE HIDDEN IN HEALTHY SOFTWARE AND QUITE HARD TO FIND -   CAN INFECT ANY COMPUTER, CAN BE TRANSMITTED OVER ANY LINES. REPRODUCE RAPIDLY, MAKING IT DIFFICULT TO TRACE BACK TO SOURCE

49 TYPES OF VIRUSES A VIRUS MAY ATTACH ITSELF TO OTHER PROGRAMS AND HIDE IN THEM. OR IT MAY INFILTRATE THE COMPUTER’S OPERATING SYSTEM USUALLY CONTRACTED FROM EXTERNAL SOFTWARE SOURCE – VIRUS HOST PROGRAMS MADE DELIBERATELY ATTRACTIVE TO VICTIMS (E.G., MESSAGE, GAME) CAN ACT IMMEDIATELY OR LIE DORMANT FOR A PERIOD OF TIME (E.G., MICHELANGO VIRUS, ON MICHELANGO’S BIRTHDAY) OR UNTIL SOME EVENT (1-2-3 VIRUS WHEN 1,2,3 TYPED)

50 OTHER DESTRUCTIVE PROGRAMS
WORMS  WORMS ARE CONSTRUCTED TO INFILTRATE LEGITIMATE DATA PROCESSING PROGRAMS AND ALTER OR DESTROY THE DATA (E.G., ILLICIT BANK FUNDS TRANSFER)  WORMS DO NOT REPLICATE THEMSELVES (WORMS ARE LIKE A BENIGN TUMOR, VIRUSES LIKE MALIGNANT ONES)  WORM’S CHANGES MAY CONTINUE IN EFFECT AFTER WORM IS DESTROYED UNLESS CORRECTED

51 TROJAN HORSES  TROJAN HORSES ARE DESTRUCTIVE PROGRAMS THAT HAVE BEEN DISGUISED, OR CONCEALED IN, AN INNOCUOUS PIECE OF SOFTWARE (VIRUS OR WORM MAY BE WITHIN TROJAN HORSE) CAN BE IN GAMES, GRAPHICS) TROJAN HORSES DO NOT REPRODUCE THEMSELVES AND SPREAD USED FOR EMBEZZLEMENT AND INDUSTRIAL ESPIONAGE – OFTEN DESIGNED NOT TO BE DISCOVERED

52 LOGIC BOMBS   LOGIC BOMBS ARE SIMILAR TO A TROJAN HORSE, BUT ARE SET TO GO OFF AT A PARTICULAR DATE AND TIME (CAN BE DELAYED A LONG TIME)  LOGIC BOMBS DO NOT REPRODUCE  OFTEN DESIGNED TO DO MAXIMUM DAMAGE  OFTEN USED BY DISGRUNTLED EMPLOYEES, E.G., WHEN THEIR NAME IS REMOVED FROM PAYROLL RECORDS  CAN BE USED TO HOLD SOFTWARE “HOSTAGE” UNTIL A RANSOM IS PAID. ALSO “INSURANCE” FOR PAYMENT TO COMPUTER SYSTEM SUPPLIERS OR CONSULTANTS

53  BOOT SECTOR VIRUSES (“BOOT SECTOR” IS THE FIRST THING LOADED WHEN A COMPUTER STARTS)
 INFECT THE “BOOT SECTOR” ON A COMPUTER SYSTEM, OVERWRITING IT WITH INFECTED CODE  THEY THEN MOVE THE ORIGINAL BOOT SECTOR INFORMATION TO ANOTHER SECTOR ON THE DISK, MARKING THAT SECTOR AS A BAD SPOT ON THE DISK SO IT WILL NOT BE USED IN THE FUTURE  TAKES FULL COMMAND OF THE INFECTED COMPUTER  THE ONLY WAY A SYSTEM CAN BECOME INFECTED WITH A BOOT SECTOR VIRUS IS TO BOOT USING AN INFECTED FLOPPY DISK TYPES OF VIRUSES

54 FILE INFECTING VIRUSES VIRUSES THAT (SURPRISE!) INFECT FILES
MOSTLY INFECT EXECUTABLE FILES (E.G., .COM, .EXE, .OVL) SOME ACT LIKE BOOT SECTOR INFECTORS AND REPLACE THE “PROGRAM LOAD” INSTRUCTION IN AN EXECUTABLE FILE WITH THEIR OWN INSTRUCTIONS OTHERS USE “COMPANION” FILES, E.G., RENAME ALL .COM FILES WITH .EXE, THEN WRITE A NEW FILE WITH A .COM EXTENSION. THIS NEW FILE WILL HAVE THE VIRUS INSTRUCTIONS, AND WILL EXECUTE

55 POLYMORPHIC VIRUSES STEALTH VIRUSES
o POLYMORPHIC VIRUSES CHANGE THEIR APPEARANCE WITH EACH INFECTION o  THEY ARE ENCRYPTED, AND ALTER THE ENCRYPTION ALGORITHM WITH EACH NEW INFECTION (SOME WITH OVER 2 BILLION DIFFERENT FORMS). ANTI-VIRUS SOFTWARE MUST SCAN FOR ALGORITHMS AS WELL AS STRINGS STEALTH VIRUSES  o     ATTEMPT TO HIDE BOTH FROM OPERATING SYSTEM AND ANTI-VIRUS SOFTWARE o   MUST STAY IN MEMORY TO INTERCEPT ALL ATEMMPTS TO USE THE OPERATING SYSTEM o   CAN HIDE CHANGES IT MAKES TO FILE SIZES, DIRECTORY STRUCTURES AND/OR OTHER OPERATING SYSTEM ASPECTS o      MUST BE DETECTED WHILE IN MEMORY AND DISABLED BEFORE DISK-BASED COMPONENTS CAN BE CORRECTED

56 Computer Ethics is a part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct.

57 Software Conduct Due to the unintentional presence of software bugs computer programs have varying levels of reliability. Depending on the intent of a program, this sometimes raises ethical concerns relating to the production and testing of software. If a program doesn't behave predictably as a result of misrepresentation or misimplementation, then a user may, for example: Destroy personal or important data Broadcast personal or inaccurate information Misuse robotic devices and potentially damage the device, self or others

58 In order to prevent these issues and potential dilemma, developers can employ software testing to detect and fix defects, and effective standards of software design and maintenance to systematically ensure software is created as intended the first time. Consumer testing can also solve issues of software representation, and ensure that sufficient and accurate instructions are provided with a program.

59 Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic. In solving problems relating to ethical issues, Michael Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts are checked, and a list of options is generated by considering relevant factors relating to the problem. The actual action taken is influenced by specific ethical standards

60 CONCLUSION As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.

61 THANK YOU!


Download ppt "COMPUTER ETHICS."

Similar presentations


Ads by Google