SlideShare ist ein Scribd-Unternehmen logo
1 von 30
COMPUTER EDUCATION 9
MODULE 5
Security and Ethics
Prepared By: Engr. Jeremy M. Flores
TEN COMPUTER ETHICS
(1)
Thou shall not use computer to
harm other people.
TEN COMPUTER ETHICS
(2)
Thou shall not interfere with
other people’s computer work.
TEN COMPUTER ETHICS
(3)
Thou shall not snoop around in
other people’s files.
TEN COMPUTER ETHICS
(4)
Thou shall not use a computer
to steal.
TEN COMPUTER ETHICS
(5)
Thou shall not use a computer
to bear false witness.
TEN COMPUTER ETHICS
(6)
Thou shall not use or copy
software for which you have
not paid.
TEN COMPUTER ETHICS
(7)
Thou shall not use other
people’s computer resources
without authorization.
TEN COMPUTER ETHICS
(8)
Thou shall not appropriate
other people’s intellectual
output.
TEN COMPUTER ETHICS
(9)
Thou shall think about the
social consequences of the
program you write.
TEN COMPUTER ETHICS
(10)
Thou shall use a computer in
ways that shows consideration
and respect.
MALWARE
Malicious Software
A code or software that is
specifically designed to damage,
disrupt, steal, or in general, inflict
some other “bad” or illegitimate
action on data, hosts, or
networks.
MALWARE
Malicious Software
Malware cannot damage the
physical components of
computer systems and network
equipment, but it can damage
the data and software residing on
the equipment.
TYPES OF MALWARE
ADWARE
(Advertising-supported Software)
A software or program that
automatically delivers
advertisements, such as pop-up ads
on websites, and some serves as
revenue generating tool.
TYPES OF MALWARE
BOT or BOTNET
A software or program created to
automatically perform specific
operations. Some are created for
relatively harmless purpose, while
most are used for DoS attacks.
TYPES OF MALWARE
RANSOMWARE
A software or program that
essentially holds a computer
system captive, such as
restricting user access to the
computer, while demanding a
ransom.
TYPES OF MALWARE
ROOTKIT
A software or program designed
to remotely access or control a
computer without being detected
by users or security programs.
TYPES OF MALWARE
SPYWARE
A software or program that
functions by spying on user
activity without their knowledge,
such as activity monitoring,
collecting keystrokes, data
harvesting, and the like.
TYPES OF MALWARE
TROJAN HORSE
A software or program that
disguises itself as a normal file or
program to trick users into
copying, downloading, and
installing malware.
TYPES OF MALWARE
VIRUS
A software or program that is
capable of copying itself and
spreading to other computers by
attaching themselves to various
programs and executable files.
TYPES OF MALWARE
COMPUTER WORM
A software or program that spreads
over computer networks by
exploiting computer system
vulnerabilities, and have the ability
to self-replicate and spread
independently.
TYPES OF MALWARE
KEYLOGGER
A software or program that
records keystrokes to steal
information, such as a password.
TYPES OF MALWARE
LOGIC BOMB
A software or program that sits
dormant on a computer until it is
triggered by a specific event,
such as specific date or time.
TOP DEVELOPERS OF MALWARE
United States of America
China
Germany
7th to 10th Rank: Philippines
AVERAGE MALWARE INFECTION
ONE COMPUTER FOR
EVERY TWO MINUTES
INTERVAL.
SYMPTOMS OF MALWARE
Increase CPU usage.
Slow computer or web browser speeds.
Problems connecting to networks.
Freezing or crashing.
Modified or deleted files.
SYMPTOMS OF MALWARE
Appearance of strange files, programs, or
icons.
Programs running, turning off, or
reconfiguring themselves.
Emails being sent automatically.
Strange computer behaviors.
PREVENTION AND REMOVAL
Install and run anti-malware and
firewall software. Choose a program
that offers tools for detecting,
quarantining, and removing multiple
types of malware. A combination of an
anti-malware software and a firewall
will ensure safety.
PREVENTION AND REMOVAL
Keep software and operating systems up
to date with current vulnerability patches
for bugs and security flaws that could be
exploited by attackers.
PREVENTION AND REMOVAL
“HIGHLY IMPORTANT”
Be vigilant when copying and
downloading files, programs,
attachments, and the like.

Weitere ähnliche Inhalte

Was ist angesagt?

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
Rizwan Razman
 

Was ist angesagt? (20)

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Internet security
Internet securityInternet security
Internet security
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Presentation
PresentationPresentation
Presentation
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Ppt123
Ppt123Ppt123
Ppt123
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 

Andere mochten auch

Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28
Karlos Svoboda
 
Question h challanges in banking
Question h   challanges in bankingQuestion h   challanges in banking
Question h challanges in banking
Daniel Kheyfets
 
Marketing public relation
Marketing public relationMarketing public relation
Marketing public relation
jublegeorge
 

Andere mochten auch (7)

Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28
 
Question h challanges in banking
Question h   challanges in bankingQuestion h   challanges in banking
Question h challanges in banking
 
Marketing public relation
Marketing public relationMarketing public relation
Marketing public relation
 
Direct marketing and public relation
Direct marketing and public relationDirect marketing and public relation
Direct marketing and public relation
 
Advertising effectiveness
Advertising effectivenessAdvertising effectiveness
Advertising effectiveness
 
Ethics in finacne
Ethics in finacneEthics in finacne
Ethics in finacne
 
Public Relations
Public RelationsPublic Relations
Public Relations
 

Ähnlich wie COMPED9 Module 5 Security and Ethics

Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

Ähnlich wie COMPED9 Module 5 Security and Ethics (20)

Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
INFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptxINFORMATION AND COMPUTER SECURITY.pptx
INFORMATION AND COMPUTER SECURITY.pptx
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Malware
MalwareMalware
Malware
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Computervirus
Computervirus Computervirus
Computervirus
 

Kürzlich hochgeladen

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

COMPED9 Module 5 Security and Ethics