SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Module 8
Security and Ethical
    Challenges
Ethics
• It is a set of principles prescribing a behaviour
  code, explains what is good and right and
  wrong
• It outlines moral duties and obligations
• Business Ethics are concerned with moral
  issues in business just like medical ethics in
  medical practice
Computer Crime/ Cyber Crime
• It is defined by the Association of Information
  Technology Professionals (AITP) as:
  1. The unauthorized use , access modification and
     destruction of hardware, software, data or
     network resources
  2. Unauthorized release of information
  3. Unauthorized copying of software
  4. Denying end user access to his own hardware,
     software, data and network resources
  5. Using or conspiring to use computer to obtain
     intangible property illegally
Computer Crime/ Cyber Crime
• It is caused by the criminal or irresponsible
  actions of individuals who are taking
  advantage of the widespread use and
  vulnerability of computers and internet
• It poses serious threat to the integrity, safety
  and survival of most business systems
Hacking and Cracking
• Hacking- It is the obsessive use of computers or the
  unauthorized access and use of networked
  computer systems
• Hacker can be outsider or company employee
• Commits only electronic breaking and entering, that
  is, gets access to a computer system and read some
  files but neither steals nor damages anything
• Can monitor e-mail, web server access or files
  transfers to extract passwords, steal network files or
  plant data that will cause a system to welcome
  intruders
Common Hacking Tactics
1. Denial of service
2. Scans
3. Sniffer
4. Spoofing
5. Trojan horse
6. Back doors
7. Malicious applets
8. War dialing
9. Logic bombs
10.Buffer overflow
11.Password crackers
12.Social engineering
13.Dumpster diving
Cracking
• Cracker refers to people who attempt to gain
  unauthorized access to computer systems
• Maintains knowledge of the vulnerabilities
  and exploits them for private advantage, not
  revealing either to general public or the
  manufacturer for correction
Cyber Theft
• Computer crimes leading to theft of money
• Insiders involve unauthorized network entry
  and fraudulent alteration of computer
  databases
• Early e.g. was the theft of $ 11 million from
  Citibank in 1994
Unauthorized Use at Work
• Can also be called time and resource theft
• Network monitoring software, called sniffers,
  is frequently used to monitor network traffic
  to evaluate network capacity, as well as to
  reveal evidences of improper use
Software Piracy
• Unauthorized copying of software is a major
  form of SW theft
• Unauthorized copying is illegal as SW is
  intellectual property protected by copying
  right law and user licensing agreements
Theft of Intellectual Property
• Occurs in the form of infringements of
  copyrighted material, such as music, videos,
  images, articles, books
Privacy Issues
• Accessing private e-mail conversations and
  computer records and collecting and sharing
  information about individuals gained from their
  visits to Internet Web sites and newsgroups
• Always knowing where the person is
• Using customer information gained from many
  sources to market additional business services
• Collecting telephone numbers, e-mail addresses,
  credit card numbers and other personal
  information to build individual customer profiles
  (unauthorised personal profile)
Privacy on the Internet
• E-mail, chat and newsgroups are still a wide
  open unsecured electronic frontier
• Beware of
  – Collection of data about you without your
    knowledge
Cyber Law
• It is a term used to describe laws intended to
  regulate activities over the internet or via the
  use of electronic data communication
• It encompasses wide variety of legal and
  political issues related to internet and other
  communication technologies including
  Intellectual Property, privacy, freedom of
  expression and jurisdiction
Challenges
1.   Employment challenges
2.   Computer monitoring
3.   Challenges in working conditions
4.   Challenges to individuality
5.   Health issues
6.   Ergonomics
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsDaksh Verma
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 

Was ist angesagt? (20)

Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
 
Hacking
Hacking Hacking
Hacking
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Chapter11
Chapter11Chapter11
Chapter11
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

Andere mochten auch

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
 
Ethical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyEthical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyInternet Law Center
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...RSD Relating Systems Thinking and Design
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 

Andere mochten auch (16)

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Ethical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyEthical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet Policy
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Form, Meaning and Design
Form, Meaning and DesignForm, Meaning and Design
Form, Meaning and Design
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 

Ähnlich wie Module 8 security and ethical challenges

Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 

Ähnlich wie Module 8 security and ethical challenges (20)

Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 

Kürzlich hochgeladen

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Kürzlich hochgeladen (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Module 8 security and ethical challenges

  • 1. Module 8 Security and Ethical Challenges
  • 2. Ethics • It is a set of principles prescribing a behaviour code, explains what is good and right and wrong • It outlines moral duties and obligations • Business Ethics are concerned with moral issues in business just like medical ethics in medical practice
  • 3. Computer Crime/ Cyber Crime • It is defined by the Association of Information Technology Professionals (AITP) as: 1. The unauthorized use , access modification and destruction of hardware, software, data or network resources 2. Unauthorized release of information 3. Unauthorized copying of software 4. Denying end user access to his own hardware, software, data and network resources 5. Using or conspiring to use computer to obtain intangible property illegally
  • 4. Computer Crime/ Cyber Crime • It is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and internet • It poses serious threat to the integrity, safety and survival of most business systems
  • 5. Hacking and Cracking • Hacking- It is the obsessive use of computers or the unauthorized access and use of networked computer systems • Hacker can be outsider or company employee • Commits only electronic breaking and entering, that is, gets access to a computer system and read some files but neither steals nor damages anything • Can monitor e-mail, web server access or files transfers to extract passwords, steal network files or plant data that will cause a system to welcome intruders
  • 6. Common Hacking Tactics 1. Denial of service 2. Scans 3. Sniffer 4. Spoofing 5. Trojan horse 6. Back doors 7. Malicious applets 8. War dialing 9. Logic bombs 10.Buffer overflow 11.Password crackers 12.Social engineering 13.Dumpster diving
  • 7. Cracking • Cracker refers to people who attempt to gain unauthorized access to computer systems • Maintains knowledge of the vulnerabilities and exploits them for private advantage, not revealing either to general public or the manufacturer for correction
  • 8. Cyber Theft • Computer crimes leading to theft of money • Insiders involve unauthorized network entry and fraudulent alteration of computer databases • Early e.g. was the theft of $ 11 million from Citibank in 1994
  • 9. Unauthorized Use at Work • Can also be called time and resource theft • Network monitoring software, called sniffers, is frequently used to monitor network traffic to evaluate network capacity, as well as to reveal evidences of improper use
  • 10. Software Piracy • Unauthorized copying of software is a major form of SW theft • Unauthorized copying is illegal as SW is intellectual property protected by copying right law and user licensing agreements
  • 11. Theft of Intellectual Property • Occurs in the form of infringements of copyrighted material, such as music, videos, images, articles, books
  • 12. Privacy Issues • Accessing private e-mail conversations and computer records and collecting and sharing information about individuals gained from their visits to Internet Web sites and newsgroups • Always knowing where the person is • Using customer information gained from many sources to market additional business services • Collecting telephone numbers, e-mail addresses, credit card numbers and other personal information to build individual customer profiles (unauthorised personal profile)
  • 13. Privacy on the Internet • E-mail, chat and newsgroups are still a wide open unsecured electronic frontier • Beware of – Collection of data about you without your knowledge
  • 14. Cyber Law • It is a term used to describe laws intended to regulate activities over the internet or via the use of electronic data communication • It encompasses wide variety of legal and political issues related to internet and other communication technologies including Intellectual Property, privacy, freedom of expression and jurisdiction
  • 15. Challenges 1. Employment challenges 2. Computer monitoring 3. Challenges in working conditions 4. Challenges to individuality 5. Health issues 6. Ergonomics

Hinweis der Redaktion

  1. O Brien Pg 665
  2. O Brien Pg 671Computer programs are valuable property and thus the subject of theft from computer systems
  3. O Brien Pg 677
  4. O Brien Pg 682