2. Ethics
• It is a set of principles prescribing a behaviour
code, explains what is good and right and
wrong
• It outlines moral duties and obligations
• Business Ethics are concerned with moral
issues in business just like medical ethics in
medical practice
3. Computer Crime/ Cyber Crime
• It is defined by the Association of Information
Technology Professionals (AITP) as:
1. The unauthorized use , access modification and
destruction of hardware, software, data or
network resources
2. Unauthorized release of information
3. Unauthorized copying of software
4. Denying end user access to his own hardware,
software, data and network resources
5. Using or conspiring to use computer to obtain
intangible property illegally
4. Computer Crime/ Cyber Crime
• It is caused by the criminal or irresponsible
actions of individuals who are taking
advantage of the widespread use and
vulnerability of computers and internet
• It poses serious threat to the integrity, safety
and survival of most business systems
5. Hacking and Cracking
• Hacking- It is the obsessive use of computers or the
unauthorized access and use of networked
computer systems
• Hacker can be outsider or company employee
• Commits only electronic breaking and entering, that
is, gets access to a computer system and read some
files but neither steals nor damages anything
• Can monitor e-mail, web server access or files
transfers to extract passwords, steal network files or
plant data that will cause a system to welcome
intruders
6. Common Hacking Tactics
1. Denial of service
2. Scans
3. Sniffer
4. Spoofing
5. Trojan horse
6. Back doors
7. Malicious applets
8. War dialing
9. Logic bombs
10.Buffer overflow
11.Password crackers
12.Social engineering
13.Dumpster diving
7. Cracking
• Cracker refers to people who attempt to gain
unauthorized access to computer systems
• Maintains knowledge of the vulnerabilities
and exploits them for private advantage, not
revealing either to general public or the
manufacturer for correction
8. Cyber Theft
• Computer crimes leading to theft of money
• Insiders involve unauthorized network entry
and fraudulent alteration of computer
databases
• Early e.g. was the theft of $ 11 million from
Citibank in 1994
9. Unauthorized Use at Work
• Can also be called time and resource theft
• Network monitoring software, called sniffers,
is frequently used to monitor network traffic
to evaluate network capacity, as well as to
reveal evidences of improper use
10. Software Piracy
• Unauthorized copying of software is a major
form of SW theft
• Unauthorized copying is illegal as SW is
intellectual property protected by copying
right law and user licensing agreements
11. Theft of Intellectual Property
• Occurs in the form of infringements of
copyrighted material, such as music, videos,
images, articles, books
12. Privacy Issues
• Accessing private e-mail conversations and
computer records and collecting and sharing
information about individuals gained from their
visits to Internet Web sites and newsgroups
• Always knowing where the person is
• Using customer information gained from many
sources to market additional business services
• Collecting telephone numbers, e-mail addresses,
credit card numbers and other personal
information to build individual customer profiles
(unauthorised personal profile)
13. Privacy on the Internet
• E-mail, chat and newsgroups are still a wide
open unsecured electronic frontier
• Beware of
– Collection of data about you without your
knowledge
14. Cyber Law
• It is a term used to describe laws intended to
regulate activities over the internet or via the
use of electronic data communication
• It encompasses wide variety of legal and
political issues related to internet and other
communication technologies including
Intellectual Property, privacy, freedom of
expression and jurisdiction
15. Challenges
1. Employment challenges
2. Computer monitoring
3. Challenges in working conditions
4. Challenges to individuality
5. Health issues
6. Ergonomics