Published on


Published in: Education, Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1.
  3. 3. MISSION<br />“The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”<br />
  4. 4. VISION<br />“A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”<br />
  5. 5.
  6. 6. COMPUTER ETHICS<br />
  7. 7. What is a Computer Ethics:<br />…………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..<br />
  8. 8. Introduction: <br /> A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them. <br />
  9. 9. …..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live. <br />
  10. 10.
  11. 11. What are the consequences of the widespread presence of the computer technology??<br />
  12. 12. .…..The threats to computers and communication systems…….<br />
  13. 13. Introduction:<br /> Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…<br />
  14. 14. ….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…<br />
  15. 15.
  16. 16. Is computer technology creating more problems than its solving??<br />
  17. 17. The threats to computers and communications systems…<br />Errors and Accidents<br />Natural and Other Hazards<br />Crimes Against Information Technology<br />Crimes Using Information Technology<br />Virus<br />
  18. 18. Errors and Accidents<br />
  19. 19. …….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….<br />
  20. 20. People Errors<br /> Recall that one part of computer system is the people who manage it or run it…<br />
  21. 21. Procedural Errors<br /> Some spectacular computer failures have occurred because someone didn’t follow procedures..<br />
  22. 22. Software Errors<br /> We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..<br />
  23. 23. Electromechanical Problems<br /> Absence of Electricity or power failure causing the system not to work ..<br />
  24. 24. Dirty Data<br /> Is Data that is incomplete, outdated or otherwise inaccurate that causes errors in the computer system..<br />
  25. 25. Natural and Other Hazards<br />
  26. 26. Natural Hazards<br /> What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters…<br /> ………Natural Hazards can disable all the electronic systems we take for granted… <br />
  27. 27. Civil Strife and Terrorism<br />
  28. 28. Crimes Against Computers and Communications<br />
  29. 29. Information-technology Crime can be of two types:<br />Illegal act perpetrated against computers or telecommunications..<br />Use of computers or telecommunications to accomplish an illegal act..<br />
  30. 30. Crimes against information technology include theft….<br />Theft of Hardware<br />Theft of Software<br />Theft of Time and Services<br />Theft of Information<br />Theft of Malice and Destruction<br />
  31. 31. Crimes Using Computers and Communications……<br /> Computers and communications or information technology has also been used to solve crimes….<br /> ……..Just as a car can be used to assist <br /> in a crime, so can a computer or communication system..<br />
  32. 32. VIRUSES<br />
  33. 33. Viruses<br /> Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…<br />
  34. 34. They are passed in two ways…….<br />Via an Infected Diskette<br />Via a Network<br />
  35. 35. Some common forms of Viruses…<br />Boot-sector Virus<br />File Virus<br />Worm<br />Logic Bomb<br />Trojan Horse<br />Polymorphic Virus<br />Virus Mutation Engines<br />
  36. 36.
  37. 37. Antivirus Software<br />Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..<br />
  38. 38. Computer Criminals<br />
  39. 39. What kind of people are perpetrating most of the Information Technology???<br />Employees<br />Outside Users<br />Hackers<br />Crackers<br />Professional Criminals<br />