LEGAL AND ETHICAL USE OF TECHNOLOGY. THIS LESSON IS SCOPE OF OUR SUBJECT THAT WE HAVE TO TACKLE WHICH THE TECHNOLOGY FOR TEACHING AND LEARNING 2. THIS LESSON MAKES YOU DIGITAL LITERATE
2. ETHICAL USE OF TECHNOLOGY
2
Technology and software issues are elaborated for
you to be aware and be guided in doing the right
thing and avoiding the unacceptable acts that may
lead you to committing mistakes or possible
software and technology crimes that’s against the
law.
When we are young, our parents used to teach us
the right behavior and etiquette. Even in schools and
classes, there are certain behaviors and ethics we
need to observe to achieve a healthy relationships
3. ETHICS FOR COMPUTER
USERS
1. Use the computer to help not to do harm.
2. Use your own or assigned computer unit and not to interfere with others.
3. Use the computer using your own files and not to use other’s files.
4. Use the computer to share information and not to steal other’s information.
5. Use the computer to spread truthful information and not to do character
assassination.
6. Use software that are original and legal and not pirated.
7. Use other’s computer resources with permission and not to duplicate it
without authorization.
8. Use your own work and not the work of others.
9. Use the computer that shows respect and consideration for other people and
not to do cyberbullying.
10. Create programs or software having in mind its social impact and not for
self- interest.
3
5. A. UNAUTHORIZED ACCESS AND USE OF HARDWARE,
SOFTWARE, NETWORK, AND COMPUTER FILES
If somebody would use anybody’s computer and files
without permission from the owner, that is called
unauthorized access. A person is called a cracker or a
hacker if he/she tries to access a computer or
network illegally to access data and commit malicious
acts like identity theft.
Hacker originally means a computer enthusiast who
does well in computer that benefits other people.
However, the term hacker now has an adverse
connotation which refers to a person who breaks into
the computer system to steal or corrupt the data in it.
5
6. TIPS IN CREATING A PASSWORD
1. Use at least 8 characters.
2. Use a combination of upper and lower case letters,
words, numbers and special characters.
3. Use joined words together.
4. Add one or more numbers at the beginning, middle, or
end of a word.
5. Use words from other languages.
6. Use a password that can be remembered easily.
7. Select a password that can be entered easily even
without looking at the keyboard.
8. Do not leave written copies of your passwords
anywhere.
9. Do not share your password to anyone.
7. B. Hardware theft and vandalism
WHAT IS HARDWARE THEFT AND VANDALISM?
- are other types of computer security risks.
HARDWARE THEFT- is the act of stealing computer
equipment.
- Consist of people opening up computers and taking
parts out of them. Hardware theft also happens in
retail stores, when people break open the package and
shoplift the item.
HARDWARE VANDALISM- is the act of defacing or
destroying computers equipment.
- Takes many forms, from someone cutting a computer
cable to individuals breaking into business or school
computers lab and aimlessly smashing computer.
7
8. IS THEFT PART OF VANDALISM?
- It depends on the crime and the victim’s point of view. It can be
called theft if you stealing space on a person’s possession or
building. In the sphere of auto vandalism then theft is involved.
- Hardware and theft vandalism do not really pose a threat to
the home desktop computer user but it threat for those have
a smaller system units that easily can fit in a backpack or
briefcase. It is easy to steal because of its weight and its small
size. Mobile users also are susceptible to hardware theft.
More than 600,000 notebooks is estimated stolen each year.
Theft often target notebook computer of company executives
so that they can access confidential information illegally. In the
case, hardware theft is combined with software theft.
8
9. C. SOFTWARE THEFT
Software theft means the unauthorized or
illegal copying, sharing or usage of copyright-
protected software programs. Software theft
may be carried out by individuals, groups or,
in some cases, organizations who then
distribute the unauthorized software copies
to users.
WHEN DOES IT OCCURRED?
Occurs when someone:
1. Steals software media
2. Intentionally erases programs
3. Illegally copies a program
4. Illegally registers or activates a program
9
10. THERE ARE FIVE MAIN TYPES OF SOFTWARE
PIRACY
Counterfeiting
- This type of piracy is the illegal duplication, distribution and/ or sale of
copyrighted material with the intent of imitating the copyrighted
product. In the case of packaged software, it is common to find
counterfeit copies of the compact discs incorporating the software
programs, as well as related packaging, manuals, license agreements,
labels, registration cards and security features.
Internet Piracy
- This occurs when software is downloaded from the Internet. The same
purchasing rules apply to online software purchases as for those
bought in compact disc format. Common internet piracy techniques
are:
Websites that make software available for free download or in
exchange for others.
10
11. Internet auction sites that offer counterfeit or out-of- channel
software.
Peer-to-peer networks that enable unauthorized transfer of
copyrighted programs.
End user Piracy
- This occurs when an individual reproduces copies of software without
authorization. This include:
Using one licensed copy to install a program on multiple computers.
Copying discs for installation or distribution
Taking advantage of upgrade offers without having a legal copy of the
version to be upgraded
Acquiring academic or other restricted or non- retail software without
a proper license
Swapping discs in or outside the workplace
11
12. Client- Server Overuse
- This type of piracy occurs when too many users on a network are
using central copy of a program at the same time. If you have a local-
area network and install programs on the server for several people to
use, you have to be sure your license entitles you to do so. If you have
more users than allowed by the license, that’s “overuse.”
Hard- Disk Loading
- This occurs when a business sells new computers with illegal copies of
software loaded onto the hard disks to make the purchase of the
machines more attractive.
12
13. D. INFORMATION THEFT/ IDENTITY THEFT
- Identity theft is the crime of obtaining the
personal information of another personal or
financial information of another person to use
their identity to commit fraud, such as making
unauthorized transactions or purchases.
- Identity theft is committed in many different
ways and its victims are typically left with
damage to their credit, finances, and
reputation.
- Identity theft occurs when someone steals
your personal information- such as your Social
Security number, bank account number, and
credit card information.
13
14. - Some identity thieves sift through trash bins looking for bank
account and credit card statements. More high- tech methods
involve accessing corporate data bases to steal lists of customer
information. Once identity thieves have the information they are
looking for, they can ruin a person’s credit rating and the standing of
other personal information.
- Identity thieves increasingly use computer technology to obtain other
people’s personal information for identity fraud. To find such
information, they may search the hard drives of stolen or discarded
computers; hack into computers or computer networks; access
computer- based public records; use information- gathering malware
to infect computers; browse social networking sites; or use deceptive
emails or text messages.
14
15. HERE ARE FIVE COMMON TYPES OF
IDENTITY THEFT TO HELP YOU STAY ONE
STEP AHEAD OF THE HACKERS.
1. FINANCIAL IDENTITY- theft is when one person uses another’s personal
data for financial benefit. This is the most common form of identity theft
(including the credit card example described above). Financial identity
theft can take multiple forms, including:
- Fraudsters may use your credit card information to buy things. We all love
to shop online- even criminals. Unfortunately, this issue has become
especially prevalent thanks to online shopping during the COVID-19
pandemic.
- Hackers may steal funds from your bank account. Sometimes, the
amount might be so small that it seems inconsequential, totaling just a
few dollars. However, criminals can rack up millions in damages if they
target enough people in this way.
15
16. 2. MEDICAL IDENTITY THEFT- is when a criminal poses as another person
to obtain health care services. In fact, fraudsters may use your name and
insurance information to:
- Get prescriptions for drugs. Access medical services, from checkups to
costly surgeries. Obtain medical devices and supplies, such as
wheelchairs or hearing aids. This can result in you having bills of
prescriptions, services, or devices you didn’t need, ask for, or even
receive. Your health care and insurance records may even have these
things added to them. An inaccurate medical record can make it harder
for you to get the care you need in the future and even impact insurance
coverage.
- Fortunately, you can help minimize the risk of medical identity theft by
regularly viewing your medical claims. Contact your insurer if you see
unfamiliar procedures, prescriptions, or services. You’ll also want to let
your health care provider know so that they can ensure your medical
files are correct .
16
17. 3. CRIMINAL IDENTITY THEFT- occurs when a person arrested by law
enforcement uses someone else’s name instead of providing theirs. They
might be able to pass this off by creating a fake ID or using a stolen ID, like
your driver’s license, to show to the police. This type of fraud can be
difficult to detect until the consequences are evident, like:
- A bench warrant is issued for your arrest. Unresolved problems like
unpaid parking tickets can also result in a judge issuing a bench
warrant. You may then be taken into custody at any time, even during
a routine traffic stop.
- You can help protect yourself against criminal identity theft by
safeguarding your ID. If your license or state- issued ID is lost or
stolen, report it to the local Department of Motor Vehicles (DMV) and
law enforcement. Also, limit the information you share online (and
encourage family members to do the same). For example, if your teen
got their first driver’s license and wants to share a pic of it on social
media, explain why this isn’t a good idea.
17
18. 4. SYNTHETIC IDENTITY THEFT- Fraudsters may use data like birthdates,
addresses, and Social Security numbers from real people, blending them to
create a fake profile. They can then use this persona to apply for loans or
credit cards or commit other financial crimes. Kids and older adults tend to
be vulnerable to this type of fraud since they are rarely use their SSNs.
- The most important thing about synthetic identity theft is knowing the
signs and acting fast. Keep an eye out for any mail with your address
on it but addressed to a different name and phone calls or mail about
new credit accounts. You can further protect yourself by regularly
checking your credit reports for unexplained changes and placing a
security freeze on them.
- There are also identity monitoring services available, which scan the
internet, including the dark web, for breached Social Security numbers.
If you suspect you or loved one is the victim of synthetic identity theft,
contact the relevant financial institutions to alert them.
18
19. 5. CHILD IDENTITY THEFT- The thief may even use the child’s identity to
get a driver’s license, apply for governments benefits, or buy a house.
This is often easier than targeting an adult because most kids don’t have
credit reports or financial accounts, making them a clean slate.
- Unfortunately, child identity theft is often perpetrated within the
family by a relative who has access to the child’s data like their
birthdate and address. And many children don’t realize they’ve been
targeted until they’re older- for example, when they try to take out a
student loan. By this point, the issue may have been escalating for
years. So, its important as a parent to be aware of child identity theft.
- The best way to do this is to check whether your child has a credit
report with any of the three big credit bureaus (TransUnion, Equifax,
and Experian). If so, review the report and report any fraudulent
activity. You can also place a freeze on your child’s credit report to
help minimize the risk of future fraud.
19
20. E. WHAT IS MALICIOUS ACTS IN SOFTWARE
- “Malicious Software” coin the word
“Malware” and the meaning remains the
same. It refers to any malicious program
that cause harm to the computer system
or network. Malicious Malware Software
attacks a computer or network in the form
of viruses, worms, trojans, spyware,
adware or rootkits.
- Their mission is often targeted at
accomplishing unlawful task such as
robbing protected area, deleting
confidential documents or add software
without the user consent.
20
21. MALICIOUS SOFTWARE HISTORY
- Even before the internet became widespread, malicious
software (virus) was infected on personal computers with the
executable boot sectors of floppy disks. Initially, the computer
viruses were written for the Apple II and Macintosh devices.
After the IBM PC and MS-DOS system became more
widespread they were also targeted in the similar fashion. The
first worms originated on multitasking Unix system, they were
the first network-borne infectious programs too. SunOS and
VAX BSD systems were infected by the first well-known worm
of the time called the Internet Worm of 1988. Ever since the
advent of Microsoft Windows platform in 1990s, the infectious
codes were written in the macro language of Microsoft Word
and similar programs.
21
22. DIFFERENT TYPES OF MALICIOUS
1. COMPUTER VIRUS (VIRUS)
- is a malicious software which self replicates and
attaches itself to other files/ programs. Its capable
of executing secretly when the host program/ file is
activated. The different types of computer virus are
Memory- Resident virus, Program File Virus, Boot
Sector Virus, Stealth Virus, Macro Virus, and Email
Virus.
2. WORMS
- A worm is malicious software which similar to that
of a computer virus is a self- replicating program,
however, in the case of worms, it automatically
executes itself. Worms spread over a network and
are capable of launching a cumbersome and
destructive attack within a short period.
22
23. 3. TROJAN HORSES
- Unlike a computer virus or a worm- the trojan
horse is non- replicating program that
appears legitimate. After gaining the trust, it
secretly performs malicious and illicit “bawal”
activities when executed. Hackers make use
of trojan horses to steal a user’s password
information, destroy data or programs on the
hard disk. It is hard to detect!
4. SPYWARE/ADWARE
- Spyware secretly records information about a
user and forwards it to third parties. The
information gathered may cover files accessed on
the computer, a user’s online activities or even
user’s keystrokes.
23
24. ADWARE
- Adware as the name interprets displays
advertising banners while a program is running.
Adware can also work like spyware, it is
deployed to gather confidential information.
Basically, to spy on and gather information from
a victim’s computer.
5. ROOTKIT
- Malicious software that alters the regular
functionality of an OS on a computer in a stealthy
manner. The altering helps the hacker to take full
control of the system administrator on the victim’s
system. Almost all the rootkits are designed to hide
their existence.
24
25. DIFFERENT TYPES OF COMPUTER VIRUSES
1. MEMORY- RESIDENT VIRUS
WHAT IT DOES?
- To live as a Resident in the RAM memory.
How affects your PC?
- It interrupt all of the operations executed by the system.
EXAMPLE OF VIRUS: Randex, CMJ, Meve, and MrKlunky.
2. PROGRAM FILE VIRUSES
WHAT IT DOES?
- Infects executables such as EXE,BIN,COM,SYS
How affects our PC?
- Destroy or Alter Program or Data.
EXAMPLE OF VIRUS:
Sunday and Cascade
25
26. 3. BOOT SECTOR VIRUSES
WHAT IT DOES?
- Infects boot sectors on hard and floppy disks.
How affects our PC?
- Destroy or Alters Programs or Data.
EXAMPLE OF VIRUSES:
Disk killer, Stone Virus
4. STEALTH VIRUSES
WHAT IT DOES?
-Uses various tactics to avoid detection.
How affects our PC?
- Destroy or Alters Programs and Data.
EXAMPLE OF VIRUS:
Frodo, Joshi, Whale
26
27. 5. MACRO VIRUSES
WHAT IT DOES?
- Triggers on a command in Microsoft Office.
How affects our PC?
- Commonly affects Word and Excel.
EXAMPLE OF VIRUS: DMV, NUCLEAR WORD, CONCEPT
6. EMAIL VIRUS
WHAT IT DOES?
- If the recipient open the e-mail attachment, the word
macro is activated then.
How it affects our PC?
- Spread only with the opening of the attachment in the
email.
EXAMPLE OF VIRUS: Mellisa, ILOVEYOU, Love Bug
27
28. METHODS OF PROTECTION AGAINST MALICIOUS SOFTWARE:
- Malicious Software threat for corporate users and individuals,
thereby detecting and fighting malware remains on top of the
agenda for many firms. Since the time BYOD culture started to
flourish, Endpoint Security and Endpoint Protection have
become the topics of discussion in many IT conference rooms.
Many corporates today try to implement the best Endpoint
Security or Endpoint Protection software to steer clear of the
dangers.
- Remember, if it is an individual system, it is essential to have an
antivirus installed and if you already have one in place see to
that it is updated at regular intervals. This approach will help you
to remain safe during new breakouts. Comodo’s Free Antivirus,
Endpoint Security, Endpoint Protection Solutions are your best
option for detecting and fighting malicious software.
28