SlideShare a Scribd company logo
1 of 29
GROUP 3
LEGAL AND
ETHICAL USE OF
TECHNOLOGY
ETHICAL USE OF TECHNOLOGY
2
 Technology and software issues are elaborated for
you to be aware and be guided in doing the right
thing and avoiding the unacceptable acts that may
lead you to committing mistakes or possible
software and technology crimes that’s against the
law.
 When we are young, our parents used to teach us
the right behavior and etiquette. Even in schools and
classes, there are certain behaviors and ethics we
need to observe to achieve a healthy relationships
ETHICS FOR COMPUTER
USERS
1. Use the computer to help not to do harm.
2. Use your own or assigned computer unit and not to interfere with others.
3. Use the computer using your own files and not to use other’s files.
4. Use the computer to share information and not to steal other’s information.
5. Use the computer to spread truthful information and not to do character
assassination.
6. Use software that are original and legal and not pirated.
7. Use other’s computer resources with permission and not to duplicate it
without authorization.
8. Use your own work and not the work of others.
9. Use the computer that shows respect and consideration for other people and
not to do cyberbullying.
10. Create programs or software having in mind its social impact and not for
self- interest.
3
“ 1. ETHICAL
ISSUES IN
TECHNOLOGY
AND
SOFTWARE
4
A. UNAUTHORIZED ACCESS AND USE OF HARDWARE,
SOFTWARE, NETWORK, AND COMPUTER FILES
 If somebody would use anybody’s computer and files
without permission from the owner, that is called
unauthorized access. A person is called a cracker or a
hacker if he/she tries to access a computer or
network illegally to access data and commit malicious
acts like identity theft.
 Hacker originally means a computer enthusiast who
does well in computer that benefits other people.
However, the term hacker now has an adverse
connotation which refers to a person who breaks into
the computer system to steal or corrupt the data in it.
5
TIPS IN CREATING A PASSWORD
1. Use at least 8 characters.
2. Use a combination of upper and lower case letters,
words, numbers and special characters.
3. Use joined words together.
4. Add one or more numbers at the beginning, middle, or
end of a word.
5. Use words from other languages.
6. Use a password that can be remembered easily.
7. Select a password that can be entered easily even
without looking at the keyboard.
8. Do not leave written copies of your passwords
anywhere.
9. Do not share your password to anyone.
B. Hardware theft and vandalism
WHAT IS HARDWARE THEFT AND VANDALISM?
- are other types of computer security risks.
HARDWARE THEFT- is the act of stealing computer
equipment.
- Consist of people opening up computers and taking
parts out of them. Hardware theft also happens in
retail stores, when people break open the package and
shoplift the item.
HARDWARE VANDALISM- is the act of defacing or
destroying computers equipment.
- Takes many forms, from someone cutting a computer
cable to individuals breaking into business or school
computers lab and aimlessly smashing computer.
7
IS THEFT PART OF VANDALISM?
- It depends on the crime and the victim’s point of view. It can be
called theft if you stealing space on a person’s possession or
building. In the sphere of auto vandalism then theft is involved.
- Hardware and theft vandalism do not really pose a threat to
the home desktop computer user but it threat for those have
a smaller system units that easily can fit in a backpack or
briefcase. It is easy to steal because of its weight and its small
size. Mobile users also are susceptible to hardware theft.
More than 600,000 notebooks is estimated stolen each year.
Theft often target notebook computer of company executives
so that they can access confidential information illegally. In the
case, hardware theft is combined with software theft.
8
C. SOFTWARE THEFT
 Software theft means the unauthorized or
illegal copying, sharing or usage of copyright-
protected software programs. Software theft
may be carried out by individuals, groups or,
in some cases, organizations who then
distribute the unauthorized software copies
to users.
 WHEN DOES IT OCCURRED?
Occurs when someone:
1. Steals software media
2. Intentionally erases programs
3. Illegally copies a program
4. Illegally registers or activates a program
9
THERE ARE FIVE MAIN TYPES OF SOFTWARE
PIRACY
 Counterfeiting
- This type of piracy is the illegal duplication, distribution and/ or sale of
copyrighted material with the intent of imitating the copyrighted
product. In the case of packaged software, it is common to find
counterfeit copies of the compact discs incorporating the software
programs, as well as related packaging, manuals, license agreements,
labels, registration cards and security features.
 Internet Piracy
- This occurs when software is downloaded from the Internet. The same
purchasing rules apply to online software purchases as for those
bought in compact disc format. Common internet piracy techniques
are:
 Websites that make software available for free download or in
exchange for others.
10
 Internet auction sites that offer counterfeit or out-of- channel
software.
 Peer-to-peer networks that enable unauthorized transfer of
copyrighted programs.
 End user Piracy
- This occurs when an individual reproduces copies of software without
authorization. This include:
 Using one licensed copy to install a program on multiple computers.
 Copying discs for installation or distribution
 Taking advantage of upgrade offers without having a legal copy of the
version to be upgraded
 Acquiring academic or other restricted or non- retail software without
a proper license
 Swapping discs in or outside the workplace
11
 Client- Server Overuse
- This type of piracy occurs when too many users on a network are
using central copy of a program at the same time. If you have a local-
area network and install programs on the server for several people to
use, you have to be sure your license entitles you to do so. If you have
more users than allowed by the license, that’s “overuse.”
 Hard- Disk Loading
- This occurs when a business sells new computers with illegal copies of
software loaded onto the hard disks to make the purchase of the
machines more attractive.
12
D. INFORMATION THEFT/ IDENTITY THEFT
- Identity theft is the crime of obtaining the
personal information of another personal or
financial information of another person to use
their identity to commit fraud, such as making
unauthorized transactions or purchases.
- Identity theft is committed in many different
ways and its victims are typically left with
damage to their credit, finances, and
reputation.
- Identity theft occurs when someone steals
your personal information- such as your Social
Security number, bank account number, and
credit card information.
13
- Some identity thieves sift through trash bins looking for bank
account and credit card statements. More high- tech methods
involve accessing corporate data bases to steal lists of customer
information. Once identity thieves have the information they are
looking for, they can ruin a person’s credit rating and the standing of
other personal information.
- Identity thieves increasingly use computer technology to obtain other
people’s personal information for identity fraud. To find such
information, they may search the hard drives of stolen or discarded
computers; hack into computers or computer networks; access
computer- based public records; use information- gathering malware
to infect computers; browse social networking sites; or use deceptive
emails or text messages.
14
HERE ARE FIVE COMMON TYPES OF
IDENTITY THEFT TO HELP YOU STAY ONE
STEP AHEAD OF THE HACKERS.
1. FINANCIAL IDENTITY- theft is when one person uses another’s personal
data for financial benefit. This is the most common form of identity theft
(including the credit card example described above). Financial identity
theft can take multiple forms, including:
- Fraudsters may use your credit card information to buy things. We all love
to shop online- even criminals. Unfortunately, this issue has become
especially prevalent thanks to online shopping during the COVID-19
pandemic.
- Hackers may steal funds from your bank account. Sometimes, the
amount might be so small that it seems inconsequential, totaling just a
few dollars. However, criminals can rack up millions in damages if they
target enough people in this way.
15
2. MEDICAL IDENTITY THEFT- is when a criminal poses as another person
to obtain health care services. In fact, fraudsters may use your name and
insurance information to:
- Get prescriptions for drugs. Access medical services, from checkups to
costly surgeries. Obtain medical devices and supplies, such as
wheelchairs or hearing aids. This can result in you having bills of
prescriptions, services, or devices you didn’t need, ask for, or even
receive. Your health care and insurance records may even have these
things added to them. An inaccurate medical record can make it harder
for you to get the care you need in the future and even impact insurance
coverage.
- Fortunately, you can help minimize the risk of medical identity theft by
regularly viewing your medical claims. Contact your insurer if you see
unfamiliar procedures, prescriptions, or services. You’ll also want to let
your health care provider know so that they can ensure your medical
files are correct .
16
3. CRIMINAL IDENTITY THEFT- occurs when a person arrested by law
enforcement uses someone else’s name instead of providing theirs. They
might be able to pass this off by creating a fake ID or using a stolen ID, like
your driver’s license, to show to the police. This type of fraud can be
difficult to detect until the consequences are evident, like:
- A bench warrant is issued for your arrest. Unresolved problems like
unpaid parking tickets can also result in a judge issuing a bench
warrant. You may then be taken into custody at any time, even during
a routine traffic stop.
- You can help protect yourself against criminal identity theft by
safeguarding your ID. If your license or state- issued ID is lost or
stolen, report it to the local Department of Motor Vehicles (DMV) and
law enforcement. Also, limit the information you share online (and
encourage family members to do the same). For example, if your teen
got their first driver’s license and wants to share a pic of it on social
media, explain why this isn’t a good idea.
17
4. SYNTHETIC IDENTITY THEFT- Fraudsters may use data like birthdates,
addresses, and Social Security numbers from real people, blending them to
create a fake profile. They can then use this persona to apply for loans or
credit cards or commit other financial crimes. Kids and older adults tend to
be vulnerable to this type of fraud since they are rarely use their SSNs.
- The most important thing about synthetic identity theft is knowing the
signs and acting fast. Keep an eye out for any mail with your address
on it but addressed to a different name and phone calls or mail about
new credit accounts. You can further protect yourself by regularly
checking your credit reports for unexplained changes and placing a
security freeze on them.
- There are also identity monitoring services available, which scan the
internet, including the dark web, for breached Social Security numbers.
If you suspect you or loved one is the victim of synthetic identity theft,
contact the relevant financial institutions to alert them.
18
5. CHILD IDENTITY THEFT- The thief may even use the child’s identity to
get a driver’s license, apply for governments benefits, or buy a house.
This is often easier than targeting an adult because most kids don’t have
credit reports or financial accounts, making them a clean slate.
- Unfortunately, child identity theft is often perpetrated within the
family by a relative who has access to the child’s data like their
birthdate and address. And many children don’t realize they’ve been
targeted until they’re older- for example, when they try to take out a
student loan. By this point, the issue may have been escalating for
years. So, its important as a parent to be aware of child identity theft.
- The best way to do this is to check whether your child has a credit
report with any of the three big credit bureaus (TransUnion, Equifax,
and Experian). If so, review the report and report any fraudulent
activity. You can also place a freeze on your child’s credit report to
help minimize the risk of future fraud.
19
E. WHAT IS MALICIOUS ACTS IN SOFTWARE
- “Malicious Software” coin the word
“Malware” and the meaning remains the
same. It refers to any malicious program
that cause harm to the computer system
or network. Malicious Malware Software
attacks a computer or network in the form
of viruses, worms, trojans, spyware,
adware or rootkits.
- Their mission is often targeted at
accomplishing unlawful task such as
robbing protected area, deleting
confidential documents or add software
without the user consent.
20
MALICIOUS SOFTWARE HISTORY
- Even before the internet became widespread, malicious
software (virus) was infected on personal computers with the
executable boot sectors of floppy disks. Initially, the computer
viruses were written for the Apple II and Macintosh devices.
After the IBM PC and MS-DOS system became more
widespread they were also targeted in the similar fashion. The
first worms originated on multitasking Unix system, they were
the first network-borne infectious programs too. SunOS and
VAX BSD systems were infected by the first well-known worm
of the time called the Internet Worm of 1988. Ever since the
advent of Microsoft Windows platform in 1990s, the infectious
codes were written in the macro language of Microsoft Word
and similar programs.
21
DIFFERENT TYPES OF MALICIOUS
1. COMPUTER VIRUS (VIRUS)
- is a malicious software which self replicates and
attaches itself to other files/ programs. Its capable
of executing secretly when the host program/ file is
activated. The different types of computer virus are
Memory- Resident virus, Program File Virus, Boot
Sector Virus, Stealth Virus, Macro Virus, and Email
Virus.
2. WORMS
- A worm is malicious software which similar to that
of a computer virus is a self- replicating program,
however, in the case of worms, it automatically
executes itself. Worms spread over a network and
are capable of launching a cumbersome and
destructive attack within a short period.
22
3. TROJAN HORSES
- Unlike a computer virus or a worm- the trojan
horse is non- replicating program that
appears legitimate. After gaining the trust, it
secretly performs malicious and illicit “bawal”
activities when executed. Hackers make use
of trojan horses to steal a user’s password
information, destroy data or programs on the
hard disk. It is hard to detect!
4. SPYWARE/ADWARE
- Spyware secretly records information about a
user and forwards it to third parties. The
information gathered may cover files accessed on
the computer, a user’s online activities or even
user’s keystrokes.
23
ADWARE
- Adware as the name interprets displays
advertising banners while a program is running.
Adware can also work like spyware, it is
deployed to gather confidential information.
Basically, to spy on and gather information from
a victim’s computer.
5. ROOTKIT
- Malicious software that alters the regular
functionality of an OS on a computer in a stealthy
manner. The altering helps the hacker to take full
control of the system administrator on the victim’s
system. Almost all the rootkits are designed to hide
their existence.
24
DIFFERENT TYPES OF COMPUTER VIRUSES
1. MEMORY- RESIDENT VIRUS
 WHAT IT DOES?
- To live as a Resident in the RAM memory.
 How affects your PC?
- It interrupt all of the operations executed by the system.
EXAMPLE OF VIRUS: Randex, CMJ, Meve, and MrKlunky.
2. PROGRAM FILE VIRUSES
 WHAT IT DOES?
- Infects executables such as EXE,BIN,COM,SYS
 How affects our PC?
- Destroy or Alter Program or Data.
EXAMPLE OF VIRUS:
Sunday and Cascade
25
3. BOOT SECTOR VIRUSES
 WHAT IT DOES?
- Infects boot sectors on hard and floppy disks.
How affects our PC?
- Destroy or Alters Programs or Data.
EXAMPLE OF VIRUSES:
Disk killer, Stone Virus
4. STEALTH VIRUSES
 WHAT IT DOES?
-Uses various tactics to avoid detection.
How affects our PC?
- Destroy or Alters Programs and Data.
EXAMPLE OF VIRUS:
Frodo, Joshi, Whale
26
5. MACRO VIRUSES
 WHAT IT DOES?
- Triggers on a command in Microsoft Office.
 How affects our PC?
- Commonly affects Word and Excel.
EXAMPLE OF VIRUS: DMV, NUCLEAR WORD, CONCEPT
6. EMAIL VIRUS
 WHAT IT DOES?
- If the recipient open the e-mail attachment, the word
macro is activated then.
 How it affects our PC?
- Spread only with the opening of the attachment in the
email.
EXAMPLE OF VIRUS: Mellisa, ILOVEYOU, Love Bug
27
METHODS OF PROTECTION AGAINST MALICIOUS SOFTWARE:
- Malicious Software threat for corporate users and individuals,
thereby detecting and fighting malware remains on top of the
agenda for many firms. Since the time BYOD culture started to
flourish, Endpoint Security and Endpoint Protection have
become the topics of discussion in many IT conference rooms.
Many corporates today try to implement the best Endpoint
Security or Endpoint Protection software to steer clear of the
dangers.
- Remember, if it is an individual system, it is essential to have an
antivirus installed and if you already have one in place see to
that it is updated at regular intervals. This approach will help you
to remain safe during new breakouts. Comodo’s Free Antivirus,
Endpoint Security, Endpoint Protection Solutions are your best
option for detecting and fighting malicious software.
28
THANK YOU
FOR
LISTENING
29

More Related Content

Similar to LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx

computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Internet Security
Internet SecurityInternet Security
Internet SecurityParv Poddar
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptxhavaneb872
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxgadisaAdamu
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 

Similar to LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx (20)

Internet security
Internet securityInternet security
Internet security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Computer
ComputerComputer
Computer
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx

  • 1. GROUP 3 LEGAL AND ETHICAL USE OF TECHNOLOGY
  • 2. ETHICAL USE OF TECHNOLOGY 2  Technology and software issues are elaborated for you to be aware and be guided in doing the right thing and avoiding the unacceptable acts that may lead you to committing mistakes or possible software and technology crimes that’s against the law.  When we are young, our parents used to teach us the right behavior and etiquette. Even in schools and classes, there are certain behaviors and ethics we need to observe to achieve a healthy relationships
  • 3. ETHICS FOR COMPUTER USERS 1. Use the computer to help not to do harm. 2. Use your own or assigned computer unit and not to interfere with others. 3. Use the computer using your own files and not to use other’s files. 4. Use the computer to share information and not to steal other’s information. 5. Use the computer to spread truthful information and not to do character assassination. 6. Use software that are original and legal and not pirated. 7. Use other’s computer resources with permission and not to duplicate it without authorization. 8. Use your own work and not the work of others. 9. Use the computer that shows respect and consideration for other people and not to do cyberbullying. 10. Create programs or software having in mind its social impact and not for self- interest. 3
  • 4. “ 1. ETHICAL ISSUES IN TECHNOLOGY AND SOFTWARE 4
  • 5. A. UNAUTHORIZED ACCESS AND USE OF HARDWARE, SOFTWARE, NETWORK, AND COMPUTER FILES  If somebody would use anybody’s computer and files without permission from the owner, that is called unauthorized access. A person is called a cracker or a hacker if he/she tries to access a computer or network illegally to access data and commit malicious acts like identity theft.  Hacker originally means a computer enthusiast who does well in computer that benefits other people. However, the term hacker now has an adverse connotation which refers to a person who breaks into the computer system to steal or corrupt the data in it. 5
  • 6. TIPS IN CREATING A PASSWORD 1. Use at least 8 characters. 2. Use a combination of upper and lower case letters, words, numbers and special characters. 3. Use joined words together. 4. Add one or more numbers at the beginning, middle, or end of a word. 5. Use words from other languages. 6. Use a password that can be remembered easily. 7. Select a password that can be entered easily even without looking at the keyboard. 8. Do not leave written copies of your passwords anywhere. 9. Do not share your password to anyone.
  • 7. B. Hardware theft and vandalism WHAT IS HARDWARE THEFT AND VANDALISM? - are other types of computer security risks. HARDWARE THEFT- is the act of stealing computer equipment. - Consist of people opening up computers and taking parts out of them. Hardware theft also happens in retail stores, when people break open the package and shoplift the item. HARDWARE VANDALISM- is the act of defacing or destroying computers equipment. - Takes many forms, from someone cutting a computer cable to individuals breaking into business or school computers lab and aimlessly smashing computer. 7
  • 8. IS THEFT PART OF VANDALISM? - It depends on the crime and the victim’s point of view. It can be called theft if you stealing space on a person’s possession or building. In the sphere of auto vandalism then theft is involved. - Hardware and theft vandalism do not really pose a threat to the home desktop computer user but it threat for those have a smaller system units that easily can fit in a backpack or briefcase. It is easy to steal because of its weight and its small size. Mobile users also are susceptible to hardware theft. More than 600,000 notebooks is estimated stolen each year. Theft often target notebook computer of company executives so that they can access confidential information illegally. In the case, hardware theft is combined with software theft. 8
  • 9. C. SOFTWARE THEFT  Software theft means the unauthorized or illegal copying, sharing or usage of copyright- protected software programs. Software theft may be carried out by individuals, groups or, in some cases, organizations who then distribute the unauthorized software copies to users.  WHEN DOES IT OCCURRED? Occurs when someone: 1. Steals software media 2. Intentionally erases programs 3. Illegally copies a program 4. Illegally registers or activates a program 9
  • 10. THERE ARE FIVE MAIN TYPES OF SOFTWARE PIRACY  Counterfeiting - This type of piracy is the illegal duplication, distribution and/ or sale of copyrighted material with the intent of imitating the copyrighted product. In the case of packaged software, it is common to find counterfeit copies of the compact discs incorporating the software programs, as well as related packaging, manuals, license agreements, labels, registration cards and security features.  Internet Piracy - This occurs when software is downloaded from the Internet. The same purchasing rules apply to online software purchases as for those bought in compact disc format. Common internet piracy techniques are:  Websites that make software available for free download or in exchange for others. 10
  • 11.  Internet auction sites that offer counterfeit or out-of- channel software.  Peer-to-peer networks that enable unauthorized transfer of copyrighted programs.  End user Piracy - This occurs when an individual reproduces copies of software without authorization. This include:  Using one licensed copy to install a program on multiple computers.  Copying discs for installation or distribution  Taking advantage of upgrade offers without having a legal copy of the version to be upgraded  Acquiring academic or other restricted or non- retail software without a proper license  Swapping discs in or outside the workplace 11
  • 12.  Client- Server Overuse - This type of piracy occurs when too many users on a network are using central copy of a program at the same time. If you have a local- area network and install programs on the server for several people to use, you have to be sure your license entitles you to do so. If you have more users than allowed by the license, that’s “overuse.”  Hard- Disk Loading - This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive. 12
  • 13. D. INFORMATION THEFT/ IDENTITY THEFT - Identity theft is the crime of obtaining the personal information of another personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. - Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation. - Identity theft occurs when someone steals your personal information- such as your Social Security number, bank account number, and credit card information. 13
  • 14. - Some identity thieves sift through trash bins looking for bank account and credit card statements. More high- tech methods involve accessing corporate data bases to steal lists of customer information. Once identity thieves have the information they are looking for, they can ruin a person’s credit rating and the standing of other personal information. - Identity thieves increasingly use computer technology to obtain other people’s personal information for identity fraud. To find such information, they may search the hard drives of stolen or discarded computers; hack into computers or computer networks; access computer- based public records; use information- gathering malware to infect computers; browse social networking sites; or use deceptive emails or text messages. 14
  • 15. HERE ARE FIVE COMMON TYPES OF IDENTITY THEFT TO HELP YOU STAY ONE STEP AHEAD OF THE HACKERS. 1. FINANCIAL IDENTITY- theft is when one person uses another’s personal data for financial benefit. This is the most common form of identity theft (including the credit card example described above). Financial identity theft can take multiple forms, including: - Fraudsters may use your credit card information to buy things. We all love to shop online- even criminals. Unfortunately, this issue has become especially prevalent thanks to online shopping during the COVID-19 pandemic. - Hackers may steal funds from your bank account. Sometimes, the amount might be so small that it seems inconsequential, totaling just a few dollars. However, criminals can rack up millions in damages if they target enough people in this way. 15
  • 16. 2. MEDICAL IDENTITY THEFT- is when a criminal poses as another person to obtain health care services. In fact, fraudsters may use your name and insurance information to: - Get prescriptions for drugs. Access medical services, from checkups to costly surgeries. Obtain medical devices and supplies, such as wheelchairs or hearing aids. This can result in you having bills of prescriptions, services, or devices you didn’t need, ask for, or even receive. Your health care and insurance records may even have these things added to them. An inaccurate medical record can make it harder for you to get the care you need in the future and even impact insurance coverage. - Fortunately, you can help minimize the risk of medical identity theft by regularly viewing your medical claims. Contact your insurer if you see unfamiliar procedures, prescriptions, or services. You’ll also want to let your health care provider know so that they can ensure your medical files are correct . 16
  • 17. 3. CRIMINAL IDENTITY THEFT- occurs when a person arrested by law enforcement uses someone else’s name instead of providing theirs. They might be able to pass this off by creating a fake ID or using a stolen ID, like your driver’s license, to show to the police. This type of fraud can be difficult to detect until the consequences are evident, like: - A bench warrant is issued for your arrest. Unresolved problems like unpaid parking tickets can also result in a judge issuing a bench warrant. You may then be taken into custody at any time, even during a routine traffic stop. - You can help protect yourself against criminal identity theft by safeguarding your ID. If your license or state- issued ID is lost or stolen, report it to the local Department of Motor Vehicles (DMV) and law enforcement. Also, limit the information you share online (and encourage family members to do the same). For example, if your teen got their first driver’s license and wants to share a pic of it on social media, explain why this isn’t a good idea. 17
  • 18. 4. SYNTHETIC IDENTITY THEFT- Fraudsters may use data like birthdates, addresses, and Social Security numbers from real people, blending them to create a fake profile. They can then use this persona to apply for loans or credit cards or commit other financial crimes. Kids and older adults tend to be vulnerable to this type of fraud since they are rarely use their SSNs. - The most important thing about synthetic identity theft is knowing the signs and acting fast. Keep an eye out for any mail with your address on it but addressed to a different name and phone calls or mail about new credit accounts. You can further protect yourself by regularly checking your credit reports for unexplained changes and placing a security freeze on them. - There are also identity monitoring services available, which scan the internet, including the dark web, for breached Social Security numbers. If you suspect you or loved one is the victim of synthetic identity theft, contact the relevant financial institutions to alert them. 18
  • 19. 5. CHILD IDENTITY THEFT- The thief may even use the child’s identity to get a driver’s license, apply for governments benefits, or buy a house. This is often easier than targeting an adult because most kids don’t have credit reports or financial accounts, making them a clean slate. - Unfortunately, child identity theft is often perpetrated within the family by a relative who has access to the child’s data like their birthdate and address. And many children don’t realize they’ve been targeted until they’re older- for example, when they try to take out a student loan. By this point, the issue may have been escalating for years. So, its important as a parent to be aware of child identity theft. - The best way to do this is to check whether your child has a credit report with any of the three big credit bureaus (TransUnion, Equifax, and Experian). If so, review the report and report any fraudulent activity. You can also place a freeze on your child’s credit report to help minimize the risk of future fraud. 19
  • 20. E. WHAT IS MALICIOUS ACTS IN SOFTWARE - “Malicious Software” coin the word “Malware” and the meaning remains the same. It refers to any malicious program that cause harm to the computer system or network. Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits. - Their mission is often targeted at accomplishing unlawful task such as robbing protected area, deleting confidential documents or add software without the user consent. 20
  • 21. MALICIOUS SOFTWARE HISTORY - Even before the internet became widespread, malicious software (virus) was infected on personal computers with the executable boot sectors of floppy disks. Initially, the computer viruses were written for the Apple II and Macintosh devices. After the IBM PC and MS-DOS system became more widespread they were also targeted in the similar fashion. The first worms originated on multitasking Unix system, they were the first network-borne infectious programs too. SunOS and VAX BSD systems were infected by the first well-known worm of the time called the Internet Worm of 1988. Ever since the advent of Microsoft Windows platform in 1990s, the infectious codes were written in the macro language of Microsoft Word and similar programs. 21
  • 22. DIFFERENT TYPES OF MALICIOUS 1. COMPUTER VIRUS (VIRUS) - is a malicious software which self replicates and attaches itself to other files/ programs. Its capable of executing secretly when the host program/ file is activated. The different types of computer virus are Memory- Resident virus, Program File Virus, Boot Sector Virus, Stealth Virus, Macro Virus, and Email Virus. 2. WORMS - A worm is malicious software which similar to that of a computer virus is a self- replicating program, however, in the case of worms, it automatically executes itself. Worms spread over a network and are capable of launching a cumbersome and destructive attack within a short period. 22
  • 23. 3. TROJAN HORSES - Unlike a computer virus or a worm- the trojan horse is non- replicating program that appears legitimate. After gaining the trust, it secretly performs malicious and illicit “bawal” activities when executed. Hackers make use of trojan horses to steal a user’s password information, destroy data or programs on the hard disk. It is hard to detect! 4. SPYWARE/ADWARE - Spyware secretly records information about a user and forwards it to third parties. The information gathered may cover files accessed on the computer, a user’s online activities or even user’s keystrokes. 23
  • 24. ADWARE - Adware as the name interprets displays advertising banners while a program is running. Adware can also work like spyware, it is deployed to gather confidential information. Basically, to spy on and gather information from a victim’s computer. 5. ROOTKIT - Malicious software that alters the regular functionality of an OS on a computer in a stealthy manner. The altering helps the hacker to take full control of the system administrator on the victim’s system. Almost all the rootkits are designed to hide their existence. 24
  • 25. DIFFERENT TYPES OF COMPUTER VIRUSES 1. MEMORY- RESIDENT VIRUS  WHAT IT DOES? - To live as a Resident in the RAM memory.  How affects your PC? - It interrupt all of the operations executed by the system. EXAMPLE OF VIRUS: Randex, CMJ, Meve, and MrKlunky. 2. PROGRAM FILE VIRUSES  WHAT IT DOES? - Infects executables such as EXE,BIN,COM,SYS  How affects our PC? - Destroy or Alter Program or Data. EXAMPLE OF VIRUS: Sunday and Cascade 25
  • 26. 3. BOOT SECTOR VIRUSES  WHAT IT DOES? - Infects boot sectors on hard and floppy disks. How affects our PC? - Destroy or Alters Programs or Data. EXAMPLE OF VIRUSES: Disk killer, Stone Virus 4. STEALTH VIRUSES  WHAT IT DOES? -Uses various tactics to avoid detection. How affects our PC? - Destroy or Alters Programs and Data. EXAMPLE OF VIRUS: Frodo, Joshi, Whale 26
  • 27. 5. MACRO VIRUSES  WHAT IT DOES? - Triggers on a command in Microsoft Office.  How affects our PC? - Commonly affects Word and Excel. EXAMPLE OF VIRUS: DMV, NUCLEAR WORD, CONCEPT 6. EMAIL VIRUS  WHAT IT DOES? - If the recipient open the e-mail attachment, the word macro is activated then.  How it affects our PC? - Spread only with the opening of the attachment in the email. EXAMPLE OF VIRUS: Mellisa, ILOVEYOU, Love Bug 27
  • 28. METHODS OF PROTECTION AGAINST MALICIOUS SOFTWARE: - Malicious Software threat for corporate users and individuals, thereby detecting and fighting malware remains on top of the agenda for many firms. Since the time BYOD culture started to flourish, Endpoint Security and Endpoint Protection have become the topics of discussion in many IT conference rooms. Many corporates today try to implement the best Endpoint Security or Endpoint Protection software to steer clear of the dangers. - Remember, if it is an individual system, it is essential to have an antivirus installed and if you already have one in place see to that it is updated at regular intervals. This approach will help you to remain safe during new breakouts. Comodo’s Free Antivirus, Endpoint Security, Endpoint Protection Solutions are your best option for detecting and fighting malicious software. 28

Editor's Notes

  1. ANN MARIE
  2. ANN MARIE
  3. ANN MARIE
  4. ANN MARIE
  5. ANN MARIE
  6. ARISTOTLE
  7. ARISTOTLE