SlideShare a Scribd company logo
1 of 24
COMPUTER ETHICS
Prepared by:
Mr. Joshua A. Casas
COMPUTER USAGE
• Nowadays, computers are used quite extensively in almost all
activities of life, so this age is also called the age of computers.
• Computers are used in education, business, manufacturing,
designing, entertainment, homes, schools, shops, offices,
hospitals and airport.
• But when the computer is used by bad people with bad intention,
they can cause harm to information and technology.
COMPUTER ETHICS
• Ethics are beliefs and rules. These rules guide us to what is right
and what is wrong.
• An ethic is something a person develops over a period of time. Due
to this reason, parents and elders are supposed to supervise and
exercise some authority over their children.
• Good behavior pleases and help others and is also approved by the
society.
NTELLECTUAL PROPERTY RIGHTS
• A property is something you own. You have rights over your
property and Law protects it.
• Similarly, law also protects ideas and thinking produced by the
mind. It is illegal to use them without the permission of the owner
or producer.
• The rights related to the literacy or artistic work, invention,
discoveries, etc. are called intellectual property rights.
COPYRIGHTS
• You must have seen the copyright symbol in different items like
books, magazines and even webpages
• All the items or information that has this symbol comes under a
copyright of the owner and it is said to be the sole property of the
owner.
• A copyright is generally written in the following fashion
WHY SHOULD AN ITEM BE PROTECTED UNDER
A COPYRIGHT LAW?
• The copyright is legally applied to the item to enable the owner of the
item to receive a certain amount of income or royalty.
• If the same item is illegally reproduced, the owners will be deprived of
their share of income for continuing the hard work to develop such
material.
• So, to enable the owners to keep exploring, thinking and inventing new
ideas and efforts, they must be protected by the law.
• If a certain material is easily available on the Internet and you want to
use it, then you should be honest and not you the material illegally.
• You should take the permission of the author/owner. This is called
referencing.
SOFTWARE PIRACY
• Software Piracy is an illegal reproduction and distribution of
software applications.
• You must avoid using pirated software.
Types of Software Piracy
• End – user Piracy - All software is licensed. When someone copies
software without an appropriate license, it is called End – user
piracy. It includes both copying and distribution.
• Internet Piracy - Any unauthorized copies of software downloaded
from the Internet fall under the category of Internet Piracy.
• Pre – Installed Software Piracy - When a computer manufacturer
takes one copy of a particular software and illegally installs it on
more than one computer, it is considered as Pre – installed
software piracy.
Limitations of pirated software
• Quality
Pirated software often does not have various key elements.
Also it cannot be upgraded.
• Viruses
Some people may put dangerous viruses in pirated software.
This may damage your hard disk and erase all valuable data.
• Privacy
Some times the viruses in the pirated software can also
access the private data which is stored in your computer.
COMPUTER SECURITY
• Computer security includes the various procedures and techniques
that are designed to protect a computer from accidental or
intentional theft, unauthorized access or manipulation by an
individual or by an organization.
SECURITY BREACHES
• Hardware Breaches
It can be both intentional and accidental.
Cables, modems, phone lines are often
vulnerable to security breaches.
• Software Breaches
It includes computer viruses, password cracking,
various sniffer programs etc.
SECURITY BREACHES
• Networks
Network are vulnerable to security breaches.
• Natural Disasters
These can cause security violation which may lead to
operational problems in a computer system.
Hurricanes, earthquakes, floods etc. may prove devastating
for companies.
COMPUTER SECURITY CONTROLS
• Computer security controls are established and implemented to
reduce security breaches.
• There are many types of controls:
• Application control
• Development control
• Access control
• Physical security control
• Personal control
COMPUTER CRIMES
• Hacker
• A hacker is a person who breaks into a computer system to get
access to the information stored there.
• A hacker may not cause any harm to the system or organizations,
but hacking is still illegal and unethical.
COMPUTER CRIMES
• Cracker
• A cracker is a person who breaks into a computer system just like
a hacker, with an intention to steal passwords, files or programs
for unauthorized use.
• They may sell this information to some other people for money.
• They cause financial damage to an organization.
COMPUTER CRIMES
• Virus Programmers
• A virus programmer is a cracker who breaches
into a computer system, in order to steal
information or cause harm to the computer
system.
• They create dangerous viruses to get access
to information.
L2 COMPUTER  ETHICS  PPT [Autosaved].pptx

More Related Content

Similar to L2 COMPUTER ETHICS PPT [Autosaved].pptx

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptxMeesanRaza
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on societyPratik Gupta
 
A dummies guide to security
A dummies guide to securityA dummies guide to security
A dummies guide to securitydnbsystems
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxAmandaWeaver21
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 

Similar to L2 COMPUTER ETHICS PPT [Autosaved].pptx (20)

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Legal and social impacts on ICT
Legal and social impacts on ICTLegal and social impacts on ICT
Legal and social impacts on ICT
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
A dummies guide to security
A dummies guide to securityA dummies guide to security
A dummies guide to security
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 

More from JoshCasas1

Understanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third QuarterUnderstanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third QuarterJoshCasas1
 
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptxMOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptxJoshCasas1
 
Combined 2nd Section 4900 Slides.ppt
Combined 2nd Section 4900 Slides.pptCombined 2nd Section 4900 Slides.ppt
Combined 2nd Section 4900 Slides.pptJoshCasas1
 
270_1_CIntro_Up_To_Functions.ppt
270_1_CIntro_Up_To_Functions.ppt270_1_CIntro_Up_To_Functions.ppt
270_1_CIntro_Up_To_Functions.pptJoshCasas1
 
csce411-set7.ppt
csce411-set7.pptcsce411-set7.ppt
csce411-set7.pptJoshCasas1
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.pptJoshCasas1
 
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptxJOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptxJoshCasas1
 
Essential Access Exercises week 1-4.pdf
Essential Access Exercises week 1-4.pdfEssential Access Exercises week 1-4.pdf
Essential Access Exercises week 1-4.pdfJoshCasas1
 
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.pptMS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.pptJoshCasas1
 
M0DULE 1-MS ACCESS Databases and Database Objects.pdf
M0DULE 1-MS ACCESS Databases and Database Objects.pdfM0DULE 1-MS ACCESS Databases and Database Objects.pdf
M0DULE 1-MS ACCESS Databases and Database Objects.pdfJoshCasas1
 
Microsoft Access ppt.ppt
Microsoft Access ppt.pptMicrosoft Access ppt.ppt
Microsoft Access ppt.pptJoshCasas1
 
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdfMICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdfJoshCasas1
 
Introduction to Microsoft Access2.ppt
Introduction to Microsoft Access2.pptIntroduction to Microsoft Access2.ppt
Introduction to Microsoft Access2.pptJoshCasas1
 
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdfLESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdfJoshCasas1
 

More from JoshCasas1 (14)

Understanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third QuarterUnderstanding Technologies In Education for the Third Quarter
Understanding Technologies In Education for the Third Quarter
 
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptxMOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
MOST SUCCESSFUL ENTREPRENEURS PRESENTATION (1).pptx
 
Combined 2nd Section 4900 Slides.ppt
Combined 2nd Section 4900 Slides.pptCombined 2nd Section 4900 Slides.ppt
Combined 2nd Section 4900 Slides.ppt
 
270_1_CIntro_Up_To_Functions.ppt
270_1_CIntro_Up_To_Functions.ppt270_1_CIntro_Up_To_Functions.ppt
270_1_CIntro_Up_To_Functions.ppt
 
csce411-set7.ppt
csce411-set7.pptcsce411-set7.ppt
csce411-set7.ppt
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.ppt
 
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptxJOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
JOSHUA A. CASAS (FILIPINO VALUES SYSTEM AND CHANGE).pptx
 
Essential Access Exercises week 1-4.pdf
Essential Access Exercises week 1-4.pdfEssential Access Exercises week 1-4.pdf
Essential Access Exercises week 1-4.pdf
 
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.pptMS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
MS ACCESS DEFINING DESIGN VIEW AND DATASHEET VIEW.ppt
 
M0DULE 1-MS ACCESS Databases and Database Objects.pdf
M0DULE 1-MS ACCESS Databases and Database Objects.pdfM0DULE 1-MS ACCESS Databases and Database Objects.pdf
M0DULE 1-MS ACCESS Databases and Database Objects.pdf
 
Microsoft Access ppt.ppt
Microsoft Access ppt.pptMicrosoft Access ppt.ppt
Microsoft Access ppt.ppt
 
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdfMICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
MICROSOFT ACCESS 2016Basics-Handouts and LESSON Introduction.pdf
 
Introduction to Microsoft Access2.ppt
Introduction to Microsoft Access2.pptIntroduction to Microsoft Access2.ppt
Introduction to Microsoft Access2.ppt
 
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdfLESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
LESSON 1- MICROSOFT ACCESS CREATING DATABASE.pdf
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

L2 COMPUTER ETHICS PPT [Autosaved].pptx

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8. COMPUTER USAGE • Nowadays, computers are used quite extensively in almost all activities of life, so this age is also called the age of computers. • Computers are used in education, business, manufacturing, designing, entertainment, homes, schools, shops, offices, hospitals and airport. • But when the computer is used by bad people with bad intention, they can cause harm to information and technology.
  • 9. COMPUTER ETHICS • Ethics are beliefs and rules. These rules guide us to what is right and what is wrong. • An ethic is something a person develops over a period of time. Due to this reason, parents and elders are supposed to supervise and exercise some authority over their children. • Good behavior pleases and help others and is also approved by the society.
  • 10. NTELLECTUAL PROPERTY RIGHTS • A property is something you own. You have rights over your property and Law protects it. • Similarly, law also protects ideas and thinking produced by the mind. It is illegal to use them without the permission of the owner or producer. • The rights related to the literacy or artistic work, invention, discoveries, etc. are called intellectual property rights.
  • 11. COPYRIGHTS • You must have seen the copyright symbol in different items like books, magazines and even webpages • All the items or information that has this symbol comes under a copyright of the owner and it is said to be the sole property of the owner. • A copyright is generally written in the following fashion
  • 12. WHY SHOULD AN ITEM BE PROTECTED UNDER A COPYRIGHT LAW? • The copyright is legally applied to the item to enable the owner of the item to receive a certain amount of income or royalty. • If the same item is illegally reproduced, the owners will be deprived of their share of income for continuing the hard work to develop such material. • So, to enable the owners to keep exploring, thinking and inventing new ideas and efforts, they must be protected by the law. • If a certain material is easily available on the Internet and you want to use it, then you should be honest and not you the material illegally. • You should take the permission of the author/owner. This is called referencing.
  • 13. SOFTWARE PIRACY • Software Piracy is an illegal reproduction and distribution of software applications. • You must avoid using pirated software.
  • 14.
  • 15. Types of Software Piracy • End – user Piracy - All software is licensed. When someone copies software without an appropriate license, it is called End – user piracy. It includes both copying and distribution. • Internet Piracy - Any unauthorized copies of software downloaded from the Internet fall under the category of Internet Piracy. • Pre – Installed Software Piracy - When a computer manufacturer takes one copy of a particular software and illegally installs it on more than one computer, it is considered as Pre – installed software piracy.
  • 16. Limitations of pirated software • Quality Pirated software often does not have various key elements. Also it cannot be upgraded. • Viruses Some people may put dangerous viruses in pirated software. This may damage your hard disk and erase all valuable data. • Privacy Some times the viruses in the pirated software can also access the private data which is stored in your computer.
  • 17. COMPUTER SECURITY • Computer security includes the various procedures and techniques that are designed to protect a computer from accidental or intentional theft, unauthorized access or manipulation by an individual or by an organization.
  • 18. SECURITY BREACHES • Hardware Breaches It can be both intentional and accidental. Cables, modems, phone lines are often vulnerable to security breaches. • Software Breaches It includes computer viruses, password cracking, various sniffer programs etc.
  • 19. SECURITY BREACHES • Networks Network are vulnerable to security breaches. • Natural Disasters These can cause security violation which may lead to operational problems in a computer system. Hurricanes, earthquakes, floods etc. may prove devastating for companies.
  • 20. COMPUTER SECURITY CONTROLS • Computer security controls are established and implemented to reduce security breaches. • There are many types of controls: • Application control • Development control • Access control • Physical security control • Personal control
  • 21. COMPUTER CRIMES • Hacker • A hacker is a person who breaks into a computer system to get access to the information stored there. • A hacker may not cause any harm to the system or organizations, but hacking is still illegal and unethical.
  • 22. COMPUTER CRIMES • Cracker • A cracker is a person who breaks into a computer system just like a hacker, with an intention to steal passwords, files or programs for unauthorized use. • They may sell this information to some other people for money. • They cause financial damage to an organization.
  • 23. COMPUTER CRIMES • Virus Programmers • A virus programmer is a cracker who breaches into a computer system, in order to steal information or cause harm to the computer system. • They create dangerous viruses to get access to information.

Editor's Notes

  1. ONLINE SAFETY AND SECURITY, ETHICS AND NETIQUETTES! BEING SAFE ONLINE! IN ORDER FOR US TO KEEP SAFE WHILE SURFING FROM THE INTERNET/WEB, WE SHOULD AVOID THOSE ONLINE THREATS, LIKE SUSPICIOUS UNKNOWN FILES AND ONLINE THREATS.
  2. HOW ARE YOU GOING TO MAKE YOURSELF SAFE WHILE SURFING THE WEB?