8. COMPUTER USAGE
• Nowadays, computers are used quite extensively in almost all
activities of life, so this age is also called the age of computers.
• Computers are used in education, business, manufacturing,
designing, entertainment, homes, schools, shops, offices,
hospitals and airport.
• But when the computer is used by bad people with bad intention,
they can cause harm to information and technology.
9. COMPUTER ETHICS
• Ethics are beliefs and rules. These rules guide us to what is right
and what is wrong.
• An ethic is something a person develops over a period of time. Due
to this reason, parents and elders are supposed to supervise and
exercise some authority over their children.
• Good behavior pleases and help others and is also approved by the
society.
10. NTELLECTUAL PROPERTY RIGHTS
• A property is something you own. You have rights over your
property and Law protects it.
• Similarly, law also protects ideas and thinking produced by the
mind. It is illegal to use them without the permission of the owner
or producer.
• The rights related to the literacy or artistic work, invention,
discoveries, etc. are called intellectual property rights.
11. COPYRIGHTS
• You must have seen the copyright symbol in different items like
books, magazines and even webpages
• All the items or information that has this symbol comes under a
copyright of the owner and it is said to be the sole property of the
owner.
• A copyright is generally written in the following fashion
12. WHY SHOULD AN ITEM BE PROTECTED UNDER
A COPYRIGHT LAW?
• The copyright is legally applied to the item to enable the owner of the
item to receive a certain amount of income or royalty.
• If the same item is illegally reproduced, the owners will be deprived of
their share of income for continuing the hard work to develop such
material.
• So, to enable the owners to keep exploring, thinking and inventing new
ideas and efforts, they must be protected by the law.
• If a certain material is easily available on the Internet and you want to
use it, then you should be honest and not you the material illegally.
• You should take the permission of the author/owner. This is called
referencing.
13. SOFTWARE PIRACY
• Software Piracy is an illegal reproduction and distribution of
software applications.
• You must avoid using pirated software.
14.
15. Types of Software Piracy
• End – user Piracy - All software is licensed. When someone copies
software without an appropriate license, it is called End – user
piracy. It includes both copying and distribution.
• Internet Piracy - Any unauthorized copies of software downloaded
from the Internet fall under the category of Internet Piracy.
• Pre – Installed Software Piracy - When a computer manufacturer
takes one copy of a particular software and illegally installs it on
more than one computer, it is considered as Pre – installed
software piracy.
16. Limitations of pirated software
• Quality
Pirated software often does not have various key elements.
Also it cannot be upgraded.
• Viruses
Some people may put dangerous viruses in pirated software.
This may damage your hard disk and erase all valuable data.
• Privacy
Some times the viruses in the pirated software can also
access the private data which is stored in your computer.
17. COMPUTER SECURITY
• Computer security includes the various procedures and techniques
that are designed to protect a computer from accidental or
intentional theft, unauthorized access or manipulation by an
individual or by an organization.
18. SECURITY BREACHES
• Hardware Breaches
It can be both intentional and accidental.
Cables, modems, phone lines are often
vulnerable to security breaches.
• Software Breaches
It includes computer viruses, password cracking,
various sniffer programs etc.
19. SECURITY BREACHES
• Networks
Network are vulnerable to security breaches.
• Natural Disasters
These can cause security violation which may lead to
operational problems in a computer system.
Hurricanes, earthquakes, floods etc. may prove devastating
for companies.
20. COMPUTER SECURITY CONTROLS
• Computer security controls are established and implemented to
reduce security breaches.
• There are many types of controls:
• Application control
• Development control
• Access control
• Physical security control
• Personal control
21. COMPUTER CRIMES
• Hacker
• A hacker is a person who breaks into a computer system to get
access to the information stored there.
• A hacker may not cause any harm to the system or organizations,
but hacking is still illegal and unethical.
22. COMPUTER CRIMES
• Cracker
• A cracker is a person who breaks into a computer system just like
a hacker, with an intention to steal passwords, files or programs
for unauthorized use.
• They may sell this information to some other people for money.
• They cause financial damage to an organization.
23. COMPUTER CRIMES
• Virus Programmers
• A virus programmer is a cracker who breaches
into a computer system, in order to steal
information or cause harm to the computer
system.
• They create dangerous viruses to get access
to information.
Editor's Notes
ONLINE SAFETY AND SECURITY, ETHICS AND NETIQUETTES!
BEING SAFE ONLINE!
IN ORDER FOR US TO KEEP SAFE WHILE SURFING FROM THE INTERNET/WEB, WE SHOULD AVOID THOSE ONLINE THREATS, LIKE SUSPICIOUS UNKNOWN FILES AND ONLINE THREATS.
HOW ARE YOU GOING TO MAKE YOURSELF SAFE WHILE SURFING THE WEB?