SlideShare a Scribd company logo
1 of 25
Need For Ethical &
Security Issue in IT
Introduction
ETHICAL ISSUES
Ethics in society holds each person responsible for
his or her actions. Each person is accountable for
everything he or she does. If anything that is
illegal or immoral in the real world it is illegal in
the computer world too. IT and computer
personnel often have access to much confidential
data and knowledge about individuals and
companies networks and system that give them a
great deal of information. This raises ethical
questions.
Such As:
• SHOULD YOU READ THE PRIVATE E-MAIL OF
YOUR NETWORK USERS JUST BECAUSE YOU
HAVE THE ACCESS?
• IS IT RIGHT TO MONITOR THE WEBSITES
VISITED BY NETWORK USERS?
Security Issue
• Security issues related to computerized system involves
protecting all parts of the computer system. This
includes data, the software and the hardware.
• The abuse of computers has also given birth to a new
ages crimes that are addressed by the Information
Technology act, 2000. Defining cyber crimes as “acts
that are punishable by the information technology act”
would be unsuitable as the Indian penal code also
covers many cyber crimes, such as email spoofing and
cyber deformation, sending threatening e mail etc. .
Security Threats
• A network security threat is any potentially adverse
occurrence that can harm or interrupt the systems
using the network, or cause a monetary loss to an
organization.
• Once the threats are identified they are then ranked
according to their occurrence.
• For example, the average cost to clean up a virus that
slips through a security system and infects an average
number of computers is $150,000/virus
Types of Threats
•

Fabrication
– An unauthorized party inserts counterfeit objects
into the system
– Attack on authenticity
– Insertion of spurious messages in a network
– Addition of records to a file
• Interruption
– An asset of the system is destroyed of becomes
unavailable or unusable
– Attack on availability
– Destruction of hardware
– Cutting of a communication line
– Disabling the file management system
• Interception
– An unauthorized party gains
access to an asset
– Attack on confidentiality
– Wiretapping to capture data in a
network
– Illicit copying of files or
programs
• Modification
– An unauthorized party not only gains
access but tampers with an asset
– Attack on integrity
– Changing values in a data file
– Altering a program so that it performs
differently
– Modifying the content of messages
being transmitted in a network
• Disruptions are the loss or reduction in network
service.
• Some disruptions may also be caused by or result
in the destruction data.
• Natural (or manmade) may occur that destroy
host computers or large sections of the network is
often viewed as hackers gaining access to
organizational data files and resources. However,
most unauthorized access incidents involve
employees.
SYSTEM GETS INFECTED THROUGH
 Viruses
 Worms
 Trojan
 Zombies
HACKING
Hacking is the gaining of access(wanted or
unwanted) to a computer and viewing,
copying, or creating data(leaving a trace)
without the intention of destroying data or
maliciously harming the computer. Cases of
hacking reported in 2011 was 157 and
reported in 2012 was 435 thereby % variation
in increase in cases over 2011 is 177.1%
Top Countries In Cyber Crime
Targets Of Cyber Criminals
SPAM
Email spam, also known as junk
email or unsolicited bulk email (UBE), is a subset
of electronic spam involving nearly identical
messages sent to numerous recipients by email.
Clicking on links in spam email may send users
to phishing web sites or sites that are
hosting malware. Spam email may also include
malware as scripts or other executable file
attachments. Definitions of spam usually include the
aspects that email is unsolicited and sent in bulk.
A HISTORICAL ARTIFACT: THE FIRST SPAM
The first spam, (sent to Usenet news groups, not to email accounts, BTW). It was
sent by lawyers… Grr!
From: Laurence Canter (nike@indirect.com)
Subject: Green Card Lottery- Final One?
Newsgroups: alt.brother-jed, alt.pub.coffeehouse.amethyst
View: Complete Thread (4 articles) | Original Format
Date: 1994-04-12 00:40:42 PST
Green Card Lottery 1994 May Be The Last One!
THE DEADLINE HAS BEEN ANNOUNCED.

The Green Card Lottery is a completely legal program giving away a certain annual
allotment of Green Cards to persons born in certain countries. The lottery
program was scheduled to continue on a permanent basis. However, recently,
Senator Alan J Simpson introduced a bill into the U. S. Congress which could end
any future lotteries. THE 1994 LOTTERY IS SCHEDULED TO TAKE PLACE SOON, BUT
IT MAY BE THE VERY LAST ONE. [continues]
Ankit Fadia
The author of The
Unofficial Guide to
Ethical Hacking Said “ I
could hack a stateowned bank’s website
or government
communications
website which shows
the vulnerability,
thousands of Indian
websites are being
hacked each day”.
SECURITY MEASURES AND
TECHNIQUES
Encryption- Encryption is the process of making information
indecipherable to protect it from unauthorized viewing or use,
especially during transmission or when it is stored on a
transportable magnetic medium.
• Encryption is usually based on a key without which the
information cannot be decoded or decrypted.
• Someone intercepting it may not be able to understand or
misuse it.
• Institute of standards and technology has created an extremely
complex encryption standard called DES(Data Encryption
Standard) that provides virtually unlimited ways to secure
computer files.
ACCESS CONTROL
• Access to computer systems should be physically controlled by
use of measures like entry passes and ID cards being checked
by security staff.
• Authorization is the act of granting the permission to a person
or a group or a programme so that the required activity can be
done.
• Common means used to restrict access to computer systems
and sensitive file is a password.
Users must not display there passwords at easily accessible places.
System developers must ensure that passwords are never displayed
on a screen.
Password should also not be printed on reports. Password should to
be held in in the system in an encrypted form, so that even if someone
reaches the password table/file, all that be seen is garbage.

System developers must ensure that short passwords are not
permitted.
System administrators must deactivate the usernames/passwords
of employees who have resigned, have retired, have been transferred
or have departed for any reason.
PROECTION FROM VIRUSES
A computer virus is a programme that infects computer files and
runs executable programmes by inserting in those files copies of it.
This is usually done in such a manner that the copies will be
executed when the file is loaded into memory.
A virus cannot exist by itself It infects an executable file.

When the file is executed, the virus gets transmitted.
Virus spreads through CDs, pendrive, local area network and intenet.
FIREWALL


A Firewall is a barrier to keep destructive forces away from a system.

 Its job is similar to physical firewall that keeps a fire spreading from one
area to another.
A firewall is simply a programme or a hardware device that filters the
information coming through the internet connection into a computer
system.

Firewalls can be implemented in both hardware and software or a
combination of both.
Firewalls are frequently used to prevent unauthorized internet
from accessing private networks connected to internet.

users
ADULT TRIAL
Adult Trial is a means of tracing all activities affecting a piece of
information such as data recorded from a time in enters the system
from the time in enters the system to the time it leaves.

An adult trial documents the path from input to output and should
provide information to reconstructed or verify the entire sequence
either manually or through automated tracking procedures.
Adult trial can often be used to identify the cause, timing and location
of security breaches.
Need For Ethical & Security Issue In It

More Related Content

What's hot

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 

What's hot (20)

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security
Computer securityComputer security
Computer security
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer security and
Computer security andComputer security and
Computer security and
 
Chapter11
Chapter11Chapter11
Chapter11
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Computer security
Computer securityComputer security
Computer security
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
System failure
System  failureSystem  failure
System failure
 

Viewers also liked

Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingRahul Roshan
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Govinda Aryal
 
Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3STM Journals
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Application Security Trends and Issues
Application Security Trends and IssuesApplication Security Trends and Issues
Application Security Trends and IssuesDedi Dwianto
 
Obama us wars used to train white supremacist (estonian)
Obama   us wars used to train white supremacist (estonian)Obama   us wars used to train white supremacist (estonian)
Obama us wars used to train white supremacist (estonian)VogelDenise
 
062112 lithuanian (supreme court)
062112   lithuanian (supreme court)062112   lithuanian (supreme court)
062112 lithuanian (supreme court)VogelDenise
 
102912 vogel denise slideshare documents (vietnamese)
102912   vogel denise slideshare documents (vietnamese)102912   vogel denise slideshare documents (vietnamese)
102912 vogel denise slideshare documents (vietnamese)VogelDenise
 
Hungarian 040412
Hungarian 040412Hungarian 040412
Hungarian 040412VogelDenise
 
Obama read my lips -obama fraudgate (yiddish)
Obama   read my lips -obama fraudgate (yiddish)Obama   read my lips -obama fraudgate (yiddish)
Obama read my lips -obama fraudgate (yiddish)VogelDenise
 
Christopher - CHRIS - Brown (wikipedia)
Christopher - CHRIS - Brown (wikipedia)Christopher - CHRIS - Brown (wikipedia)
Christopher - CHRIS - Brown (wikipedia)VogelDenise
 
Obama read my lips -obama fraudgate (ukrainian)
Obama   read my lips -obama fraudgate (ukrainian)Obama   read my lips -obama fraudgate (ukrainian)
Obama read my lips -obama fraudgate (ukrainian)VogelDenise
 
052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)
052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)
052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)VogelDenise
 
062112 telugu (eeoc response)
062112 telugu (eeoc response)062112 telugu (eeoc response)
062112 telugu (eeoc response)VogelDenise
 
דרוש: מעצב עם ידע בפיתוח
דרוש: מעצב עם ידע בפיתוחדרוש: מעצב עם ידע בפיתוח
דרוש: מעצב עם ידע בפיתוחIgal Steklov
 
062112 urdu (supreme court)
062112   urdu (supreme court)062112   urdu (supreme court)
062112 urdu (supreme court)VogelDenise
 

Viewers also liked (20)

Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)
 
security issue
security issuesecurity issue
security issue
 
Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Application Security Trends and Issues
Application Security Trends and IssuesApplication Security Trends and Issues
Application Security Trends and Issues
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Obama us wars used to train white supremacist (estonian)
Obama   us wars used to train white supremacist (estonian)Obama   us wars used to train white supremacist (estonian)
Obama us wars used to train white supremacist (estonian)
 
062112 lithuanian (supreme court)
062112   lithuanian (supreme court)062112   lithuanian (supreme court)
062112 lithuanian (supreme court)
 
102912 vogel denise slideshare documents (vietnamese)
102912   vogel denise slideshare documents (vietnamese)102912   vogel denise slideshare documents (vietnamese)
102912 vogel denise slideshare documents (vietnamese)
 
Irish 040412
Irish 040412Irish 040412
Irish 040412
 
Polish 040412
Polish 040412Polish 040412
Polish 040412
 
Hungarian 040412
Hungarian 040412Hungarian 040412
Hungarian 040412
 
Obama read my lips -obama fraudgate (yiddish)
Obama   read my lips -obama fraudgate (yiddish)Obama   read my lips -obama fraudgate (yiddish)
Obama read my lips -obama fraudgate (yiddish)
 
Christopher - CHRIS - Brown (wikipedia)
Christopher - CHRIS - Brown (wikipedia)Christopher - CHRIS - Brown (wikipedia)
Christopher - CHRIS - Brown (wikipedia)
 
Obama read my lips -obama fraudgate (ukrainian)
Obama   read my lips -obama fraudgate (ukrainian)Obama   read my lips -obama fraudgate (ukrainian)
Obama read my lips -obama fraudgate (ukrainian)
 
052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)
052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)
052215 - FAX TO DELNER THOMAS & BENNIE THOMPSON (Latin)
 
062112 telugu (eeoc response)
062112 telugu (eeoc response)062112 telugu (eeoc response)
062112 telugu (eeoc response)
 
דרוש: מעצב עם ידע בפיתוח
דרוש: מעצב עם ידע בפיתוחדרוש: מעצב עם ידע בפיתוח
דרוש: מעצב עם ידע בפיתוח
 
062112 urdu (supreme court)
062112   urdu (supreme court)062112   urdu (supreme court)
062112 urdu (supreme court)
 

Similar to Need For Ethical & Security Issue In It

презентация1
презентация1презентация1
презентация1sagidullaa01
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Information security
 Information security Information security
Information securityJin Castor
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 

Similar to Need For Ethical & Security Issue In It (20)

Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
презентация1
презентация1презентация1
презентация1
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Presentation1
Presentation1Presentation1
Presentation1
 
Information security
 Information security Information security
Information security
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Sonali Srivastava

More from Sonali Srivastava (20)

Tata Tinplate Company of India Ltd
Tata Tinplate Company of India LtdTata Tinplate Company of India Ltd
Tata Tinplate Company of India Ltd
 
To understand customer satisfaction at reliance fresh
To understand customer satisfaction at reliance freshTo understand customer satisfaction at reliance fresh
To understand customer satisfaction at reliance fresh
 
Paper Presentation "Opportunities & Challenges For New Outlook In Global Work...
Paper Presentation "Opportunities & Challenges For New Outlook In Global Work...Paper Presentation "Opportunities & Challenges For New Outlook In Global Work...
Paper Presentation "Opportunities & Challenges For New Outlook In Global Work...
 
Paper Presentation on Problems Related to Global Business due to Cultural Div...
Paper Presentation on Problems Related to Global Business due to Cultural Div...Paper Presentation on Problems Related to Global Business due to Cultural Div...
Paper Presentation on Problems Related to Global Business due to Cultural Div...
 
State Bank of India
State Bank of IndiaState Bank of India
State Bank of India
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodology
 
Production at Pepsico
Production at PepsicoProduction at Pepsico
Production at Pepsico
 
Product Development
Product DevelopmentProduct Development
Product Development
 
Distribution Channel
Distribution ChannelDistribution Channel
Distribution Channel
 
Product Pricing
Product PricingProduct Pricing
Product Pricing
 
STP
STPSTP
STP
 
M Commerce
M CommerceM Commerce
M Commerce
 
Human Resource Development
Human Resource DevelopmentHuman Resource Development
Human Resource Development
 
Expatriate Compensation
Expatriate CompensationExpatriate Compensation
Expatriate Compensation
 
Citi Bank
Citi BankCiti Bank
Citi Bank
 
E Commerce in B2B
E Commerce in B2BE Commerce in B2B
E Commerce in B2B
 
Aerospace & Defense
Aerospace & DefenseAerospace & Defense
Aerospace & Defense
 
Micro Economics
Micro EconomicsMicro Economics
Micro Economics
 
Sampling theory
Sampling theorySampling theory
Sampling theory
 
Working capital management
Working capital managementWorking capital management
Working capital management
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Need For Ethical & Security Issue In It

  • 1. Need For Ethical & Security Issue in IT
  • 3. ETHICAL ISSUES Ethics in society holds each person responsible for his or her actions. Each person is accountable for everything he or she does. If anything that is illegal or immoral in the real world it is illegal in the computer world too. IT and computer personnel often have access to much confidential data and knowledge about individuals and companies networks and system that give them a great deal of information. This raises ethical questions.
  • 4. Such As: • SHOULD YOU READ THE PRIVATE E-MAIL OF YOUR NETWORK USERS JUST BECAUSE YOU HAVE THE ACCESS? • IS IT RIGHT TO MONITOR THE WEBSITES VISITED BY NETWORK USERS?
  • 5. Security Issue • Security issues related to computerized system involves protecting all parts of the computer system. This includes data, the software and the hardware. • The abuse of computers has also given birth to a new ages crimes that are addressed by the Information Technology act, 2000. Defining cyber crimes as “acts that are punishable by the information technology act” would be unsuitable as the Indian penal code also covers many cyber crimes, such as email spoofing and cyber deformation, sending threatening e mail etc. .
  • 6. Security Threats • A network security threat is any potentially adverse occurrence that can harm or interrupt the systems using the network, or cause a monetary loss to an organization. • Once the threats are identified they are then ranked according to their occurrence. • For example, the average cost to clean up a virus that slips through a security system and infects an average number of computers is $150,000/virus
  • 7. Types of Threats • Fabrication – An unauthorized party inserts counterfeit objects into the system – Attack on authenticity – Insertion of spurious messages in a network – Addition of records to a file
  • 8. • Interruption – An asset of the system is destroyed of becomes unavailable or unusable – Attack on availability – Destruction of hardware – Cutting of a communication line – Disabling the file management system
  • 9. • Interception – An unauthorized party gains access to an asset – Attack on confidentiality – Wiretapping to capture data in a network – Illicit copying of files or programs
  • 10. • Modification – An unauthorized party not only gains access but tampers with an asset – Attack on integrity – Changing values in a data file – Altering a program so that it performs differently – Modifying the content of messages being transmitted in a network
  • 11. • Disruptions are the loss or reduction in network service. • Some disruptions may also be caused by or result in the destruction data. • Natural (or manmade) may occur that destroy host computers or large sections of the network is often viewed as hackers gaining access to organizational data files and resources. However, most unauthorized access incidents involve employees.
  • 12. SYSTEM GETS INFECTED THROUGH  Viruses  Worms  Trojan  Zombies
  • 13. HACKING Hacking is the gaining of access(wanted or unwanted) to a computer and viewing, copying, or creating data(leaving a trace) without the intention of destroying data or maliciously harming the computer. Cases of hacking reported in 2011 was 157 and reported in 2012 was 435 thereby % variation in increase in cases over 2011 is 177.1%
  • 14. Top Countries In Cyber Crime
  • 15. Targets Of Cyber Criminals
  • 16. SPAM Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Clicking on links in spam email may send users to phishing web sites or sites that are hosting malware. Spam email may also include malware as scripts or other executable file attachments. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk.
  • 17. A HISTORICAL ARTIFACT: THE FIRST SPAM The first spam, (sent to Usenet news groups, not to email accounts, BTW). It was sent by lawyers… Grr! From: Laurence Canter (nike@indirect.com) Subject: Green Card Lottery- Final One? Newsgroups: alt.brother-jed, alt.pub.coffeehouse.amethyst View: Complete Thread (4 articles) | Original Format Date: 1994-04-12 00:40:42 PST Green Card Lottery 1994 May Be The Last One! THE DEADLINE HAS BEEN ANNOUNCED. The Green Card Lottery is a completely legal program giving away a certain annual allotment of Green Cards to persons born in certain countries. The lottery program was scheduled to continue on a permanent basis. However, recently, Senator Alan J Simpson introduced a bill into the U. S. Congress which could end any future lotteries. THE 1994 LOTTERY IS SCHEDULED TO TAKE PLACE SOON, BUT IT MAY BE THE VERY LAST ONE. [continues]
  • 18. Ankit Fadia The author of The Unofficial Guide to Ethical Hacking Said “ I could hack a stateowned bank’s website or government communications website which shows the vulnerability, thousands of Indian websites are being hacked each day”.
  • 19. SECURITY MEASURES AND TECHNIQUES Encryption- Encryption is the process of making information indecipherable to protect it from unauthorized viewing or use, especially during transmission or when it is stored on a transportable magnetic medium. • Encryption is usually based on a key without which the information cannot be decoded or decrypted. • Someone intercepting it may not be able to understand or misuse it. • Institute of standards and technology has created an extremely complex encryption standard called DES(Data Encryption Standard) that provides virtually unlimited ways to secure computer files.
  • 20. ACCESS CONTROL • Access to computer systems should be physically controlled by use of measures like entry passes and ID cards being checked by security staff. • Authorization is the act of granting the permission to a person or a group or a programme so that the required activity can be done. • Common means used to restrict access to computer systems and sensitive file is a password.
  • 21. Users must not display there passwords at easily accessible places. System developers must ensure that passwords are never displayed on a screen. Password should also not be printed on reports. Password should to be held in in the system in an encrypted form, so that even if someone reaches the password table/file, all that be seen is garbage. System developers must ensure that short passwords are not permitted. System administrators must deactivate the usernames/passwords of employees who have resigned, have retired, have been transferred or have departed for any reason.
  • 22. PROECTION FROM VIRUSES A computer virus is a programme that infects computer files and runs executable programmes by inserting in those files copies of it. This is usually done in such a manner that the copies will be executed when the file is loaded into memory. A virus cannot exist by itself It infects an executable file. When the file is executed, the virus gets transmitted. Virus spreads through CDs, pendrive, local area network and intenet.
  • 23. FIREWALL  A Firewall is a barrier to keep destructive forces away from a system.  Its job is similar to physical firewall that keeps a fire spreading from one area to another. A firewall is simply a programme or a hardware device that filters the information coming through the internet connection into a computer system. Firewalls can be implemented in both hardware and software or a combination of both. Firewalls are frequently used to prevent unauthorized internet from accessing private networks connected to internet. users
  • 24. ADULT TRIAL Adult Trial is a means of tracing all activities affecting a piece of information such as data recorded from a time in enters the system from the time in enters the system to the time it leaves. An adult trial documents the path from input to output and should provide information to reconstructed or verify the entire sequence either manually or through automated tracking procedures. Adult trial can often be used to identify the cause, timing and location of security breaches.