SlideShare a Scribd company logo
COMPUTER ETHICS
PRESENTED BY:
RITIKA SHARMA
BVOC- 02711418118
INTRODUCTION TO COMPUTER ETHICS :
 Computer ethics primary enforce the ethical implementation and use of computing resource it includes methods and
procedures to avoid infringing copyrights, trademarks and the unauthorised distribution of digital content
 Computer ethics also entails the behaviour and approach of a human operator, workplace ethics and compliance with the
ethical standards that surround computer use. The computer ethics institute in 1992 provides 10 commandments of
computer ethics
i. Do not use a computer in ways that may harm other people
ii. Do not use computer technology to cause interference and other users work
iii. Do not spy on others person’s computer data
iv. Do not use computer technology to steal information
v. Do not contribute to the spread of misinformation using computer technology
vi. Refrain from cropping software or buying pirated copies
vii. Do not use someone else computer resources unless authorised to do
viii. It is wrong to claim ownership on a work which is output of someone else's intellect
ix. Before developing a software think about the social impact it can have
x. In using computers for communication be respectful and courteous with the fellow members
CONCEPTS THAT LEAD TO UNETHICAL USE OF COMPUTER TECHNOLOGY
Data
stealing
Cyber-
crime
Hacking Embezzlemen
t
CYBER-CRIME
The term cybercrime refers to criminal activities including computers networks on the internet. Computer
crime is any crime that is committed with a computer or a network maybe the target of the crime of the
computer may be the device utilised for carrying out other crimes
Following are some types of computer crimes
 Hacking
 Stealing software or data
 Copying, damaging
 Placing marvel virus on a computer system
 Using a computer for fraud or identity theft
 Stealing services or information
 Cyberstalking
 Faking email source information etc.
STEALING DATA
The development of our higher capacity portable data storage devices such as USB pen drive as metal almost are easy to
copy large quantities of data from almost any computer data theft is sufficiently common that really any organisation
should have some kind of incident response plan to deal with that the following brief information for it personal or other
managers who are faced with potential data theft aur thinking of preparing a plan for dealing with that.
Recent phenomenon for example is the use of portable digital players to remove data from computers and practice
referred as adding by its practitioners. There are however other modes of data theft which we also see on other ever-
increasing basis USB pen drive device is a cheap easy to hide and have large storage capacity portable hardware device
they can hold can store hundreds of gigabytes where us defence can store several gigabytes of data only these devices
are often not much larger than an ipod and can be powered on the USB ports of the computer that are connected to
MPS players digital cameras memory cards CD DVD emails some data theme simply use email to transfer files out it staff
do not notice large messages passing through their services it is also common to see such mail send to private a web-
based email addresses on the pretence that the sender is preparing to work on the data at homewebmail data things use
webmail to send data from their organisation fortunately webmail of an live significant forensic traces that a scale
investigator can recover. Printing some careful little things will not make any electronic copies at all but will print out ki
document and steel then hard copy form remote access some organisations make data theft even easier by allowing
remote access to their systems from employees private computers please make data theft difficult to trace and make it
very difficult for investigative to identify the computers and other devices which the stolen data has been transferred
HACKING
 Hacking is the activity of identifying weaknesses in a computer system or a network to exploit
the security to gain access to personal data or business data. An example of computer
password cracking algorithm to gain access to a computer system.
 Ethical Hacker (White hat): A security hacker who gains access to systems with a view to fix the
identified weaknesses. They may also perform penetration Testing and vulnerability
 Cracker (Black hat): A hacker who gains unauthorized access to computer systems for
personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer
accounts etc.
 Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into
computer systems without authority with a view to identify weaknesses and reveal them to the
 Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages.
This is usually done by hijacking websites and leaving the message on the hijacked website.
 Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of
computers.
MALWARE ATTACKS
Social engineering attacks
Online games attack
The web attacks
 Hacking cybercriminals know that the best way to breach defences is to track the user into doing
something harmful. The methods range from cleverly worded email to fake websites to even phone and
snail mail. Everyone is a potential target anyone who uses the web risk social engineering attacks each
time they open their email on browser for website social engineering attacks are also often used to take
users to infecting their own systems.
 A social attack is one in which the intended victim is somehow out rate into doing the attackers bidding.
 Targeted attacks are on increase some of the biggest targets are corporate executives and sensitive
sectors such as energy weapon research and finance in some cases the victim is enticed via email into
opening a malicious email attachment or visiting a nefarious website.
 Blizzard main cause of the very popular world of Warcraft series of MMORPG, has been aggressively
warning players to the risk of keyloggers and earn. The Trojan that can lead to compromise of their
online gaming credentials. For many of the impacted players the cause could boil down to good old
fashion tricky Taka social engineering.
 There is an old acronym in the computing industry WYSIWYG. Pronounced wizzy-wig it stands for “what
you see is what you get.” While that used to be true with computers today nothing could be further from
the truth.
EMBEZZLEMENT
Embezzlement refers to a form of white-collar crime in which a person or entity misappropriates the assets entrusted to
them. In this type of fraud, the embezzler attains the assets lawfully and has the right to possess them, but the assets
are then used for unintended purposes.
 Embezzlement takes place when a person uses funds for a different purpose than they were intended to
be used.
 Embezzlers might create bills and receipts for activities that did not occur and then use the money paid
for personal expenses.
 Ponzi schemes are an example of embezzlement.
 Businesses lost approximately $400 billion each year to theft.
 Embezzlers can be held civilly and criminally responsible for their crimes.
Some types of embezzlement might be combined with other forms of fraud, such as Ponzi schemes. In
such cases, the embezzler scams investors to entrust them with their assets to invest on their behalf but
instead uses the money for personal gain and enrichment. Maintaining the fraud often includes seeking out
new investors to bring in more money to appease prior investors.
THANK YOU

More Related Content

What's hot

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
Aglaia Connect
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
shashi kiran
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
RanaAbuHuraira
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
Mark John Lado, MIT
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
Varun Mathur
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
Intellipaat
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
ANAND MURALI
 
Computer Security
Computer SecurityComputer Security
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Hacking
Hacking Hacking
Hacking
Farkhanda Kiran
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
Joanna Dimitrova
 

What's hot (20)

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Hacking
Hacking Hacking
Hacking
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 

Similar to Computer ethics

Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
shreyas dani
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
cyber crime
cyber crimecyber crime
cyber crime
priya sehgal
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
gadisaAdamu
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
JamshidRaqi
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similar to Computer ethics (20)

Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Computer ethics

  • 1. COMPUTER ETHICS PRESENTED BY: RITIKA SHARMA BVOC- 02711418118
  • 2. INTRODUCTION TO COMPUTER ETHICS :  Computer ethics primary enforce the ethical implementation and use of computing resource it includes methods and procedures to avoid infringing copyrights, trademarks and the unauthorised distribution of digital content  Computer ethics also entails the behaviour and approach of a human operator, workplace ethics and compliance with the ethical standards that surround computer use. The computer ethics institute in 1992 provides 10 commandments of computer ethics i. Do not use a computer in ways that may harm other people ii. Do not use computer technology to cause interference and other users work iii. Do not spy on others person’s computer data iv. Do not use computer technology to steal information v. Do not contribute to the spread of misinformation using computer technology vi. Refrain from cropping software or buying pirated copies vii. Do not use someone else computer resources unless authorised to do viii. It is wrong to claim ownership on a work which is output of someone else's intellect ix. Before developing a software think about the social impact it can have x. In using computers for communication be respectful and courteous with the fellow members
  • 3. CONCEPTS THAT LEAD TO UNETHICAL USE OF COMPUTER TECHNOLOGY Data stealing Cyber- crime Hacking Embezzlemen t
  • 4. CYBER-CRIME The term cybercrime refers to criminal activities including computers networks on the internet. Computer crime is any crime that is committed with a computer or a network maybe the target of the crime of the computer may be the device utilised for carrying out other crimes Following are some types of computer crimes  Hacking  Stealing software or data  Copying, damaging  Placing marvel virus on a computer system  Using a computer for fraud or identity theft  Stealing services or information  Cyberstalking  Faking email source information etc.
  • 5. STEALING DATA The development of our higher capacity portable data storage devices such as USB pen drive as metal almost are easy to copy large quantities of data from almost any computer data theft is sufficiently common that really any organisation should have some kind of incident response plan to deal with that the following brief information for it personal or other managers who are faced with potential data theft aur thinking of preparing a plan for dealing with that. Recent phenomenon for example is the use of portable digital players to remove data from computers and practice referred as adding by its practitioners. There are however other modes of data theft which we also see on other ever- increasing basis USB pen drive device is a cheap easy to hide and have large storage capacity portable hardware device they can hold can store hundreds of gigabytes where us defence can store several gigabytes of data only these devices are often not much larger than an ipod and can be powered on the USB ports of the computer that are connected to MPS players digital cameras memory cards CD DVD emails some data theme simply use email to transfer files out it staff do not notice large messages passing through their services it is also common to see such mail send to private a web- based email addresses on the pretence that the sender is preparing to work on the data at homewebmail data things use webmail to send data from their organisation fortunately webmail of an live significant forensic traces that a scale investigator can recover. Printing some careful little things will not make any electronic copies at all but will print out ki document and steel then hard copy form remote access some organisations make data theft even easier by allowing remote access to their systems from employees private computers please make data theft difficult to trace and make it very difficult for investigative to identify the computers and other devices which the stolen data has been transferred
  • 6. HACKING  Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of computer password cracking algorithm to gain access to a computer system.  Ethical Hacker (White hat): A security hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability  Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer accounts etc.  Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the  Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.  Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
  • 7. MALWARE ATTACKS Social engineering attacks Online games attack The web attacks
  • 8.  Hacking cybercriminals know that the best way to breach defences is to track the user into doing something harmful. The methods range from cleverly worded email to fake websites to even phone and snail mail. Everyone is a potential target anyone who uses the web risk social engineering attacks each time they open their email on browser for website social engineering attacks are also often used to take users to infecting their own systems.  A social attack is one in which the intended victim is somehow out rate into doing the attackers bidding.  Targeted attacks are on increase some of the biggest targets are corporate executives and sensitive sectors such as energy weapon research and finance in some cases the victim is enticed via email into opening a malicious email attachment or visiting a nefarious website.  Blizzard main cause of the very popular world of Warcraft series of MMORPG, has been aggressively warning players to the risk of keyloggers and earn. The Trojan that can lead to compromise of their online gaming credentials. For many of the impacted players the cause could boil down to good old fashion tricky Taka social engineering.  There is an old acronym in the computing industry WYSIWYG. Pronounced wizzy-wig it stands for “what you see is what you get.” While that used to be true with computers today nothing could be further from the truth.
  • 9. EMBEZZLEMENT Embezzlement refers to a form of white-collar crime in which a person or entity misappropriates the assets entrusted to them. In this type of fraud, the embezzler attains the assets lawfully and has the right to possess them, but the assets are then used for unintended purposes.  Embezzlement takes place when a person uses funds for a different purpose than they were intended to be used.  Embezzlers might create bills and receipts for activities that did not occur and then use the money paid for personal expenses.  Ponzi schemes are an example of embezzlement.  Businesses lost approximately $400 billion each year to theft.  Embezzlers can be held civilly and criminally responsible for their crimes. Some types of embezzlement might be combined with other forms of fraud, such as Ponzi schemes. In such cases, the embezzler scams investors to entrust them with their assets to invest on their behalf but instead uses the money for personal gain and enrichment. Maintaining the fraud often includes seeking out new investors to bring in more money to appease prior investors.