SlideShare a Scribd company logo
Ethics 
• Derived from the Greek word “ethos”, which 
means “custom”, “habit”, and “way of living” 
• Definition: "the discipline and practice of 
applying value to human behavior, 
resulting in meaningful conduct.“
Cont………. 
• Professional Ethics: concerns one's conduct of 
behavior and practice when carrying out professional 
work, e.g., consulting, researching, teaching and 
writing. 
• A computing professional must understand 
– Cultural, social, legal, and ethical issues in computing. 
– Responsibility and possible consequences of failure.
Computer Ethics 
• Computer ethics defined as the application of classical 
ethical principles to the use of computer technology. 
• Ethical problems related to computers: 
– Privacy 
• Computers create a false sense of security 
• People do not realize how vulnerable information 
stored on computers are 
– Property 
• Physical property 
• Intellectual property (in both copyright and patent) 
• Data as property
• Access 
– Access to computing technology 
– Access to data 
• Accuracy 
– Accuracy of information stored 
• Hacking, cracking and virus creation 
• Software piracy
Ethical 
dilemmas 
in IT 
Ethical 
dilemmas 
in IT 
PPrrivivaaccyy 
Degree of privacy and 
dissemination of 
information about 
individual. 
AAcccceessssibibiliiltityy 
AAccccuurraaccyy 
PPrrooppeerrttyy 
Involves right of 
accessing the required 
info. As well as true 
payment of charges to 
access the information 
The information which 
is viable and being 
accessed is now much 
more accurate 
&authenticate. 
Talks about 
ownership & 
value of 
information.
The Ten Commandments of computer ethics 
have been defined by the Computer Ethics 
Institute. 
• 1) One should not use a computer to harm 
other people. 
• 2) One should not interfere with other 
people's computer work. 
• 3) One should not snoop around in other 
people's files. 
• 4) One should not use a computer to steal. 
• 5) One should not use a computer to bear 
false witness.
• 6) One should not use or copy software for 
which you have not paid. 
• 7) One should not use other people's 
computer resources without authorization. 
• 8) One should not distribute other people's 
intellectual output; without permit. 
• 9) One should think about the social 
consequences of the program you write. 
• 10) One should use a computer in ways that 
show consideration and respect.
Some threats to information system are:- 
• Computer Abuses:- hacking Id & sending mail 
through hacked id. 
• Computer crime:-Hacking &theft 
• Theft of equipment 
• Theft of data 
• Equipment malfunctions:- virus in excel sheet 
• Environmental hazards 
• Destruction from viruses 
• Errors in handling & usage of data.
Computer Virus
What is Computer Virus? 
• Computer viruses are small software programs that 
are designed to spread from one computer to another 
and to interfere with computer operation.
Spreading of Virus 
• Virus are most easily spread, 
• Spread through E-mail Attachments, 
– Instant Messaging messages, 
– Funny Images, 
– Audio and Videos files, 
– Downloading files from Internet, 
– Greeting cards and many more.
Steps to help avoid Viruses 
• Use an Internet firewall, 
• Subscribe to 
industry standard antivirus software, 
• Never open an e-mail attachment from 
someone you don't know, 
• Scan each and every attachment, 
• Rules to be followed, while surfing net
Software piracy and Hacking
What is PIRACY??????? 
Reselling Media 
 Downloading from a website 
 Taping songs 
Buying a used book or CD 
Watching broadcast television but skipping 
commercials
Types of PIRACY 
End User Piracy 
Client – Server Piracy 
Internet Piracy 
Hard-Disk Piracy 
Software Counterfeiting
End-User Piracy 
• This occurs when a company employee 
reproduces copies of software without 
authorization 
 Copying disk for installation and 
distribution 
Swapping disks in or outside the 
workplace
Client-Server Piracy 
• This type of piracy occurs when too many 
employees on a network are using a central 
copy of a program at the same time. 
 System Overuse
Internet Piracy 
• This occurs when software is downloaded 
from the Internet The same purchasing 
rules should apply to online software 
purchase as for those bought in traditional 
ways. 
Pirate website 
Unauthorized transfer of 
copyrighted program
Hard-Disk Loading 
• This occurs when a business who sells new 
computers loads illegal copies of software 
onto the hard disks to make the purchase of 
the machines more attractive. 
Value Added Resellers (VAR)
Software Counterfeiting 
• This type of piracy is the illegal 
duplication and sale of copyrighted 
material with the intent of directly 
imitating the copyrighted product .
HACKER 
• Some one who bypasses the system’s access 
controls by taking advantage of security 
weaknesses left in the system by 
developers .
What HACKER do??????? 
• SYSTEM 
Access confidential information 
Threaten someone from YOUR computer 
Broadcast your confidential letters or materials . 
Store illegal material
Evils of Hacking 
• Compromise the security of system without permission 
from an authorized party, usually with the intent of 
accessing computers connected to the network.
Advantage of Ethical Hacking 
• To determine problem and weakness for program 
• Creation of firewall 
• Useful for military purpose 
• Better computer security
BY-TUSHAR 
SINGH 
JATIN UPPAL 
BEVAN GIDEON 
NIKHIL SHARMA

More Related Content

What's hot

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
Aglaia Connect
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Cyber crime
Cyber crimeCyber crime
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
FCA - Future Chartered Accountants
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Shanmugam Thiagoo
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Benjamin Sangalang
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
shashi kiran
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
Muhammad Haroon
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
stanbridge
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
Online
 

What's hot (20)

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 

Similar to Ethics in IT and System Usage

Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Prof. Erwin Globio
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
ShivaTyagi26
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
ShivaniSingha1
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
Rheigh Henley Calderon
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Computer Security
Computer SecurityComputer Security
Chap11
Chap11Chap11
Chap11
Aman Sharma
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Haa'Meem Mohiyuddin
 
Chap11
Chap11Chap11
Chap11
nitin_009
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Divyank Jindal
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Mohammed Adam
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
lydneat
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
DLRUDO01
 
Online ethics
Online ethicsOnline ethics
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 

Similar to Ethics in IT and System Usage (20)

Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 

Recently uploaded

Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 

Recently uploaded (20)

Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 

Ethics in IT and System Usage

  • 1.
  • 2. Ethics • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“
  • 3. Cont………. • Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing. • A computing professional must understand – Cultural, social, legal, and ethical issues in computing. – Responsibility and possible consequences of failure.
  • 4. Computer Ethics • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy • Computers create a false sense of security • People do not realize how vulnerable information stored on computers are – Property • Physical property • Intellectual property (in both copyright and patent) • Data as property
  • 5. • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy
  • 6. Ethical dilemmas in IT Ethical dilemmas in IT PPrrivivaaccyy Degree of privacy and dissemination of information about individual. AAcccceessssibibiliiltityy AAccccuurraaccyy PPrrooppeerrttyy Involves right of accessing the required info. As well as true payment of charges to access the information The information which is viable and being accessed is now much more accurate &authenticate. Talks about ownership & value of information.
  • 7. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. • 1) One should not use a computer to harm other people. • 2) One should not interfere with other people's computer work. • 3) One should not snoop around in other people's files. • 4) One should not use a computer to steal. • 5) One should not use a computer to bear false witness.
  • 8. • 6) One should not use or copy software for which you have not paid. • 7) One should not use other people's computer resources without authorization. • 8) One should not distribute other people's intellectual output; without permit. • 9) One should think about the social consequences of the program you write. • 10) One should use a computer in ways that show consideration and respect.
  • 9. Some threats to information system are:- • Computer Abuses:- hacking Id & sending mail through hacked id. • Computer crime:-Hacking &theft • Theft of equipment • Theft of data • Equipment malfunctions:- virus in excel sheet • Environmental hazards • Destruction from viruses • Errors in handling & usage of data.
  • 11. What is Computer Virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 12. Spreading of Virus • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more.
  • 13. Steps to help avoid Viruses • Use an Internet firewall, • Subscribe to industry standard antivirus software, • Never open an e-mail attachment from someone you don't know, • Scan each and every attachment, • Rules to be followed, while surfing net
  • 15. What is PIRACY??????? Reselling Media  Downloading from a website  Taping songs Buying a used book or CD Watching broadcast television but skipping commercials
  • 16. Types of PIRACY End User Piracy Client – Server Piracy Internet Piracy Hard-Disk Piracy Software Counterfeiting
  • 17. End-User Piracy • This occurs when a company employee reproduces copies of software without authorization  Copying disk for installation and distribution Swapping disks in or outside the workplace
  • 18. Client-Server Piracy • This type of piracy occurs when too many employees on a network are using a central copy of a program at the same time.  System Overuse
  • 19. Internet Piracy • This occurs when software is downloaded from the Internet The same purchasing rules should apply to online software purchase as for those bought in traditional ways. Pirate website Unauthorized transfer of copyrighted program
  • 20. Hard-Disk Loading • This occurs when a business who sells new computers loads illegal copies of software onto the hard disks to make the purchase of the machines more attractive. Value Added Resellers (VAR)
  • 21. Software Counterfeiting • This type of piracy is the illegal duplication and sale of copyrighted material with the intent of directly imitating the copyrighted product .
  • 22. HACKER • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers .
  • 23. What HACKER do??????? • SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material
  • 24. Evils of Hacking • Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network.
  • 25. Advantage of Ethical Hacking • To determine problem and weakness for program • Creation of firewall • Useful for military purpose • Better computer security
  • 26.
  • 27. BY-TUSHAR SINGH JATIN UPPAL BEVAN GIDEON NIKHIL SHARMA

Editor's Notes

  1. The secut