SlideShare a Scribd company logo
Management information system Third Year Information Technology Part 21  Security and Ethical Challenges Tushar B Kute, Sandip Institute of Technology and Research Centre, Nashik http://www.tusharkute.com
Security and Ethical Challenges Privacy Employment Health Crime Security Ethics and Society Working Conditions Individuality
Objective of information security Confidentiality Availability  Integrity
Computer Crime Hacking Cyber Theft  Computer Viruses Unauthorized Use at work Piracy
Ethics in information society Responsibility  Accepting potential costs, duties and obligations for your decisions. Accountability Determining who should take responsibility for decisions and actions. Liability  Legally placing responsibility with a person or group.
Fair information practices principles There should be no personal record systems whose existence is secret. Individuals have rights of access, inspection, review and amendment to systems that contain information about them. There must be no use of personal information for purpose other than those for which it was gathered without prior consent.
Fair information practices principles Managers of the system are responsible and can be held accountable and liable for the damage done by system for their reliability and security. Government have right to intervene in the information relationship among private parties.
Property rights: intellectual property It is result of someone’s effort to create a product of value based on their experience, knowledge and education. In short, intellectual property is brain power. E.g. Copyrights, patents and trade secrets. Accountability, liability and control. Data quality and system errors.
Quality of life Online technology lost the face-to-face contact. On-line love affairs. Work from home, impact to the family life.
Computer Crime Any wrong doing involves computer and internet usage. Often defies detection The amount stolen or diverted can be substantial The crime is “clean” and nonviolent The number of IT-related security incidents is increasing dramatically Computer crime is now global
Management actions: a corporate code of ethics The information rights to privacy and freedom. The property rights to individuals ideas and efforts. The accountability, liability and control issues involved in technology. The system quality requirements of businesses and individuals. The quality of life impact of technology.
Cyber crime Conventional crime or an offence is a legal wrong that can be followed by criminal proceedings which may result into punishment. Cyber Crime may be said to be those species where computer is an object or subject of the conduct constitutional crime. Unlawful act wherein the computer is either a tool or target or both.
Reasons for cyber crime Capacity to store data in comparatively small space. Easy to access. Complex Negligence. Loss of evidence.
Cyber criminals Children and adolescents between the age group of 6 – 18 years. Organized hackers. Professional hackers/crackers. Discontinued employees.
Mode and manner of committing crime Denial of Service Scans Sniffer Programs Spoofing Trojan Horse Back Doors Malicious Applets War Dialing Logic Bombs Buffer Overflow Password Crackers Social Engineering Dumpster Driving
classification Against individuals Against individual property Against organization Against society at large
Against individuals Harassment via emails. Cyber stalking Defamation Email spoofing Cheating and fraud
Against individual property Computer vandalism Transmitting viruses. Intellectual property crimes Internet time thefts
Against organization Unauthorized access / control. Possession of unauthorized information Distribution of pirated software Cyber terrorism
Against society at large Trafficking Financial crimes Polluting youth through indecent exposure Sale of illegal articles Online gambling
Statutory provisions Information technology act 2000 forced on 17th May 2000. legalizing- Indian penal code 1860 The Indian evidence act 1872 The banker’s book evidence act 1891 The reserve bank of India act 1934. The IT act deals with the various cyber crimes in chapters IX and XI. The important sections are 43, 65, 66, 67.  Section 43 deals particularly with unauthorized access, unauthorized downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person.
IT act Section 65- tampering with computer source documents. It provides imprisonment upto 3 years or fine. Section 66- hacking the computer system It provides imprisonment upto 3 years or fine. Section 67- publication of obscene material. It provides imprisonment upto 10 years and fine upto 2 lakhs.
Prevention of cyber crime Precaution Prevention Protection Preservation Perseverance
Prevention of cyber crime Avoid disclosing any information pertaining oneself. Avoid sending any photographs online, particularly to strangers and chat with strangers. Use latest and updated antivirus. Always keep backup volumes. Never send your credit card number to any site. Always keep watch on the sites that children are accessing. Use security programs for coockies.
Prevention of cyber crime Website owners should watch traffic and check any irregularity on the site. Use the firewalls.
hacking The process of achieving access to computer or computer network administrator. It is the most common activity amongst teenagers and young adults. It is an offence if hackers steal private information of changes some financial data. All the types of unauthorized access can lead the hacker towards the prison for 20 years.
Cyber theft It is the use of computers and communication systems to steal information in electronic format. E.g. bank money transfers. Programs used- worm and trojan horses. Reports- Microsoft platform strategy manager Matthew Hardman said social networking sites like Facebook, are among the most commonly targeted because of their huge communities of user concluding by saying the malicious code may be hidden inside Facebook applications or links under the photographs.
Solution of cyber theft Antivirus  Anti-spywares Firewalls Cryptography Cyber ethics Cyber laws
Software piracy It refers to the unauthorized duplication and use of computer software. According to a survey done jointly by BSA and IDC the highest piracy rate comes from Armenia, with piracy rate of 93%. China and India are at No. 17 and No. 41 respectively, with 82% and 69% of recorded Software Piracy rates. The lowest piracy rate, according to survey, is observed in USA, at 20%. However, the statistics gave rise to a wide criticism citing lack of accuracy.
Terms related to piracy Cloning: Ideas can not be copy protected. Crack: modification of software in order to remove encoded copy prevention. Cracker: Undertakes disabling the software protection. Hack: Fix, or bug workaround. Hacker: One, who hacks. Hardware Locking: method of protecting software from duplication by locking the license to specific piece of computer hardware.
Terms related to piracy KeyGen or Key Generator: a small program that will generate an unauthorized but working registration key or serial number for the piece of software. Serials: This unique is used to unlock the version of the software. Warez: Another term used for software crack.
Software piracy It is illegal to- Use a single licensed version on multiple computer. Preloaded software on computers without providing the appropriate licenses. Use a key generator to generate registration key that turns an evaluation version to licensed version. Use a stolen credit card to fraudulently purchase a software license. Post licensed version of a software product on the Internet and make it available for downloading.
Software piracy in India The copyright of computer piracy is protected under the Indian copyright Act of 1957.  Copyright protection for software with an individual author lasts for the duration of the author’s life and continues 60 years after the author’s death. According to nasscom, software piracy involves the use of reproduction or distribution without having received the expressed permission of the software author.
Forms of software piracy End user piracy. Hard disk loading. Software counterfeiting. Internet piracy.
Software copyrights Eligibility: The original software work does not have to be published in order to receive copyright protection.  Punishment: Under the Indian copyright act, a software pirate can be tried under both civil and criminal law. The minimum jail term for software copyright infringement is seven days, and maximum is three years. Fine from 50,000 to 2,00,000.
copyright It is set of exclusive rights granted by the law of jurisdiction to the author or creator of an original work, including right to copy, distribute and adapt to work. It is applied for specific period of time, after which the work is said to enter in public domain. Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative work.
Copyright acts 1957 India has one of the modern copyright protection laws in the world. "computer programme" means a set of instructions expressed in words, codes, schemes or in any other form, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular result;
Exclusive rights given in copyright act To reproduce the work in any material form including the storing of it in any medium by electronic means. To issue copies of the work to the public not being copies already in the circulation. To perform the work in the public or communicate it to the public. To make any cinematographic film or sound recording in respect of work. To make any translation of the work. To make any adaptation of the work.  To sell or give on commercial rental or offer for sale or for commercial rental any copy of the program.
Berne convention
WIPO copyright treaty The World Intellectual Property Organization Copyright Treaty, abbreviated as the WIPO Copyright Treaty, is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996.  It provides additional protections for copyright deemed necessary due to advances in information technology since the formation of previous copyright treaties before it.
Universal copyright prevention The UCC was developed by United Nations Educational, Scientific and Cultural Organization as an alternative to the Berne Convention for those states which disagreed with aspects of the Berne Convention, but still wished to participate in some form of multilateral copyright protection.  These states included developing countries and the Soviet Union, which thought that the strong copyright protections granted by the Berne Convention overly benefited Western developed copyright-exporting nations, and the United States and most of Latin America.
patent A patent is a set of exclusive rights granted by a state (national government) to an inventor or their assignee for a limited period of time in exchange for a public disclosure of an invention. Under the World Trade Organization's (WTO) Agreement on Trade-Related Aspects of Intellectual Property Rights, patents should be available in WTO member states for any inventions, in all fields of technology, and the term of protection available should be the minimum twenty years.
patents In many countries, certain subject areas such as business methods and mental acts are excluded from patents. The exclusive rights granted to a patentee in most countries is the right to prevent others from making, using, selling or distributing the patented invention without permission.
Patents forced in 2000 US Patent
Health issues Eye disease Bad postures Hurting Hands Computer stress injuries
Computer ergonomics
Real world picture
Computer ergonomics
Computer ergonomics
Computer ergonomics Use a good chair with a dynamic chair back and sit back. The eye-level should be the same as the level of the monitor. You should be able to see the contents in the monitor without bending your neck. No glare on screen, use an optical glass anti-glare filter where needed. Sit at arms length from monitor as a good viewing distance. Feet on floor or stable footrest. Use a document holder, preferably in-line with the computer screen. Wrists flat and straight in relation to forearms to use keyboard/mouse/input device. Arms and elbows relaxed close to body. Top of monitor casing 2-3" (5-8 cm) above eye level. Use a negative tilt keyboard tray with an upper mouse platform or downward tiltable platform adjacent to keyboard. Center monitor and keyboard in front of you. Use a stable work surface and stable (no bounce) keyboard tray.
Use of keyboard
Use of mouse
Use of mouse
The ACM Code of Professional Conduct Strive to achieve the highest quality, effectiveness, and dignity in both the process and products of professional work Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Accept and provide appropriate professional review Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks
The ACM Code of Professional Conduct (continued) Honor contracts, agreements, and assigned responsibilities Improve public understanding of computing and its consequences Access computing and communication resources only when authorized to do so
references http://en.wikipedia.org ArpitaGopal, Chandrani Singh, “e-World Emerging Trends in Information Technology” , 1st Edition, Excel Books. http://www.nasscom.in Tushar B Kute, Sandip Institute of Technology and Research Centre, Nashik http://www.tusharkute.com

More Related Content

What's hot

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
The evolution of management information system
The evolution of management information systemThe evolution of management information system
The evolution of management information system
Cheryl Asia
 
E business models
E business modelsE business models
E business models
Madhur Choudhary
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Sreelekshmi Mohan
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applications
Shubham Upadhyay
 
Ethics in functional areas
Ethics in functional areasEthics in functional areas
Ethics in functional areas
JerinBMonachan
 
Technological Change & Its Impact on Business
Technological Change & Its Impact on BusinessTechnological Change & Its Impact on Business
Technological Change & Its Impact on Business
Mahamid Rahman
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...
Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...
Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...
Mamta Bhola
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
Dattatreya Reddy Peram
 
System concept in MIS
System concept in MISSystem concept in MIS
System concept in MIS
Mohammed Jasir PV
 
1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systems
Bronte666
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
megat zainurul anuar
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
Kdnk Kiriti
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyber law
Cyber lawCyber law
Cyber law
Umang Maheshwari
 

What's hot (20)

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
The evolution of management information system
The evolution of management information systemThe evolution of management information system
The evolution of management information system
 
E business models
E business modelsE business models
E business models
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applications
 
Ethics in functional areas
Ethics in functional areasEthics in functional areas
Ethics in functional areas
 
Technological Change & Its Impact on Business
Technological Change & Its Impact on BusinessTechnological Change & Its Impact on Business
Technological Change & Its Impact on Business
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...
Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...
Impact of e commerce on various sectors (Education, Entertainment, Health, Fi...
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
System concept in MIS
System concept in MISSystem concept in MIS
System concept in MIS
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systems
 
Labour legislation
Labour legislationLabour legislation
Labour legislation
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 

Viewers also liked

Ethical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyEthical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet Policy
Internet Law Center
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
Silvia Afrima Chandra
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
Priya Diana Mercy
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
Ieee code of_ethics_ppt
Ieee code of_ethics_pptIeee code of_ethics_ppt
Ieee code of_ethics_ppt
Judy T Raj
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
RSD Relating Systems Thinking and Design
 
Form, Meaning and Design
Form, Meaning and DesignForm, Meaning and Design
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 

Viewers also liked (15)

Ethical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyEthical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet Policy
 
Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ieee code of_ethics_ppt
Ieee code of_ethics_pptIeee code of_ethics_ppt
Ieee code of_ethics_ppt
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
 
Form, Meaning and Design
Form, Meaning and DesignForm, Meaning and Design
Form, Meaning and Design
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Similar to MIS 21 Security and Ethical Challenges

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
Syangba132
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
AVISHITYAGI
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Binit Kumar
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 

Similar to MIS 21 Security and Ethical Challenges (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 

More from Tushar B Kute

Apache Pig: A big data processor
Apache Pig: A big data processorApache Pig: A big data processor
Apache Pig: A big data processor
Tushar B Kute
 
01 Introduction to Android
01 Introduction to Android01 Introduction to Android
01 Introduction to Android
Tushar B Kute
 
Ubuntu OS and it's Flavours
Ubuntu OS and it's FlavoursUbuntu OS and it's Flavours
Ubuntu OS and it's Flavours
Tushar B Kute
 
Install Drupal in Ubuntu by Tushar B. Kute
Install Drupal in Ubuntu by Tushar B. KuteInstall Drupal in Ubuntu by Tushar B. Kute
Install Drupal in Ubuntu by Tushar B. Kute
Tushar B Kute
 
Install Wordpress in Ubuntu Linux by Tushar B. Kute
Install Wordpress in Ubuntu Linux by Tushar B. KuteInstall Wordpress in Ubuntu Linux by Tushar B. Kute
Install Wordpress in Ubuntu Linux by Tushar B. Kute
Tushar B Kute
 
Share File easily between computers using sftp
Share File easily between computers using sftpShare File easily between computers using sftp
Share File easily between computers using sftp
Tushar B Kute
 
Signal Handling in Linux
Signal Handling in LinuxSignal Handling in Linux
Signal Handling in Linux
Tushar B Kute
 
Implementation of FIFO in Linux
Implementation of FIFO in LinuxImplementation of FIFO in Linux
Implementation of FIFO in Linux
Tushar B Kute
 
Implementation of Pipe in Linux
Implementation of Pipe in LinuxImplementation of Pipe in Linux
Implementation of Pipe in Linux
Tushar B Kute
 
Basic Multithreading using Posix Threads
Basic Multithreading using Posix ThreadsBasic Multithreading using Posix Threads
Basic Multithreading using Posix Threads
Tushar B Kute
 
Part 04 Creating a System Call in Linux
Part 04 Creating a System Call in LinuxPart 04 Creating a System Call in Linux
Part 04 Creating a System Call in Linux
Tushar B Kute
 
Part 03 File System Implementation in Linux
Part 03 File System Implementation in LinuxPart 03 File System Implementation in Linux
Part 03 File System Implementation in Linux
Tushar B Kute
 
Part 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module ProgrammingPart 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module Programming
Tushar B Kute
 
Part 01 Linux Kernel Compilation (Ubuntu)
Part 01 Linux Kernel Compilation (Ubuntu)Part 01 Linux Kernel Compilation (Ubuntu)
Part 01 Linux Kernel Compilation (Ubuntu)
Tushar B Kute
 
Open source applications softwares
Open source applications softwaresOpen source applications softwares
Open source applications softwares
Tushar B Kute
 
Introduction to Ubuntu Edge Operating System (Ubuntu Touch)
Introduction to Ubuntu Edge Operating System (Ubuntu Touch)Introduction to Ubuntu Edge Operating System (Ubuntu Touch)
Introduction to Ubuntu Edge Operating System (Ubuntu Touch)
Tushar B Kute
 
Unit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B Kute
Unit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B KuteUnit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B Kute
Unit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B Kute
Tushar B Kute
 
Technical blog by Engineering Students of Sandip Foundation, itsitrc
Technical blog by Engineering Students of Sandip Foundation, itsitrcTechnical blog by Engineering Students of Sandip Foundation, itsitrc
Technical blog by Engineering Students of Sandip Foundation, itsitrc
Tushar B Kute
 
Chapter 01 Introduction to Java by Tushar B Kute
Chapter 01 Introduction to Java by Tushar B KuteChapter 01 Introduction to Java by Tushar B Kute
Chapter 01 Introduction to Java by Tushar B Kute
Tushar B Kute
 
Chapter 02: Classes Objects and Methods Java by Tushar B Kute
Chapter 02: Classes Objects and Methods Java by Tushar B KuteChapter 02: Classes Objects and Methods Java by Tushar B Kute
Chapter 02: Classes Objects and Methods Java by Tushar B Kute
Tushar B Kute
 

More from Tushar B Kute (20)

Apache Pig: A big data processor
Apache Pig: A big data processorApache Pig: A big data processor
Apache Pig: A big data processor
 
01 Introduction to Android
01 Introduction to Android01 Introduction to Android
01 Introduction to Android
 
Ubuntu OS and it's Flavours
Ubuntu OS and it's FlavoursUbuntu OS and it's Flavours
Ubuntu OS and it's Flavours
 
Install Drupal in Ubuntu by Tushar B. Kute
Install Drupal in Ubuntu by Tushar B. KuteInstall Drupal in Ubuntu by Tushar B. Kute
Install Drupal in Ubuntu by Tushar B. Kute
 
Install Wordpress in Ubuntu Linux by Tushar B. Kute
Install Wordpress in Ubuntu Linux by Tushar B. KuteInstall Wordpress in Ubuntu Linux by Tushar B. Kute
Install Wordpress in Ubuntu Linux by Tushar B. Kute
 
Share File easily between computers using sftp
Share File easily between computers using sftpShare File easily between computers using sftp
Share File easily between computers using sftp
 
Signal Handling in Linux
Signal Handling in LinuxSignal Handling in Linux
Signal Handling in Linux
 
Implementation of FIFO in Linux
Implementation of FIFO in LinuxImplementation of FIFO in Linux
Implementation of FIFO in Linux
 
Implementation of Pipe in Linux
Implementation of Pipe in LinuxImplementation of Pipe in Linux
Implementation of Pipe in Linux
 
Basic Multithreading using Posix Threads
Basic Multithreading using Posix ThreadsBasic Multithreading using Posix Threads
Basic Multithreading using Posix Threads
 
Part 04 Creating a System Call in Linux
Part 04 Creating a System Call in LinuxPart 04 Creating a System Call in Linux
Part 04 Creating a System Call in Linux
 
Part 03 File System Implementation in Linux
Part 03 File System Implementation in LinuxPart 03 File System Implementation in Linux
Part 03 File System Implementation in Linux
 
Part 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module ProgrammingPart 02 Linux Kernel Module Programming
Part 02 Linux Kernel Module Programming
 
Part 01 Linux Kernel Compilation (Ubuntu)
Part 01 Linux Kernel Compilation (Ubuntu)Part 01 Linux Kernel Compilation (Ubuntu)
Part 01 Linux Kernel Compilation (Ubuntu)
 
Open source applications softwares
Open source applications softwaresOpen source applications softwares
Open source applications softwares
 
Introduction to Ubuntu Edge Operating System (Ubuntu Touch)
Introduction to Ubuntu Edge Operating System (Ubuntu Touch)Introduction to Ubuntu Edge Operating System (Ubuntu Touch)
Introduction to Ubuntu Edge Operating System (Ubuntu Touch)
 
Unit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B Kute
Unit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B KuteUnit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B Kute
Unit 6 Operating System TEIT Savitribai Phule Pune University by Tushar B Kute
 
Technical blog by Engineering Students of Sandip Foundation, itsitrc
Technical blog by Engineering Students of Sandip Foundation, itsitrcTechnical blog by Engineering Students of Sandip Foundation, itsitrc
Technical blog by Engineering Students of Sandip Foundation, itsitrc
 
Chapter 01 Introduction to Java by Tushar B Kute
Chapter 01 Introduction to Java by Tushar B KuteChapter 01 Introduction to Java by Tushar B Kute
Chapter 01 Introduction to Java by Tushar B Kute
 
Chapter 02: Classes Objects and Methods Java by Tushar B Kute
Chapter 02: Classes Objects and Methods Java by Tushar B KuteChapter 02: Classes Objects and Methods Java by Tushar B Kute
Chapter 02: Classes Objects and Methods Java by Tushar B Kute
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

MIS 21 Security and Ethical Challenges

  • 1. Management information system Third Year Information Technology Part 21 Security and Ethical Challenges Tushar B Kute, Sandip Institute of Technology and Research Centre, Nashik http://www.tusharkute.com
  • 2. Security and Ethical Challenges Privacy Employment Health Crime Security Ethics and Society Working Conditions Individuality
  • 3. Objective of information security Confidentiality Availability Integrity
  • 4. Computer Crime Hacking Cyber Theft Computer Viruses Unauthorized Use at work Piracy
  • 5. Ethics in information society Responsibility Accepting potential costs, duties and obligations for your decisions. Accountability Determining who should take responsibility for decisions and actions. Liability Legally placing responsibility with a person or group.
  • 6. Fair information practices principles There should be no personal record systems whose existence is secret. Individuals have rights of access, inspection, review and amendment to systems that contain information about them. There must be no use of personal information for purpose other than those for which it was gathered without prior consent.
  • 7. Fair information practices principles Managers of the system are responsible and can be held accountable and liable for the damage done by system for their reliability and security. Government have right to intervene in the information relationship among private parties.
  • 8. Property rights: intellectual property It is result of someone’s effort to create a product of value based on their experience, knowledge and education. In short, intellectual property is brain power. E.g. Copyrights, patents and trade secrets. Accountability, liability and control. Data quality and system errors.
  • 9. Quality of life Online technology lost the face-to-face contact. On-line love affairs. Work from home, impact to the family life.
  • 10. Computer Crime Any wrong doing involves computer and internet usage. Often defies detection The amount stolen or diverted can be substantial The crime is “clean” and nonviolent The number of IT-related security incidents is increasing dramatically Computer crime is now global
  • 11. Management actions: a corporate code of ethics The information rights to privacy and freedom. The property rights to individuals ideas and efforts. The accountability, liability and control issues involved in technology. The system quality requirements of businesses and individuals. The quality of life impact of technology.
  • 12. Cyber crime Conventional crime or an offence is a legal wrong that can be followed by criminal proceedings which may result into punishment. Cyber Crime may be said to be those species where computer is an object or subject of the conduct constitutional crime. Unlawful act wherein the computer is either a tool or target or both.
  • 13. Reasons for cyber crime Capacity to store data in comparatively small space. Easy to access. Complex Negligence. Loss of evidence.
  • 14. Cyber criminals Children and adolescents between the age group of 6 – 18 years. Organized hackers. Professional hackers/crackers. Discontinued employees.
  • 15. Mode and manner of committing crime Denial of Service Scans Sniffer Programs Spoofing Trojan Horse Back Doors Malicious Applets War Dialing Logic Bombs Buffer Overflow Password Crackers Social Engineering Dumpster Driving
  • 16. classification Against individuals Against individual property Against organization Against society at large
  • 17. Against individuals Harassment via emails. Cyber stalking Defamation Email spoofing Cheating and fraud
  • 18. Against individual property Computer vandalism Transmitting viruses. Intellectual property crimes Internet time thefts
  • 19. Against organization Unauthorized access / control. Possession of unauthorized information Distribution of pirated software Cyber terrorism
  • 20. Against society at large Trafficking Financial crimes Polluting youth through indecent exposure Sale of illegal articles Online gambling
  • 21. Statutory provisions Information technology act 2000 forced on 17th May 2000. legalizing- Indian penal code 1860 The Indian evidence act 1872 The banker’s book evidence act 1891 The reserve bank of India act 1934. The IT act deals with the various cyber crimes in chapters IX and XI. The important sections are 43, 65, 66, 67. Section 43 deals particularly with unauthorized access, unauthorized downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person.
  • 22. IT act Section 65- tampering with computer source documents. It provides imprisonment upto 3 years or fine. Section 66- hacking the computer system It provides imprisonment upto 3 years or fine. Section 67- publication of obscene material. It provides imprisonment upto 10 years and fine upto 2 lakhs.
  • 23. Prevention of cyber crime Precaution Prevention Protection Preservation Perseverance
  • 24. Prevention of cyber crime Avoid disclosing any information pertaining oneself. Avoid sending any photographs online, particularly to strangers and chat with strangers. Use latest and updated antivirus. Always keep backup volumes. Never send your credit card number to any site. Always keep watch on the sites that children are accessing. Use security programs for coockies.
  • 25. Prevention of cyber crime Website owners should watch traffic and check any irregularity on the site. Use the firewalls.
  • 26. hacking The process of achieving access to computer or computer network administrator. It is the most common activity amongst teenagers and young adults. It is an offence if hackers steal private information of changes some financial data. All the types of unauthorized access can lead the hacker towards the prison for 20 years.
  • 27. Cyber theft It is the use of computers and communication systems to steal information in electronic format. E.g. bank money transfers. Programs used- worm and trojan horses. Reports- Microsoft platform strategy manager Matthew Hardman said social networking sites like Facebook, are among the most commonly targeted because of their huge communities of user concluding by saying the malicious code may be hidden inside Facebook applications or links under the photographs.
  • 28. Solution of cyber theft Antivirus Anti-spywares Firewalls Cryptography Cyber ethics Cyber laws
  • 29. Software piracy It refers to the unauthorized duplication and use of computer software. According to a survey done jointly by BSA and IDC the highest piracy rate comes from Armenia, with piracy rate of 93%. China and India are at No. 17 and No. 41 respectively, with 82% and 69% of recorded Software Piracy rates. The lowest piracy rate, according to survey, is observed in USA, at 20%. However, the statistics gave rise to a wide criticism citing lack of accuracy.
  • 30. Terms related to piracy Cloning: Ideas can not be copy protected. Crack: modification of software in order to remove encoded copy prevention. Cracker: Undertakes disabling the software protection. Hack: Fix, or bug workaround. Hacker: One, who hacks. Hardware Locking: method of protecting software from duplication by locking the license to specific piece of computer hardware.
  • 31. Terms related to piracy KeyGen or Key Generator: a small program that will generate an unauthorized but working registration key or serial number for the piece of software. Serials: This unique is used to unlock the version of the software. Warez: Another term used for software crack.
  • 32. Software piracy It is illegal to- Use a single licensed version on multiple computer. Preloaded software on computers without providing the appropriate licenses. Use a key generator to generate registration key that turns an evaluation version to licensed version. Use a stolen credit card to fraudulently purchase a software license. Post licensed version of a software product on the Internet and make it available for downloading.
  • 33. Software piracy in India The copyright of computer piracy is protected under the Indian copyright Act of 1957. Copyright protection for software with an individual author lasts for the duration of the author’s life and continues 60 years after the author’s death. According to nasscom, software piracy involves the use of reproduction or distribution without having received the expressed permission of the software author.
  • 34. Forms of software piracy End user piracy. Hard disk loading. Software counterfeiting. Internet piracy.
  • 35. Software copyrights Eligibility: The original software work does not have to be published in order to receive copyright protection. Punishment: Under the Indian copyright act, a software pirate can be tried under both civil and criminal law. The minimum jail term for software copyright infringement is seven days, and maximum is three years. Fine from 50,000 to 2,00,000.
  • 36. copyright It is set of exclusive rights granted by the law of jurisdiction to the author or creator of an original work, including right to copy, distribute and adapt to work. It is applied for specific period of time, after which the work is said to enter in public domain. Copyright infringement is the unauthorized or prohibited use of works under copyright, infringing the copyright owner’s exclusive rights, such as right to reproduce or perform the copyrighted work, or to make derivative work.
  • 37. Copyright acts 1957 India has one of the modern copyright protection laws in the world. "computer programme" means a set of instructions expressed in words, codes, schemes or in any other form, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular result;
  • 38. Exclusive rights given in copyright act To reproduce the work in any material form including the storing of it in any medium by electronic means. To issue copies of the work to the public not being copies already in the circulation. To perform the work in the public or communicate it to the public. To make any cinematographic film or sound recording in respect of work. To make any translation of the work. To make any adaptation of the work. To sell or give on commercial rental or offer for sale or for commercial rental any copy of the program.
  • 40. WIPO copyright treaty The World Intellectual Property Organization Copyright Treaty, abbreviated as the WIPO Copyright Treaty, is an international treaty on copyright law adopted by the member states of the World Intellectual Property Organization (WIPO) in 1996. It provides additional protections for copyright deemed necessary due to advances in information technology since the formation of previous copyright treaties before it.
  • 41. Universal copyright prevention The UCC was developed by United Nations Educational, Scientific and Cultural Organization as an alternative to the Berne Convention for those states which disagreed with aspects of the Berne Convention, but still wished to participate in some form of multilateral copyright protection. These states included developing countries and the Soviet Union, which thought that the strong copyright protections granted by the Berne Convention overly benefited Western developed copyright-exporting nations, and the United States and most of Latin America.
  • 42. patent A patent is a set of exclusive rights granted by a state (national government) to an inventor or their assignee for a limited period of time in exchange for a public disclosure of an invention. Under the World Trade Organization's (WTO) Agreement on Trade-Related Aspects of Intellectual Property Rights, patents should be available in WTO member states for any inventions, in all fields of technology, and the term of protection available should be the minimum twenty years.
  • 43. patents In many countries, certain subject areas such as business methods and mental acts are excluded from patents. The exclusive rights granted to a patentee in most countries is the right to prevent others from making, using, selling or distributing the patented invention without permission.
  • 44. Patents forced in 2000 US Patent
  • 45. Health issues Eye disease Bad postures Hurting Hands Computer stress injuries
  • 50. Computer ergonomics Use a good chair with a dynamic chair back and sit back. The eye-level should be the same as the level of the monitor. You should be able to see the contents in the monitor without bending your neck. No glare on screen, use an optical glass anti-glare filter where needed. Sit at arms length from monitor as a good viewing distance. Feet on floor or stable footrest. Use a document holder, preferably in-line with the computer screen. Wrists flat and straight in relation to forearms to use keyboard/mouse/input device. Arms and elbows relaxed close to body. Top of monitor casing 2-3" (5-8 cm) above eye level. Use a negative tilt keyboard tray with an upper mouse platform or downward tiltable platform adjacent to keyboard. Center monitor and keyboard in front of you. Use a stable work surface and stable (no bounce) keyboard tray.
  • 54. The ACM Code of Professional Conduct Strive to achieve the highest quality, effectiveness, and dignity in both the process and products of professional work Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Accept and provide appropriate professional review Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks
  • 55. The ACM Code of Professional Conduct (continued) Honor contracts, agreements, and assigned responsibilities Improve public understanding of computing and its consequences Access computing and communication resources only when authorized to do so
  • 56. references http://en.wikipedia.org ArpitaGopal, Chandrani Singh, “e-World Emerging Trends in Information Technology” , 1st Edition, Excel Books. http://www.nasscom.in Tushar B Kute, Sandip Institute of Technology and Research Centre, Nashik http://www.tusharkute.com