SlideShare a Scribd company logo
The Downfall to Computers in the 21st Century By: Pedro Teran, Grace Stearns and Oriana Campbell CAT 531
Computer Fraud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Fraud Continued... ,[object Object],[object Object],[object Object]
Computer Fraud Continued... ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Continued... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright Continued... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Individual Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Individual privacy continued... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Viruses  What is a virus? Viruses are created when a programer crates a program to infect a disk or a computer, this program has the ability to relplicate itself. Viruses watch for a certain event to occur or deliver a destructive payload.   What viruses infect... Viruses start running until they are operated by the user. Viruses can infect several components od a computer like: Files, Companion Files, Macros, Disk Clusters, Batch Files, Source Code, Visual Basic Worms.    
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dangers in New Technologies ,[object Object],[object Object],[object Object],[object Object]
Dangers in New Technologies cont... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
Safe Computing
Safe ComputingSafe Computing
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
Johnlery Guzman
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
ICCT foundation inc
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
Module vi mis
Module vi misModule vi mis
Module vi mis
Arnav Chowdhury
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
Conor O'Neill
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
Juan Miguel Palero
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 

What's hot (19)

Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Forrester Automation Redefining Marketings Game Plan
Forrester Automation Redefining Marketings Game PlanForrester Automation Redefining Marketings Game Plan
Forrester Automation Redefining Marketings Game Plan
zdyer1
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
Esther eta alba oporrak
Esther eta alba oporrakEsther eta alba oporrak
Esther eta alba oporrakAlbaEsther
 
CV_Muhammad_Saey_Consultant
CV_Muhammad_Saey_ConsultantCV_Muhammad_Saey_Consultant
CV_Muhammad_Saey_Consultant
Muhammad Saei
 
الذبح طبقا للشريعة الإسلامية
الذبح طبقا للشريعة الإسلاميةالذبح طبقا للشريعة الإسلامية
الذبح طبقا للشريعة الإسلامية
Muhammad Saei
 

Viewers also liked (6)

Forrester Automation Redefining Marketings Game Plan
Forrester Automation Redefining Marketings Game PlanForrester Automation Redefining Marketings Game Plan
Forrester Automation Redefining Marketings Game Plan
 
Aardvarks
AardvarksAardvarks
Aardvarks
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
Esther eta alba oporrak
Esther eta alba oporrakEsther eta alba oporrak
Esther eta alba oporrak
 
CV_Muhammad_Saey_Consultant
CV_Muhammad_Saey_ConsultantCV_Muhammad_Saey_Consultant
CV_Muhammad_Saey_Consultant
 
الذبح طبقا للشريعة الإسلامية
الذبح طبقا للشريعة الإسلاميةالذبح طبقا للشريعة الإسلامية
الذبح طبقا للشريعة الإسلامية
 

Similar to The downfall to_computers_in_the_21st_century

Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
RitikaSharma238
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 

Similar to The downfall to_computers_in_the_21st_century (20)

Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Users guide
Users guideUsers guide
Users guide
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 

The downfall to_computers_in_the_21st_century

  • 1. The Downfall to Computers in the 21st Century By: Pedro Teran, Grace Stearns and Oriana Campbell CAT 531
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Computer Viruses What is a virus? Viruses are created when a programer crates a program to infect a disk or a computer, this program has the ability to relplicate itself. Viruses watch for a certain event to occur or deliver a destructive payload.   What viruses infect... Viruses start running until they are operated by the user. Viruses can infect several components od a computer like: Files, Companion Files, Macros, Disk Clusters, Batch Files, Source Code, Visual Basic Worms.    
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.