SlideShare a Scribd company logo
1 of 27
Ethics 
• Derived from the Greek word “ethos”, which 
means “custom”, “habit”, and “way of living” 
• Definition: "the discipline and practice of 
applying value to human behavior, 
resulting in meaningful conduct.“
Cont………. 
• Professional Ethics: concerns one's conduct of 
behavior and practice when carrying out professional 
work, e.g., consulting, researching, teaching and 
writing. 
• A computing professional must understand 
– Cultural, social, legal, and ethical issues in computing. 
– Responsibility and possible consequences of failure.
Computer Ethics 
• Computer ethics defined as the application of classical 
ethical principles to the use of computer technology. 
• Ethical problems related to computers: 
– Privacy 
• Computers create a false sense of security 
• People do not realize how vulnerable information 
stored on computers are 
– Property 
• Physical property 
• Intellectual property (in both copyright and patent) 
• Data as property
• Access 
– Access to computing technology 
– Access to data 
• Accuracy 
– Accuracy of information stored 
• Hacking, cracking and virus creation 
• Software piracy
Ethical 
dilemmas 
in IT 
Ethical 
dilemmas 
in IT 
PPrrivivaaccyy 
Degree of privacy and 
dissemination of 
information about 
individual. 
AAcccceessssibibiliiltityy 
AAccccuurraaccyy 
PPrrooppeerrttyy 
Involves right of 
accessing the required 
info. As well as true 
payment of charges to 
access the information 
The information which 
is viable and being 
accessed is now much 
more accurate 
&authenticate. 
Talks about 
ownership & 
value of 
information.
The Ten Commandments of computer ethics 
have been defined by the Computer Ethics 
Institute. 
• 1) One should not use a computer to harm 
other people. 
• 2) One should not interfere with other 
people's computer work. 
• 3) One should not snoop around in other 
people's files. 
• 4) One should not use a computer to steal. 
• 5) One should not use a computer to bear 
false witness.
• 6) One should not use or copy software for 
which you have not paid. 
• 7) One should not use other people's 
computer resources without authorization. 
• 8) One should not distribute other people's 
intellectual output; without permit. 
• 9) One should think about the social 
consequences of the program you write. 
• 10) One should use a computer in ways that 
show consideration and respect.
Some threats to information system are:- 
• Computer Abuses:- hacking Id & sending mail 
through hacked id. 
• Computer crime:-Hacking &theft 
• Theft of equipment 
• Theft of data 
• Equipment malfunctions:- virus in excel sheet 
• Environmental hazards 
• Destruction from viruses 
• Errors in handling & usage of data.
Computer Virus
What is Computer Virus? 
• Computer viruses are small software programs that 
are designed to spread from one computer to another 
and to interfere with computer operation.
Spreading of Virus 
• Virus are most easily spread, 
• Spread through E-mail Attachments, 
– Instant Messaging messages, 
– Funny Images, 
– Audio and Videos files, 
– Downloading files from Internet, 
– Greeting cards and many more.
Steps to help avoid Viruses 
• Use an Internet firewall, 
• Subscribe to 
industry standard antivirus software, 
• Never open an e-mail attachment from 
someone you don't know, 
• Scan each and every attachment, 
• Rules to be followed, while surfing net
Software piracy and Hacking
What is PIRACY??????? 
Reselling Media 
 Downloading from a website 
 Taping songs 
Buying a used book or CD 
Watching broadcast television but skipping 
commercials
Types of PIRACY 
End User Piracy 
Client – Server Piracy 
Internet Piracy 
Hard-Disk Piracy 
Software Counterfeiting
End-User Piracy 
• This occurs when a company employee 
reproduces copies of software without 
authorization 
 Copying disk for installation and 
distribution 
Swapping disks in or outside the 
workplace
Client-Server Piracy 
• This type of piracy occurs when too many 
employees on a network are using a central 
copy of a program at the same time. 
 System Overuse
Internet Piracy 
• This occurs when software is downloaded 
from the Internet The same purchasing 
rules should apply to online software 
purchase as for those bought in traditional 
ways. 
Pirate website 
Unauthorized transfer of 
copyrighted program
Hard-Disk Loading 
• This occurs when a business who sells new 
computers loads illegal copies of software 
onto the hard disks to make the purchase of 
the machines more attractive. 
Value Added Resellers (VAR)
Software Counterfeiting 
• This type of piracy is the illegal 
duplication and sale of copyrighted 
material with the intent of directly 
imitating the copyrighted product .
HACKER 
• Some one who bypasses the system’s access 
controls by taking advantage of security 
weaknesses left in the system by 
developers .
What HACKER do??????? 
• SYSTEM 
Access confidential information 
Threaten someone from YOUR computer 
Broadcast your confidential letters or materials . 
Store illegal material
Evils of Hacking 
• Compromise the security of system without permission 
from an authorized party, usually with the intent of 
accessing computers connected to the network.
Advantage of Ethical Hacking 
• To determine problem and weakness for program 
• Creation of firewall 
• Useful for military purpose 
• Better computer security
BY-TUSHAR 
SINGH 
JATIN UPPAL 
BEVAN GIDEON 
NIKHIL SHARMA

More Related Content

What's hot

Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPTNitesh Dubey
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 

What's hot (20)

Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Data security
Data securityData security
Data security
 
It Policies
It PoliciesIt Policies
It Policies
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
IT security
IT securityIT security
IT security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network Security
Network SecurityNetwork Security
Network Security
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Data security
Data securityData security
Data security
 

Similar to Ethics and Computer Ethics: Privacy, Property, Access, Accuracy

Similar to Ethics and Computer Ethics: Privacy, Property, Access, Accuracy (20)

Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

Ethics and Computer Ethics: Privacy, Property, Access, Accuracy

  • 1.
  • 2. Ethics • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“
  • 3. Cont………. • Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing. • A computing professional must understand – Cultural, social, legal, and ethical issues in computing. – Responsibility and possible consequences of failure.
  • 4. Computer Ethics • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy • Computers create a false sense of security • People do not realize how vulnerable information stored on computers are – Property • Physical property • Intellectual property (in both copyright and patent) • Data as property
  • 5. • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy
  • 6. Ethical dilemmas in IT Ethical dilemmas in IT PPrrivivaaccyy Degree of privacy and dissemination of information about individual. AAcccceessssibibiliiltityy AAccccuurraaccyy PPrrooppeerrttyy Involves right of accessing the required info. As well as true payment of charges to access the information The information which is viable and being accessed is now much more accurate &authenticate. Talks about ownership & value of information.
  • 7. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. • 1) One should not use a computer to harm other people. • 2) One should not interfere with other people's computer work. • 3) One should not snoop around in other people's files. • 4) One should not use a computer to steal. • 5) One should not use a computer to bear false witness.
  • 8. • 6) One should not use or copy software for which you have not paid. • 7) One should not use other people's computer resources without authorization. • 8) One should not distribute other people's intellectual output; without permit. • 9) One should think about the social consequences of the program you write. • 10) One should use a computer in ways that show consideration and respect.
  • 9. Some threats to information system are:- • Computer Abuses:- hacking Id & sending mail through hacked id. • Computer crime:-Hacking &theft • Theft of equipment • Theft of data • Equipment malfunctions:- virus in excel sheet • Environmental hazards • Destruction from viruses • Errors in handling & usage of data.
  • 11. What is Computer Virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 12. Spreading of Virus • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more.
  • 13. Steps to help avoid Viruses • Use an Internet firewall, • Subscribe to industry standard antivirus software, • Never open an e-mail attachment from someone you don't know, • Scan each and every attachment, • Rules to be followed, while surfing net
  • 15. What is PIRACY??????? Reselling Media  Downloading from a website  Taping songs Buying a used book or CD Watching broadcast television but skipping commercials
  • 16. Types of PIRACY End User Piracy Client – Server Piracy Internet Piracy Hard-Disk Piracy Software Counterfeiting
  • 17. End-User Piracy • This occurs when a company employee reproduces copies of software without authorization  Copying disk for installation and distribution Swapping disks in or outside the workplace
  • 18. Client-Server Piracy • This type of piracy occurs when too many employees on a network are using a central copy of a program at the same time.  System Overuse
  • 19. Internet Piracy • This occurs when software is downloaded from the Internet The same purchasing rules should apply to online software purchase as for those bought in traditional ways. Pirate website Unauthorized transfer of copyrighted program
  • 20. Hard-Disk Loading • This occurs when a business who sells new computers loads illegal copies of software onto the hard disks to make the purchase of the machines more attractive. Value Added Resellers (VAR)
  • 21. Software Counterfeiting • This type of piracy is the illegal duplication and sale of copyrighted material with the intent of directly imitating the copyrighted product .
  • 22. HACKER • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers .
  • 23. What HACKER do??????? • SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material
  • 24. Evils of Hacking • Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network.
  • 25. Advantage of Ethical Hacking • To determine problem and weakness for program • Creation of firewall • Useful for military purpose • Better computer security
  • 26.
  • 27. BY-TUSHAR SINGH JATIN UPPAL BEVAN GIDEON NIKHIL SHARMA

Editor's Notes

  1. The secut