Date post: | 09-Apr-2018 |
Category: |
Documents |
Upload: | gaurav-gharat |
View: | 217 times |
Download: | 0 times |
of 24
8/8/2019 Ethics and It Raw Ppt
1/24
Ethics is a branch of philosophy that deals with what is considered to be right and
wrong.
The diversity of IT applications and the increased use of the technology have created
many ethical issues.
There are major difference even with companies and individuals with respect to
what is right and wrong.
So also with different countries what is unethical in one culture may be perfectly
acceptable to others.
8/8/2019 Ethics and It Raw Ppt
2/24
ETHICAL ISSUES
1. PRIVACY
2. ACCURACY3. PROPERTY
4. ACCESSIBILITY
FOUR STATES OF PRIVACY ARE:
1. SOLITUDE
2. INTIMACY3. ANONYMITY
4. RESERVE
8/8/2019 Ethics and It Raw Ppt
3/24
SECURITY THREATS:
1. ACCIDENTAL
2. INTENTIONAL
SPECIFIC THREATS:
1. LOSS, THEFT OR CORRUPTION OF DATA
2. INAPPROPRIATE USE OF DATA
3. THEFT OF MAINFRAME COMPUTER CRIME
4. THEFT OF EQUIPMENT AND/OR PROGRAMS5. ERRORS IN HANDLING, ENTERING, PROCESSING, TRANSFERRING OR PROGRAMMING OF DA
6. EQUIPMENT MALFUNCTIONS
7. ACCIDENTAL OR MALICIOUS DAMAGE TO COMPUTER RESOURCES
8. DESTRUCTION FROM VIRUSES AND SIMILAR ATTACKS
8/8/2019 Ethics and It Raw Ppt
4/24
Attacks On Computer Systems
8/8/2019 Ethics and It Raw Ppt
5/24
when some
one rightprog.
Virus
attacks
Transmission
occurs
Undetected
virus
It does it
work
how it spreads????
Computer viruses
8/8/2019 Ethics and It Raw Ppt
6/24
Software Packages
8/8/2019 Ethics and It Raw Ppt
7/24
Information rights and obligations-spell out corporate privacy anddue process policies.
roperty rights and obligation-clarify ho corporation ill treatproperty rights of soft are o ners.
Accountability and control-clarify ho is responsible andaccountable for information.
Main moral dimensions of an information
society
8/8/2019 Ethics and It Raw Ppt
8/24
Ethical analysis as a five-step methodology for
analysing a situation
The method involves:
Identifying the facts
Identifying the values
Identifying the stakeholders
Identifying the options
Consequences of actions
Internet crime and compter abuse:Computer abuse :
It is the commission of act involving a compute that may not be illegal
but are considered unethical.
8/8/2019 Ethics and It Raw Ppt
9/24
Santo polanco, an 18 year old student at the new York instituteof technology and another person(26 year) Eric- Bilej by were
charged in a New York court for allegedly raising at least$16,000 through fraudulent sales at many leading websites
offering computers for auction that was never delivered aftertaking money.
Timothy Lloyed, an ex-computer administrator at omegaengineering at new jersey was charged with planting a
logicbomb that deleted all software programs (30th july 1996).Company suffered $10 million in damages. He also stole about
$ 50,000 of computer equipment .
Hackers are on the rise, posing new threats to
organisations linked to the internet:
8/8/2019 Ethics and It Raw Ppt
10/24
Computer Crime Prevention
Hire Carefully :- The most logical way to prevent them is by
hiring trust worthy people. However would me criminals
cannot be spotted easily at the time of hiring.
Beware ofMalcontents :- Crime experts put at the top oftheir lists is the disgruntled employee. They may steal disks
containing the companys most financial records by using his
after-hours access to a computer installation and locating the
same.
Separate Employee Function :- Crimes are difficult to
commit when some of the people are made to work together.
8/8/2019 Ethics and It Raw Ppt
11/24
The other preventions are:
Restrict system use.
Protect resources with passwords or other authorizations checks.
Conduct frequent audits.
Encrypt data and programmes.
8/8/2019 Ethics and It Raw Ppt
12/24
8/8/2019 Ethics and It Raw Ppt
13/24
8/8/2019 Ethics and It Raw Ppt
14/24
8/8/2019 Ethics and It Raw Ppt
15/24
Computer vision syndrome (CVS) :This eyestraincondition is related to computer display screen usewith symptoms including headaches, blessed vision &
dry, irritated eyes.
Technostress : The incidence of this is growingrapidly. It is the stress induced by computer use,
with symptoms including aggravation, hostility towardhumans, impatience & exervation.
Role of radiation from computer display screens hasnot been proved in occupational disease. Video DisplayTerminals(VDTs) emit nonionising electric & magnetic
fields at low frequencies, rays of which enter thebody & have unknown effects on enzymes,molecules.
8/8/2019 Ethics and It Raw Ppt
16/24
8/8/2019 Ethics and It Raw Ppt
17/24
How to tackle it????
JONATHAN FERNANDES
TYBMS ROLL NO: 308
8/8/2019 Ethics and It Raw Ppt
18/24
The main reason for spying is that the users are not trained
properly in security.
Only the system admin or IT manager is aware of security.
Corporates are regularly penetrated by script kiddies andeven by hackerssometimes from the organized crime circle.
Eg.) In 1999, Net Bus was used to discredita law student studying at the LundUniversity in Sweden. Child pornography wasuploaded onto his computer from anunidentified location. He was later acquitted ofcharges in 2004 when it was discoveredthat Net Bus had been used to control hiscomputer.
The information taken can the be sold for money.
There are various means of compromising thesecurity either by technology or Social Engineering.
8/8/2019 Ethics and It Raw Ppt
19/24
8/8/2019 Ethics and It Raw Ppt
20/24
If a mail is received with an attachment thefollowing procedure must be carried out. Download it on the computer(dont open)
Right click on it .see properties
If the file is marked as an application it can be(a Trojan, virus, or worm)
Dont open it.delete the file immediatelySuch mails can be in the foll. Formats such as
(.src, .exe, .pif, .sys or even document.doc.exe)
8/8/2019 Ethics and It Raw Ppt
21/24
Spoofing/Phishing is fakingan E-mail address or webpage to trick users into
passing critical informationlike password or credit cardnumber.
8/8/2019 Ethics and It Raw Ppt
22/24
An ethical hacker is a computer andnetwork expert who attacks asecurity system on behalf of itsowners, seeking vulnerabilities that amalicious hacker could exploit.
Ethical hackers use the samemethods as their less principled
counterparts, but report problemsinstead of taking advantage of them.An ethical hacker is sometimes called a whitehat, a term that comes from old Western
movies, where the "good guy" wore a whitehat and the "bad guy" wore a black hat.
Who is an Ethical
Hacker???
8/8/2019 Ethics and It Raw Ppt
23/24
India's famous ethical hacker is Ankit Fadia.
He was rejected at first to attend the hack 2003 conferencebecause he was considered too young to speak on thesubject.
He is the author of various books on network security such as,the unofficial guide to ethical hacking and network security: ahackers perspective
He is also protecting Indian websites from Pakistani based webattackers.
8/8/2019 Ethics and It Raw Ppt
24/24
Criminal are now getting smarter andsmarter.
The police say that one woman who wasfrom a gang of car thieves was sostylishly dressed that no one stoppedher when she got into a car, it was onlywhen the owner shouted did peoplerealize that his car had been stolen.
Here is a small video to help us understandthe new age criminal in our context.