+ All Categories
Home > Documents > Ethics and It Raw Ppt

Ethics and It Raw Ppt

Date post: 09-Apr-2018
Category:
Upload: gaurav-gharat
View: 217 times
Download: 0 times
Share this document with a friend

of 24

Transcript
  • 8/8/2019 Ethics and It Raw Ppt

    1/24

    Ethics is a branch of philosophy that deals with what is considered to be right and

    wrong.

    The diversity of IT applications and the increased use of the technology have created

    many ethical issues.

    There are major difference even with companies and individuals with respect to

    what is right and wrong.

    So also with different countries what is unethical in one culture may be perfectly

    acceptable to others.

  • 8/8/2019 Ethics and It Raw Ppt

    2/24

    ETHICAL ISSUES

    1. PRIVACY

    2. ACCURACY3. PROPERTY

    4. ACCESSIBILITY

    FOUR STATES OF PRIVACY ARE:

    1. SOLITUDE

    2. INTIMACY3. ANONYMITY

    4. RESERVE

  • 8/8/2019 Ethics and It Raw Ppt

    3/24

    SECURITY THREATS:

    1. ACCIDENTAL

    2. INTENTIONAL

    SPECIFIC THREATS:

    1. LOSS, THEFT OR CORRUPTION OF DATA

    2. INAPPROPRIATE USE OF DATA

    3. THEFT OF MAINFRAME COMPUTER CRIME

    4. THEFT OF EQUIPMENT AND/OR PROGRAMS5. ERRORS IN HANDLING, ENTERING, PROCESSING, TRANSFERRING OR PROGRAMMING OF DA

    6. EQUIPMENT MALFUNCTIONS

    7. ACCIDENTAL OR MALICIOUS DAMAGE TO COMPUTER RESOURCES

    8. DESTRUCTION FROM VIRUSES AND SIMILAR ATTACKS

  • 8/8/2019 Ethics and It Raw Ppt

    4/24

    Attacks On Computer Systems

  • 8/8/2019 Ethics and It Raw Ppt

    5/24

    when some

    one rightprog.

    Virus

    attacks

    Transmission

    occurs

    Undetected

    virus

    It does it

    work

    how it spreads????

    Computer viruses

  • 8/8/2019 Ethics and It Raw Ppt

    6/24

    Software Packages

  • 8/8/2019 Ethics and It Raw Ppt

    7/24

    Information rights and obligations-spell out corporate privacy anddue process policies.

    roperty rights and obligation-clarify ho corporation ill treatproperty rights of soft are o ners.

    Accountability and control-clarify ho is responsible andaccountable for information.

    Main moral dimensions of an information

    society

  • 8/8/2019 Ethics and It Raw Ppt

    8/24

    Ethical analysis as a five-step methodology for

    analysing a situation

    The method involves:

    Identifying the facts

    Identifying the values

    Identifying the stakeholders

    Identifying the options

    Consequences of actions

    Internet crime and compter abuse:Computer abuse :

    It is the commission of act involving a compute that may not be illegal

    but are considered unethical.

  • 8/8/2019 Ethics and It Raw Ppt

    9/24

    Santo polanco, an 18 year old student at the new York instituteof technology and another person(26 year) Eric- Bilej by were

    charged in a New York court for allegedly raising at least$16,000 through fraudulent sales at many leading websites

    offering computers for auction that was never delivered aftertaking money.

    Timothy Lloyed, an ex-computer administrator at omegaengineering at new jersey was charged with planting a

    logicbomb that deleted all software programs (30th july 1996).Company suffered $10 million in damages. He also stole about

    $ 50,000 of computer equipment .

    Hackers are on the rise, posing new threats to

    organisations linked to the internet:

  • 8/8/2019 Ethics and It Raw Ppt

    10/24

    Computer Crime Prevention

    Hire Carefully :- The most logical way to prevent them is by

    hiring trust worthy people. However would me criminals

    cannot be spotted easily at the time of hiring.

    Beware ofMalcontents :- Crime experts put at the top oftheir lists is the disgruntled employee. They may steal disks

    containing the companys most financial records by using his

    after-hours access to a computer installation and locating the

    same.

    Separate Employee Function :- Crimes are difficult to

    commit when some of the people are made to work together.

  • 8/8/2019 Ethics and It Raw Ppt

    11/24

    The other preventions are:

    Restrict system use.

    Protect resources with passwords or other authorizations checks.

    Conduct frequent audits.

    Encrypt data and programmes.

  • 8/8/2019 Ethics and It Raw Ppt

    12/24

  • 8/8/2019 Ethics and It Raw Ppt

    13/24

  • 8/8/2019 Ethics and It Raw Ppt

    14/24

  • 8/8/2019 Ethics and It Raw Ppt

    15/24

    Computer vision syndrome (CVS) :This eyestraincondition is related to computer display screen usewith symptoms including headaches, blessed vision &

    dry, irritated eyes.

    Technostress : The incidence of this is growingrapidly. It is the stress induced by computer use,

    with symptoms including aggravation, hostility towardhumans, impatience & exervation.

    Role of radiation from computer display screens hasnot been proved in occupational disease. Video DisplayTerminals(VDTs) emit nonionising electric & magnetic

    fields at low frequencies, rays of which enter thebody & have unknown effects on enzymes,molecules.

  • 8/8/2019 Ethics and It Raw Ppt

    16/24

  • 8/8/2019 Ethics and It Raw Ppt

    17/24

    How to tackle it????

    JONATHAN FERNANDES

    TYBMS ROLL NO: 308

  • 8/8/2019 Ethics and It Raw Ppt

    18/24

    The main reason for spying is that the users are not trained

    properly in security.

    Only the system admin or IT manager is aware of security.

    Corporates are regularly penetrated by script kiddies andeven by hackerssometimes from the organized crime circle.

    Eg.) In 1999, Net Bus was used to discredita law student studying at the LundUniversity in Sweden. Child pornography wasuploaded onto his computer from anunidentified location. He was later acquitted ofcharges in 2004 when it was discoveredthat Net Bus had been used to control hiscomputer.

    The information taken can the be sold for money.

    There are various means of compromising thesecurity either by technology or Social Engineering.

  • 8/8/2019 Ethics and It Raw Ppt

    19/24

  • 8/8/2019 Ethics and It Raw Ppt

    20/24

    If a mail is received with an attachment thefollowing procedure must be carried out. Download it on the computer(dont open)

    Right click on it .see properties

    If the file is marked as an application it can be(a Trojan, virus, or worm)

    Dont open it.delete the file immediatelySuch mails can be in the foll. Formats such as

    (.src, .exe, .pif, .sys or even document.doc.exe)

  • 8/8/2019 Ethics and It Raw Ppt

    21/24

    Spoofing/Phishing is fakingan E-mail address or webpage to trick users into

    passing critical informationlike password or credit cardnumber.

  • 8/8/2019 Ethics and It Raw Ppt

    22/24

    An ethical hacker is a computer andnetwork expert who attacks asecurity system on behalf of itsowners, seeking vulnerabilities that amalicious hacker could exploit.

    Ethical hackers use the samemethods as their less principled

    counterparts, but report problemsinstead of taking advantage of them.An ethical hacker is sometimes called a whitehat, a term that comes from old Western

    movies, where the "good guy" wore a whitehat and the "bad guy" wore a black hat.

    Who is an Ethical

    Hacker???

  • 8/8/2019 Ethics and It Raw Ppt

    23/24

    India's famous ethical hacker is Ankit Fadia.

    He was rejected at first to attend the hack 2003 conferencebecause he was considered too young to speak on thesubject.

    He is the author of various books on network security such as,the unofficial guide to ethical hacking and network security: ahackers perspective

    He is also protecting Indian websites from Pakistani based webattackers.

  • 8/8/2019 Ethics and It Raw Ppt

    24/24

    Criminal are now getting smarter andsmarter.

    The police say that one woman who wasfrom a gang of car thieves was sostylishly dressed that no one stoppedher when she got into a car, it was onlywhen the owner shouted did peoplerealize that his car had been stolen.

    Here is a small video to help us understandthe new age criminal in our context.


Recommended