SlideShare una empresa de Scribd logo
1 de 16
Module 8
Security and Ethical
    Challenges
Ethics
• It is a set of principles prescribing a behaviour
  code, explains what is good and right and
  wrong
• It outlines moral duties and obligations
• Business Ethics are concerned with moral
  issues in business just like medical ethics in
  medical practice
Computer Crime/ Cyber Crime
• It is defined by the Association of Information
  Technology Professionals (AITP) as:
  1. The unauthorized use , access modification and
     destruction of hardware, software, data or
     network resources
  2. Unauthorized release of information
  3. Unauthorized copying of software
  4. Denying end user access to his own hardware,
     software, data and network resources
  5. Using or conspiring to use computer to obtain
     intangible property illegally
Computer Crime/ Cyber Crime
• It is caused by the criminal or irresponsible
  actions of individuals who are taking
  advantage of the widespread use and
  vulnerability of computers and internet
• It poses serious threat to the integrity, safety
  and survival of most business systems
Hacking and Cracking
• Hacking- It is the obsessive use of computers or the
  unauthorized access and use of networked
  computer systems
• Hacker can be outsider or company employee
• Commits only electronic breaking and entering, that
  is, gets access to a computer system and read some
  files but neither steals nor damages anything
• Can monitor e-mail, web server access or files
  transfers to extract passwords, steal network files or
  plant data that will cause a system to welcome
  intruders
Common Hacking Tactics
1. Denial of service
2. Scans
3. Sniffer
4. Spoofing
5. Trojan horse
6. Back doors
7. Malicious applets
8. War dialing
9. Logic bombs
10.Buffer overflow
11.Password crackers
12.Social engineering
13.Dumpster diving
Cracking
• Cracker refers to people who attempt to gain
  unauthorized access to computer systems
• Maintains knowledge of the vulnerabilities
  and exploits them for private advantage, not
  revealing either to general public or the
  manufacturer for correction
Cyber Theft
• Computer crimes leading to theft of money
• Insiders involve unauthorized network entry
  and fraudulent alteration of computer
  databases
• Early e.g. was the theft of $ 11 million from
  Citibank in 1994
Unauthorized Use at Work
• Can also be called time and resource theft
• Network monitoring software, called sniffers,
  is frequently used to monitor network traffic
  to evaluate network capacity, as well as to
  reveal evidences of improper use
Software Piracy
• Unauthorized copying of software is a major
  form of SW theft
• Unauthorized copying is illegal as SW is
  intellectual property protected by copying
  right law and user licensing agreements
Theft of Intellectual Property
• Occurs in the form of infringements of
  copyrighted material, such as music, videos,
  images, articles, books
Privacy Issues
• Accessing private e-mail conversations and
  computer records and collecting and sharing
  information about individuals gained from their
  visits to Internet Web sites and newsgroups
• Always knowing where the person is
• Using customer information gained from many
  sources to market additional business services
• Collecting telephone numbers, e-mail addresses,
  credit card numbers and other personal
  information to build individual customer profiles
  (unauthorised personal profile)
Privacy on the Internet
• E-mail, chat and newsgroups are still a wide
  open unsecured electronic frontier
• Beware of
  – Collection of data about you without your
    knowledge
Cyber Law
• It is a term used to describe laws intended to
  regulate activities over the internet or via the
  use of electronic data communication
• It encompasses wide variety of legal and
  political issues related to internet and other
  communication technologies including
  Intellectual Property, privacy, freedom of
  expression and jurisdiction
Challenges
1.   Employment challenges
2.   Computer monitoring
3.   Challenges in working conditions
4.   Challenges to individuality
5.   Health issues
6.   Ergonomics
Thank you

Más contenido relacionado

La actualidad más candente

Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsDaksh Verma
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 

La actualidad más candente (20)

Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
 
Hacking
Hacking Hacking
Hacking
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Chapter11
Chapter11Chapter11
Chapter11
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

Destacado

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
 
Ethical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyEthical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyInternet Law Center
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...RSD Relating Systems Thinking and Design
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 

Destacado (16)

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
Ethical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet PolicyEthical and Privacy Challenges in Internet Policy
Ethical and Privacy Challenges in Internet Policy
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
Eleonora Fiore: Ethical challenges of the Internet of Things in the household...
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Form, Meaning and Design
Form, Meaning and DesignForm, Meaning and Design
Form, Meaning and Design
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 

Similar a Module 8 security and ethical challenges

Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptxMuruganS82
 

Similar a Module 8 security and ethical challenges (20)

Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 

Último

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Último (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Module 8 security and ethical challenges

  • 1. Module 8 Security and Ethical Challenges
  • 2. Ethics • It is a set of principles prescribing a behaviour code, explains what is good and right and wrong • It outlines moral duties and obligations • Business Ethics are concerned with moral issues in business just like medical ethics in medical practice
  • 3. Computer Crime/ Cyber Crime • It is defined by the Association of Information Technology Professionals (AITP) as: 1. The unauthorized use , access modification and destruction of hardware, software, data or network resources 2. Unauthorized release of information 3. Unauthorized copying of software 4. Denying end user access to his own hardware, software, data and network resources 5. Using or conspiring to use computer to obtain intangible property illegally
  • 4. Computer Crime/ Cyber Crime • It is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and internet • It poses serious threat to the integrity, safety and survival of most business systems
  • 5. Hacking and Cracking • Hacking- It is the obsessive use of computers or the unauthorized access and use of networked computer systems • Hacker can be outsider or company employee • Commits only electronic breaking and entering, that is, gets access to a computer system and read some files but neither steals nor damages anything • Can monitor e-mail, web server access or files transfers to extract passwords, steal network files or plant data that will cause a system to welcome intruders
  • 6. Common Hacking Tactics 1. Denial of service 2. Scans 3. Sniffer 4. Spoofing 5. Trojan horse 6. Back doors 7. Malicious applets 8. War dialing 9. Logic bombs 10.Buffer overflow 11.Password crackers 12.Social engineering 13.Dumpster diving
  • 7. Cracking • Cracker refers to people who attempt to gain unauthorized access to computer systems • Maintains knowledge of the vulnerabilities and exploits them for private advantage, not revealing either to general public or the manufacturer for correction
  • 8. Cyber Theft • Computer crimes leading to theft of money • Insiders involve unauthorized network entry and fraudulent alteration of computer databases • Early e.g. was the theft of $ 11 million from Citibank in 1994
  • 9. Unauthorized Use at Work • Can also be called time and resource theft • Network monitoring software, called sniffers, is frequently used to monitor network traffic to evaluate network capacity, as well as to reveal evidences of improper use
  • 10. Software Piracy • Unauthorized copying of software is a major form of SW theft • Unauthorized copying is illegal as SW is intellectual property protected by copying right law and user licensing agreements
  • 11. Theft of Intellectual Property • Occurs in the form of infringements of copyrighted material, such as music, videos, images, articles, books
  • 12. Privacy Issues • Accessing private e-mail conversations and computer records and collecting and sharing information about individuals gained from their visits to Internet Web sites and newsgroups • Always knowing where the person is • Using customer information gained from many sources to market additional business services • Collecting telephone numbers, e-mail addresses, credit card numbers and other personal information to build individual customer profiles (unauthorised personal profile)
  • 13. Privacy on the Internet • E-mail, chat and newsgroups are still a wide open unsecured electronic frontier • Beware of – Collection of data about you without your knowledge
  • 14. Cyber Law • It is a term used to describe laws intended to regulate activities over the internet or via the use of electronic data communication • It encompasses wide variety of legal and political issues related to internet and other communication technologies including Intellectual Property, privacy, freedom of expression and jurisdiction
  • 15. Challenges 1. Employment challenges 2. Computer monitoring 3. Challenges in working conditions 4. Challenges to individuality 5. Health issues 6. Ergonomics

Notas del editor

  1. O Brien Pg 665
  2. O Brien Pg 671Computer programs are valuable property and thus the subject of theft from computer systems
  3. O Brien Pg 677
  4. O Brien Pg 682