Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Presentation 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

NAME-MOHNISH SHARMA

Class- 9 C2

Roll No.- 25
INTRODUCTION OF THE TOPIC
Computer ethics is a part of practical philosophy concerned with
how computing professionals should make decisions regarding
professional and social conduct. It is the set of commonly agreed
principles that govern the use of computers. Like ethics more
generally, computer ethics is essentially a set of philosophical
guidelines or moral standards that aim to influence behaviour and
prevent harm.
There are a number of ethical concerns that have arisen within
computing and information technology (IT), particularly following
the rise of the internet, social media, artificial intelligence and
advanced machine learning algorithms.
INTELLECTUAL PROPERTY
Intellectual Property refers to the objects that are
created from an individual mind or a group of
minds,Intellectual Property Rights grant various exclusive
rights to the rightful owner of a variety of creations like
musical, artistic and literary assets. This rights are not
only limited to the inventions but they can also be applied
to new discoveries. Some examples of intellectual
property are as follows:
1. Scientific Inventions such as a theory,
discovery, invention, etc.
2. Misical Work such aschyrics, tumek, vtc
Literary and Artiste Works such as a book,
painting, etc.
INTELLECTUAL PROPERTY RIGHTS
1. Patents:This means only the owner or the innovator has the sole right to
produce, use or sell the item at least for fina 5 years before others could
start manufacturing it. This right is also valid for computer software.
2. Trademarks: Trademarks are visuals such as symbols, designs or written
matter such as words or phrases orsoftwareeven sound that identites or
separates the items or services of one company from another
company.Thosevisuals or written matter cannot be used by anyother
company.
3. Copyright: Copyright is used for protecting different literary work such as
different codes of computer programs,databases, novels, poems, musical
compositions, etc. Due to this law, the work of autfiors, musicians last for
PROTECTION OF INDIVIDUAL’S
RIGHT TO PRIVACY
The word privacy means to be free of any public attention, In other words, that person has all the
rights to keep his or her decisions or actions free of any public attention or influence.
Data Privacy
Data Privacy is an area of data security that mostly deals with the handling of sensitive data such
as personal, financial or intellectual data. These days, information technology has developed so
much that we can now do almost anything from the comfort of our homes.While surfing the
Internet, one must be very careful of the various acts that break the privacy act. Some of these
acts are:
1 Accessing the personal details of some other person such as passwords, etc.
2. Stealing the financial information of others.
DATA PROTECTION ON THE
INTERNET
Data Protection on the internet Internet is a lead computer network which connectx different
computers across the Earth. Using the differentfalities of the internet, we can do many things. Some
of them are as follows:
1.Online Business thing internet, we can buy or sell almost anything
2. Online transaction directly from the bank
3. Play Online games
4. Search and share any type of information on any topic Access to the latest news
5. Send and receive messages, pictures and files by using different social networking sites blog
and emails
SOFTWARE PIRACY
Software piracy refers to the act of copying genuine software and selling their legal
copies Mostly software companies produce software which are designed for a
single user. These software are then cracked and sold in aftermarket illegally. Which
as a major concern as the people developing the software are not getting the
paymentthey deserve for their hardwork.
TYPES OF SOFTWARE PIRACY

Software piracy is of many kinds. Let us take a look at them.a.


1. Counterfeiting: When there is illegal duplication, distribution or sale of copyrighted material with
the intent ofmitating the copyrighted product, then it is known as Counterfeiting of Software.
2. Internet Piracy: We can download the legal software from Internet, but there are also some
websites from where can get them free or in exchange of some other legal software. This kind of
transaction is called InternetPiracy
3. End User Piracy: If a legal user breaks the copyright rules and makes copies of the software
without authorization, then it is called end user piracy.
4. Hard-Disk Loading: Somemmes while selling a new computer, the vendor antal the copies of the
softwar the hard disk which makes the purchase more lucrative
CYBERCRIME
CYBERRIME
Any crime that is door through Internet and by using Computer/Mobile/Laptop and software is known
as Cybercrime. This type of crime can be done from any location even from remote areas without
being presentthe crime areaThese types of comes can be done against Individuals, Corporates, Bank
even against Government of differentGuntries. Thus, the criminals involved in Cybercrime knows no
borders, either physical or virtual, cause seriousharm and pose very real threats to victims
worldvideThese types of crime involve illegal copying of software, injecting computer virus in others
computer, steal sformation from other computer hardware slach as personal details bank details,
confidential information from government and corporate servers etc.
COMMON TYPES OF CYBERCRIME
These days cybercrime is a very common phenomenon. Let us take a look at some of the most
commoncybercrime:
1. Phishing: are also known as Spam where email messages are wnd to different people to get
personal information.
2. Hacking: It refers to getting illegal access to someone's computer with the intent of stealing
sensitive data o causing damage.
3. Cyber terrorism: Spreading hate messages against other communities and inciting terrorism using a
computer network.
4. Cyber abuse: This is a way of abusing a person by hurting their integrity using the internet
HACKING IS THE ACT OF IDENTIFYING AND THEN
EXPLOITING WEAKNESSES IN A COMPUTER SYSTEM
OR NETWORK, USUALLY TO GAIN UNAUTHORIZED
ACCESS TO PERSONAL OR ORGANIZATIONAL
DATA.HACKING IS NOT ALWAYS A MALICIOUS
ACTIVITY, BUT THE TERM HAS MOSTLY NEGATIVE
CONNOTATIONS DUE TO ITS ASSOCIATION WITH
CYBERCRIME. IT IS MOST COMMONLY ASSOCIATED
WITH ILLEGAL ACTIVITY AND DATA THEFT BY
CYBER CRIMINALS.
MALICIOUS INTENT AND CODE
The word malicious means anything that is having or
showing a desire to cause harm to others.
Malicious code is the term used to describe any
code in any part of a software system or script that is
intended to cause undesired effects, security breaches
or damage to a system. Malicious code is an application
security threat that cannot be efficiently controlled by
conventional antivirus software alone.
Different types of malicious codes are Computer
virus, worms, trojan horse, spyware, ransomware,
macro virus, adware etc.
PROTECTION AGAINST MALICIOUS
CODE
• Use Anti-virus software.
• Avoid browsing unsecured website.
• Filter traffic at the level of the DNS.
• Identify malicious links ahead of clicking.
• Take a pass on free software downloads.
• Do not engage with suspicious emails.
• Use an advanced email security solution.
• Block pop-up ads (and other ads).
• Stop using public Wi-fi.
BIOGRAPHY
https://www.cisa.gov/
https://www.kaspersky.com/
https://www.ekransystem.com/
https://www.wikipedia.org/
Computer book
Thanks you!
& jai jagat

You might also like