Kartik Kumar Yadav IXB1 - Comp
Kartik Kumar Yadav IXB1 - Comp
Kartik Kumar Yadav IXB1 - Comp
CLASS : IX B1
SUBJECT : COMPUTER
TOPIC : COMPUTING AND ETHICS
WHAT IS AN ETHICS
• Data piracy:Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet.
It negatively affects the creative industries, including film, TV, publishing, music and gaming.
• To protect data piracy, we must deploy some protective measures such as :
• 1. A good firewall
• 2.Always take backup of the data and have recovery functions at the ready
• 3.A strong antivirus software
• 4.A good data Discovery and classification tool
• 5.A data lost prevention system that will monitor the sensitive Data being removed or copied and also keep a
log of those who are using data, to keep unauthorized users from getting access.
PROTECTION AGAINST SPAM
• Spamming is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients
for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited
purpose, or simply repeatedly sending the same message to the same user.
• There is a certain method through which the user can protect himself from spam messages :
1.Delete emails that are sent from completely unknown sources.
2.Keep software and security patches up to date.
3.If you suspect any spam message or email do not open any link.
4.Install a good antivirus and spam filtering or blocking software.
5.Do not buy anything advertised from spam emails.
SOFTWARE PIRACY
• Software Piracy is the illegal approach of copying, distributing, modifying, selling, or using the software which is legally
protected. So in a simple term, we can say Software piracy is the act of stealing legal software in an illegal way. This
software piracy refers to the unauthorized copy and use of legal software. And now this critical problem has turned into a
global issue
• Types of Software Piracy :
• There are mainly 5 types of Software Piracy. Each type of software piracy is explained well below:
1.Counterfeiting
2.Internet piracy
3.End user piracy
4.Client server overuse
5.Hard disk loading
CYBERCRIME
• Types of cybercrime :
• 1.Phishing : They are also known as spam where email messages are send
• 3.Cyber terrorism : Spreading hate messages against other community and inciting terrorism using a computer network.
• 4.Cyber abuse : This is away of abusing a person by hurting their integrity using the internet
• 5.Cyberstalking : it refers to a person or an organisation keeping a check on another organisations or persons activities thr oughout the day and
night through the internet with the intent to collect data on that person.
• 6.Cyberwarfare : Cyber warfare is the Digital attacks from a nation to another causing similar harm as done in actual Warfare and or
interrupting the vital computer system such as banking system , Hacking system confidential and strategical documents of the government etc
PROTECTION AGAINST CYBERCRIMES
• The word Etiquette means to attach or stick. It is the requirement of behaviours of a person
according to the practice of the society we live in. In the electronic media, we need to maintain a
good code of conduct known as a netiquettes.
• Some of them are :
1.Always respect the privacy of a person
2.Do not use abusive language while sending an email
3.Do not post any rude or nasty message about anyone
4.Do not send any Spam messages to others
5.Avoid sharing Agar persons personal or professional information
GOOD ETHICAL PRACTICES
• I have taken the help from the following in completing this presentation:
• 1.www.crowdestrike.com
• 2.https://byjus.com
• 3.https://cybertalents.com
• 4.Touchpad computer book