Kartik Kumar Yadav IXB1 - Comp

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

NAME : KARTIK KUMAR YADAV

CLASS : IX B1
SUBJECT : COMPUTER
TOPIC : COMPUTING AND ETHICS
WHAT IS AN ETHICS

• Ethic is a division of philosophy that deals with moral


ideologies. It directly deals with the decisions made
by people in real life and is always concerned with
the moral of the society and the individual living in the society.
• Computer ethics is the set of commonly agreed principles that govern the use of
computers. Like ethics more generally, computer ethics is essentially a set of
philosophical guidelines or moral standards that aim to influence behaviour and
prevent harm.
INTELLECTUAL PROPERTY RIGHTS
• Intellectual property rights are the rights given to each and every
person for the creation of new things according to their minds. IPR
usually give the creator a complete right over the use of his/her creation
for a certain period of time.
•Intellectual properties are
1.Industrial designs
2.Scientific discoveries
3.Protection against unfair competition
4.Literary, artistic, and scientific works
5.Inventions in all fields of human endeavor
6.Trademarks, service marks, commercial names, and designations
TYPES OF INTELLECTUAL PROPERTY RIGHTS:

• Intellectual Property Rights can be classified into four types:


• Copyright: Copyright is a term that describes ownership or control of the
rights to the use and distribution of certain works of creative expression, including
books, videos, movies, music, and computer programs.
• Patent: A patent gives its owner the right to exclude others from making, using,
selling, and importing an invention for a limited period of time.
• Trademark: A Trademark is a Graphical representation that is used to distinguish the goods and services of one party from
those of others.
• Trade Secrets: Trade secret describes about the general formula of any product and the key behind any organization’s
progress
PROTECTION OF INDIVIDUAL’S RIGHT TO PRIVACY

• Data piracy:Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet.
It negatively affects the creative industries, including film, TV, publishing, music and gaming.
• To protect data piracy, we must deploy some protective measures such as :
• 1. A good firewall
• 2.Always take backup of the data and have recovery functions at the ready
• 3.A strong antivirus software
• 4.A good data Discovery and classification tool
• 5.A data lost prevention system that will monitor the sensitive Data being removed or copied and also keep a
log of those who are using data, to keep unauthorized users from getting access.
PROTECTION AGAINST SPAM

• Spamming is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients
for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited
purpose, or simply repeatedly sending the same message to the same user.
• There is a certain method through which the user can protect himself from spam messages :
1.Delete emails that are sent from completely unknown sources.
2.Keep software and security patches up to date.
3.If you suspect any spam message or email do not open any link.
4.Install a good antivirus and spam filtering or blocking software.
5.Do not buy anything advertised from spam emails.
SOFTWARE PIRACY

• Software Piracy is the illegal approach of copying, distributing, modifying, selling, or using the software which is legally
protected. So in a simple term, we can say Software piracy is the act of stealing legal software in an illegal way. This
software piracy refers to the unauthorized copy and use of legal software. And now this critical problem has turned into a
global issue
• Types of Software Piracy :
• There are mainly 5 types of Software Piracy. Each type of software piracy is explained well below:
1.Counterfeiting
2.Internet piracy
3.End user piracy
4.Client server overuse
5.Hard disk loading
CYBERCRIME

• Any offenses committed against individuals or


groups of individuals to harm the reputation or
cause physical or mental trauma through
electronic means can be defined as Cybercrime.
Electronic means can include but are not limited to, the use of modern
telecommunication networks such as the Internet (networks including chat rooms,
emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS).
COMMON TYPES OF CYBERCRIME

• Types of cybercrime :

• 1.Phishing : They are also known as spam where email messages are send

to different people to get personal information

• 2.Hacking : It refers to getting illegal access to someone’s computer with


the intent of stealing sensitive data or causing damage.

• 3.Cyber terrorism : Spreading hate messages against other community and inciting terrorism using a computer network.

• 4.Cyber abuse : This is away of abusing a person by hurting their integrity using the internet

• 5.Cyberstalking : it refers to a person or an organisation keeping a check on another organisations or persons activities thr oughout the day and
night through the internet with the intent to collect data on that person.

• 6.Cyberwarfare : Cyber warfare is the Digital attacks from a nation to another causing similar harm as done in actual Warfare and or
interrupting the vital computer system such as banking system , Hacking system confidential and strategical documents of the government etc
PROTECTION AGAINST CYBERCRIMES

• We can follow all these guidelines to stay safe


from cybercrime :
• 1.Use of good internet security suite.
• 2.Use of wrong passwords for money transaction
software such as Google pay, Paytm and email account
• 3.Use of original software and keep it updated
• 4.Social sites settings should be strong enough
HACKING

• An effort to attack a computer system or a private


network inside a computer is known as hacking. Simply,
it is unauthorized access to or control of computer
network security systems with the intention of committing
a crime. Hacking is the process of finding some security holes in a computer system or network in order to gain
access to personal or corporate information. One example of computer hacking is the use of a password
cracking technique to gain access to a computer system. The process of gaining illegal access to a computer
system, or a group of computer systems, is known as hacking. This is accomplished by cracking the passwords and
codes that grant access to systems. Cracking is the term used to describe the process of obtaining a password or
code. The hacker is the individual who performs the hacking
MALICIOUS INTENT AND CODE
•Malicious code is the term used to describe any code in any part of a software system or script
that is intended to cause undesired effects, security breaches or damage to a system. Malicious
code is an application security threat that cannot be efficiently controlled by conventional
antivirus software alone.
• Protection against malicious code
1.Stop using publicWi-F
2.Always take backup of data
3.Installation of Firewall is a must
4.Keep changing password at regularly
5.Use Account with limited permission
6.Buy licensed software and keep them updated
GOOD ETIQUETTE PRACTICES

• The word Etiquette means to attach or stick. It is the requirement of behaviours of a person
according to the practice of the society we live in. In the electronic media, we need to maintain a
good code of conduct known as a netiquettes.
• Some of them are :
1.Always respect the privacy of a person
2.Do not use abusive language while sending an email
3.Do not post any rude or nasty message about anyone
4.Do not send any Spam messages to others
5.Avoid sharing Agar persons personal or professional information
GOOD ETHICAL PRACTICES

• We should follow these commandments while working on computer


1.We should not use a computer to harm other people
2.We should not Snoop around in other people’s file
3.We should not interfere with other people’s computer work
4.We should not use a computer to Steal
5.We should not use or copy software for which you have not paid
6.We should use a computer in ways that show consideration and respect
SDG’S RELATED TO COMPUTING AND ETHICS ARE:
BIBLIOGRAPHY

• I have taken the help from the following in completing this presentation:
• 1.www.crowdestrike.com
• 2.https://byjus.com
• 3.https://cybertalents.com
• 4.Touchpad computer book

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy