Ehitcs in IT
Ehitcs in IT
✔ IT Infrastructure
✔ Illegal access
✔ Illegal Interruption
✔ Data Interface
✔ System Interface
✔ Misuse of Devices
✔ Electronic Fraud
Types of Computer Crimes
Target of the crime
Medium of the attack
Tool
Intimidate or deceive
Types of Computer Criminal
❑ Outsider
❑ Insiders
Reason for Computer Crime
-Economic
-Ideological
-Psychological
-Egocentric
Methods of attack
- Data Tampering
- Programming Techniques
- Other Methods
Software piracy and Hacking
What is piracy????
- Reselling Media
- Downloading from a website
- Taping songs
- Buying a used book or CD
- Watching broadcast television but
skipping commercials
Type of Piracy
- End User Piracy
- Client- Server Piracy
- Internet Piracy
- Hard-Disk Piracy
- Software Counterfeiting
Hacker
- Some one who bypasses the system's access
controls by taking advantages of security
weaknesses left in the system by developers.
- System
1. Access confidential information
2. Threaten someone from YOUR computer
3. Broadcast your confidential letters or
materials.
4. Store illegal materials
Evils Hacking
- Compromise the security of system without
permission from an authorized party, usually
with the intent of accessing computers
connected to the network,
Advantages of Hacking
- To determine problem and weakness for
program.
- Creation of firewall
- Useful for military purpose and spying
- Better computer security
Ethical
Dilemmas and Considerations
Ethical Dilemmas in IT
- Dilemmas are discussed in relation to four
1. privacy
2. Information accuracy
3. Access to information
4. Intellectual property rights
Ethical Dilemmas in relation to IT
- PLAGIARISM
the taking of ideas, writing and
drawings other similar intellectual
property created by others and
presenting it as your own.
- NETIQUETTE
a set of rules(mainly unwritten) to follow while you are
online.