BIT 101 03 Part 1 - 104939
BIT 101 03 Part 1 - 104939
COMPUTER ETHICS
Ethics is the field of study that is concerned with questions of value, i.e., judgments about what
human behavior is "good" or "bad" in any given situation. Ethics are the standards, values, morals,
principles, etc., which are used to base one's decisions or actions on; often there is no clear "right" or
"wrong" answer.
For example, how would you decide which person should live or die?
Computer Ethics
Ethical judgments are no different in the area of computing from those in any other as computers
raise problems of privacy, ownership, theft and power, to name but a few examples.
Computer Ethics is a branch of practical philosophy which deals with how computing
professionals should make decisions regarding professional and social conduct. Basically computer
ethics is knowing the difference between ethical and unethical. For example, while it is easy to duplicate
copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without
the author's approval. And while it may be possible to access someone's personal information on a
computer system, computer ethics would advise that such an action is unethical.
There are three major areas which come under the umbrella of computer ethics:
Intellectual property
Internet Etiquette or “netiquette”
Day-to-day Ethics
1. Intellectual Property
Intellectual property refers to creations of the intellect: inventions, literary and artistic works,
symbols, names, images, and designs used in commerce are part of it. It is usually divided into
two branches, namely industrial property which broadly speaking protects inventions and
copyright, which protects literary and artistic works.
Copyright
In most European languages other than English, copyright is known as author’s right. The World
Intellectual Property Organization (WIPO) has established similar guidelines in its Copyright Law.
It is also generally agreed that the owner of the copyright (and only the owner!) is authorized to do
the following with the work:
reproduce it
prepare derivative works based upon it
distribute copies of it to the public
perform the work publicly (if applicable)
display the work publicly
Copyright laws protect intellectual property which includes literary and artistic works such as novels,
poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and
sculptures, and architectural designs. But unlike protection of inventions, copyright law protects
only the form of expressions of ideas, not the ideas themselves. Remember that a created work is
considered protected as soon as it exists, and a public register of copyright protected work is not
necessary.
For works made available over a communications network (such as the Internet), the copyright protects
original authorship. However, according to the Copyright Law, it does not protect ideas, procedures,
systems, or methods of operation. This means that once such an online work has been made public,
nothing in the copyright laws prevents others from developing another work based on similar
principles, or ideas.
Internet etiquette or “netiquette” is the code of acceptable behaviors users should follow while on the
Internet. It is the conduct expected of individuals while online. It includes rules for all aspects of
the Internet including the World Wide Web, e-mail, instant messaging, chat rooms, FTP, and
newsgroups and message boards.
information is valid. Don’t trusts or spread further any information about which
you are in doubt. Always try to obtain reliable information.
• Protect your personal information to keep someone from using it in an unethical
way. (For example, when you enter a prize contest, your name, address, and phone
number may be given to a dealer of personal information.)
3. Avoid Spamming
• Spamming is sending unsolicited bulk and/or commercial messages over the
Internet.
• Spamming is morally bad if it is intended to destroy and done by infringing on the
right of privacy of others.
• It could be good if the message sent benefits the recipients, like giving out
warnings or useful information to others.
For detailed information, you can refer to a book entitled “Netiquette” by Virginia
Shea. An excerpt from this book called The Core Rules of Netiquette is available
online. [http://www.albion.com/netiquette/]
All of us might have known these ethics already, because these are just modified forms of ethics told
to us by our grandparents/parents, like don’t open letters of others, don’t copy the home-work from
others, don’t listen to any conversation secretly etc.
Software piracy is morally bad when someone reproduces a copy of the software and sells it for
profit, produces exactly the same or similar version without giving proper credit to the original author,
or simply produces it and distributes it to others.
It is not immoral to copy the software if someone who has a licensed copy of the software and simply
makes a backup copy of the original. One back-up copy of the commercial software can be made, but
the back-up copy cannot be used except when the original package fails or is destroyed.
Creation of computer viruses is morally bad when it is intended for malicious purposes like to steal
information or destroying of data. However, it could also be used like a vaccine – poison to kill another
poison – to cure or prevent a potentially destructive system from wreaking havoc in the network. The
Page 3
way some worms and viruses work could be used to gather information that could help protect the
majority of computer users.
1.1.2.3 Plagiarism
Plagiarism is copying someone else's work and then passing it off as one's own. It is morally bad
because it is an act of stealing. Copying programs written by other programmers and claiming it as your
own could be an act of plagiarism. It involves lying, cheating, theft, and dishonesty.
Module II
COMPUTER SECURITY RISKS
Today, people depend on computers to create, store, and manage critical information. Thus, it is
crucial that users take measures to protect their computers and data from loss, damage, and misuse. A
computer security risk is any event or action that could cause a loss or damage to computer hardware,
software, data, information or processing capability. While some breaches to computer security are
accidental, any are intentional. Some intruders do not damage; they merely access data, information or
programs on the computer. Other intruders indicate some evidence of their presence either by leaving a
message or by deliberately doing actions against the law.
Any illegal act involving a computer generally is referred to as computer crime. On the other
hand, the term cybercrime refers to online or Internet-based illegal acts. Today, cybercrime is one of the
priorities of both the national and international government to prevent widespread. Some of the
perpetrators of such crime fall into the seven basic categories namely:
A. Hacker. “Hacking” means illegally accessing other people's computer systems for
destroying, disrupting or carrying out illegal activities on the network or computer systems. It is
morally bad if it is intended to steal private information or destroy a computer system. Otherwise,
it may strengthen it. A Hacker may refer to a person who:
B. Cracker. A cracker is someone who accesses a computer or network illegally but has
the intent of destroying data, stealing information, or other malicious action
C. Script kiddie. A script kiddie has the same intention as the cracker and hacker but
does not have technical skills and knowledge. They often use prewritten hacking and
cracking programs to break into computers.
Page 4
D. Corporate spy. Corporate spies are hired to break into specific computer and steal its propriety data
and information. Unscrupulous companies hire corporate spies, a practice known as corporate
espionage, to gain a competitive advantage.
E. Unethical employee. Unethical employees break into their employer’s computers for a variety of
reasons:
F. Cyber extortionist. A cyber extortionist is someone who uses e-mail as a vehicle for
extortion
G. Cyber terrorist. A cyber terrorist is someone who uses the Internet or network to destroy
or damage computers for political reasons. It might target the nation’s air traffic control system or a
telecommunications infrastructure
Malware Classification
• The general term computer virus usually covers programs that modify how a computer
works (including damaging the computer) and can self-replicate. A true computer
virus requires a host program to run properly.
• A worm, on the other hand, doesn't require a host program. It's an application that can
replicate itself and send itself through computer networks.
Page 5
• Trojan horses are programs that claim to do one thing but really do another. Some
might damage a victim's hard drive. Others can create a backdoor, allowing a remote
user to access the victim's computer system.
• Rootkit is a program that hides in a computer and allows someone from a remote
location to take full control of the computer
Computer viruses can be a nightmare. Some can wipe out the information on a hard
drive, tie up traffic on a computer network for hours, turn an innocent machine into a
zombie and replicate and send themselves to other computers. If you've never had a
machine fall victim to a computer virus, you may wonder what the fuss is about. But the
concern is understandable -- according to Consumer Reports, computer viruses helped
contribute to $8.5 billion in consumer losses in 2008 [source: MarketWatch]. Computer
viruses are just one kind of online threat, but they're arguably the best known of the bunch.
Computer viruses have been around for many years. In fact, in 1949, a scientist named
John von Neumann theorized that a self-replicated program was possible [source: Krebs].
The computer industry wasn't even a decade old, and already someone had figured out
how to throw a monkey wrench into the figurative gears. But it took a few decades before
programmers known as hackers began to build computer viruses.
While some pranksters created virus-like programs for large computer systems, it was
really the introduction of the personal computer that brought computer viruses to the
public's attention. A doctoral student named Fred Cohen was the first to describe self-
replicating programs designed to modify computers as viruses. The name has stuck ever
since.
In the good old days (i.e., the early 1980s), viruses depended on humans to do the hard work of
spreading the virus to other computers. A hacker would save the virus to disks and then distribute the
disks to other people. It wasn't until modems became common that virus transmission became a real
problem. Today when we think of a computer virus, we usually imagine something that transmits itself
via the Internet. It might infect computers through e-mail messages or corrupted Web links. Programs
like these can spread much faster than the earliest computer viruses.
caused hundreds of thousands, if not millions, of dollars in damage, and its creator was convicted under
the Computer Fraud and Abuse Act.
Currently, more than 300,000 Websites can infect your computer with known malicious
software. These programs infect computers in a variety of ways: when a user (1) opens an infected
file, (2) runs an infected program, (3) boots the computer with infected removable media inserted
in a drive or plugged in a port, (4) connects an unprotected computer to a network, or (5) when a
certain condition or event occurs, such as the computer’s clock changing to a specific date, and
(5) opens an infected e-mail attachments.
The list below summarizes important tips for protecting your computer from malicious
software:
1. Never start a computer with removable media inserted in the drives or plugged in ports,
unless the media are uninfected
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted
source
3. Set the macro security in programs so that you can enable or disable macros. Enable
macros only if the document is from a trusted source and you are expecting it.
4. Install an antivirus program on all of your computers. Update the software and virus
signature files regularly
5. Scan all downloaded programs for malware
6. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the
attachment immediately.
7. Before using any removable media, scan the media for malware. Follow this procedure
even for shrink wrapped software from major developers.
8. Install a personal firewall program.
9. Stay inform about new virus alerts and virus hoaxes
2.2.2 Botnets
A botnet is a group of compromised computers connected to a network such as the Internet that
are used as part of a network that attacks other networks, usually for nefarious purposes. A compromised
computer known as a zombie, is one whose owner is unaware the computer is being controlled remotely
by an outsider. Cybercriminals use botnets to send spam via e-mail, spread viruses and other malware, or
commit a denial of service attack
from accessing email, websites, online accounts (banking, etc.), or other services that rely on the
affected computer.
The most common and obvious type of DoS attack occurs when an attacker "floods" a
network with information. When you type a URL for a particular website into your browser, you
are sending a request to that site's computer server to view the page. The server can only process
a certain number of requests at once, so if an attacker overloads the server with requests, it can't
process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account.
Whether you have an email account supplied by your employer or one available through a free
service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of
data you can have in your account at any given time. By sending many, or large, email messages
to the account, an attacker can consume your quota, preventing you from receiving legitimate
messages.
Not all disruptions to service are the result of a denial-of-service attack. There may be
technical problems with a particular network, or system administrators may be performing
maintenance. However, the following symptoms could indicate a DoS or DDoS attack:
• unusually slow network performance (opening files or accessing websites)
• unavailability of a particular website
• inability to access any website
• dramatic increase in the amount of spam you receive in your account
2.2.4 Backdoors
A backdoor is a program or a set of instructions in a program that allow users to bypass security
controls when accessing a program, computer, or network. Once perpetrators gain access to unsecure
computers, they often install a backdoor or modify an existing program to include a back door, which
allows them to continue to access the computer remotely without the user’s knowledge
2.2.5 Spoofing
Spoofing is a technique intruders use to make their networks or Internet transmission appear
legitimate to victim computer or a network.
2 types of Spoofing
1. E-mail spoofing – occurs when the sender’s address or other components of the e-
mail header are altered so that it appears the e-mail originated from a different
sender. It is commonly used for virus hoaxes, spam and phishing scams.
2. IP spoofing – occurs when an intruder computer fools a network into believing its
IP address is associated with a trusted source. Its perpetrators trick their victims
into interacting with a phony Web site
In order to safeguard against these attacks, the following are recommended:
1. Implement firewall solutions
2. Install intrusion detection software
Page 9
Many systems implement access controls using a two-phase process called identification and
authentication. Identification verifies that an individual is a valid user. Authentication verifies that the
individual is the person he/she claims to be.
Three (3) methods of Identification and Authentication
1. Usernames and passwords
2. Possessed objects. A possessed object is any item that you must carry to gain access to a
computer or a computer facility.
3. Biometric devices. A biometric device authenticates a person’s identity by translating
personal characteristics such as a finger print, into a digital code that is compared with a digital
code stored in the computer verifying physical or behavioral characteristics.
The following are Top 10 of the worst computer viruses to cripple a computer system:
1. Melissa
Created by David L. Smith in 1999, Melissa is a macro virus. It tempts recipients to open an infected
document through an e-mail message “Here is that document you asked for, don’t show it to anybody
else”. The virus replicates through the recipient’s address book.
2. I LOVE YOU
Believed to have originated in the Philippines by the author named Onel de Guzman, this malware
comes in the form of a worm, a stand-alone program which is capable of replicating itself. It travels
through the Internet via an attachment in an e-mail message with a subject Love Letter
3. The Klez Virus
The basic Klez worm infected a victim's computer through an e-mail message, replicated itself and
then sent itself to people in the victim's address book. Some variations of the Klez virus carried other
harmful programs that could render a victim's computer inoperable. Depending on the version, the Klez
virus could act like a normal computer virus, a worm or a Trojan horse. It could even disable virus-
scanning software and pose as a virus-removal tool.
4. Code red and Code red II
The Code Red and Code Red II worms popped up in the summer of 2001. Both worms exploited an
operating system vulnerability that was found in machines running Windows 2000 and Windows NT.
The vulnerability was a buffer overflow problem, which means when a machine running on these
operating systems receives more information than its buffers can handle; it starts to overwrite adjacent
memory.
Page 11
The original Code Red worm initiated a distributed denial of service (DDoS) attack on the White
House. That means all the computers infected with Code Red tried to contact the Web servers at the
White House at the same time, overloading the machines.
5. Nimda
Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm.
Nimda spread through the Internet rapidly, becoming the fastest propagating computer virus at that time.
The Nimda worm's primary targets were Internet servers. While it could infect a home PC, its real
purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple
methods, including e-mail. This helped spread the virus across multiple servers in record time.
The Nimda worm created a backdoor into the victim's operating system. It allowed the person behind
the attack to access the same level of functions as whatever account was logged into the machine
currently. In other words, if a user with limited privileges activated the worm on a computer, the attacker
would also have limited access to the computer's functions. On the other hand, if the victim was the
administrator for the machine, the attacker would have full control.
The spread of the Nimda virus caused some network systems to crash as more of the system's resources
became fodder for the worm. In effect, the Nimda worm became a distributed denial of service (DDoS)
attack.
6. SQL Slammer/Sapphire
In late January 2003, a new Web server virus spread across the Internet. Many computer networks were
unprepared for the attack, and as a result the virus brought down several important systems. The Bank
of America's ATM service crashed, the city of Seattle suffered outages in 911 services and Continental
Airlines had to cancel several flights due to electronic ticketing and check-in errors.
7. MYDoom
The MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer's
operating system. The original MyDoom virus -- there have been several variants -- had two triggers.
One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second
trigger commanded the virus to stop distributing itself on Feb. 12, 2004. Even after the virus stopped
spreading, the backdoors created during the initial infections remained active.
Later that year, a second outbreak of the MyDoom virus gave several search engine companies grief.
Like other viruses, MyDoom searched victim computers for e-mail addresses as part of its replication
process. But it would also send a search request to a search engine and use e-mail addresses found in
the search results. Eventually, search engines like Google began to receive millions of search requests
from corrupted computers. These attacks slowed down search engine services and even caused some
to crash.
vulnerable systems. It contacted those systems and instructed them to download the virus. The virus
would scan random IP addresses to find potential victims. The virus also altered the victim's operating
system in a way that made it difficult to shut down the computer without cutting off power to the system.
The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and
propagates through a 22,016-byte file attachment. As it spreads, it can cause a denial of service (DoS)
attack as systems collapse while trying to handle all the Internet traffic.
9. Leap A/Oompa-A
Maybe you've seen the ad in Apple's Mac computer marketing campaign where Justin "I'm a Mac" Long
consoles John "I'm a PC" Hodgman. Hodgman comes down with a virus and points out that there are
more than 100,000 viruses that can strike a computer. Long says that those viruses target PCs, not
Mac computers.
For the most part, that's true. Mac computers are partially protected from virus attacks because of a
concept called security through obscurity. Apple has a reputation for keeping its operating system
(OS) and hardware a closed system -- Apple produces both the hardware and the software. This keeps
the OS obscure. Traditionally, Macs have been a distant second to PCs in the home computer market.
A hacker who creates a virus for the Mac won't hit as many victims as he or she would with a virus
for PCs.
But that hasn't stopped at least one Mac hacker. In 2006, the Leap-A virus, also known as Oompa-A,
debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers.
After the virus infects a Mac, it searches through the iChat contacts and sends a message to each
person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.
The Leap-A virus doesn't cause much harm to computers, but it does show that even a Mac computer can
fall prey to malicious software. As Mac computers become more popular, we'll probably see more
hackers create customized viruses that could damage files on the computer or snarl network traffic.
Hodgman's character may yet have his revenge.
Module III
COMPUTER AND HEALTH RISKS
The speed and efficiency of the computers has made most businesses and institutions dependent
on the technology. As a result, many people spend a large part of their time working with computers.
The relatively recent advent of the widespread availability of the Internet has meant that even
those individuals who don’t use computers at work are likely to use them at home to surf the net. What
this has meant is that many people are spending many hours on the computer at work and then again at
home. As a result, there has been a significant increase in the reporting of health problems related to the
use of computers.
2. Eye Strain:
Long hours staring at a computer screen will inevitably lead to asthenopia or eyestrain. Persons tend
not to blink as frequently, which also leads to drying of the eyes. Over a prolonged period, this can lead
to some deterioration in vision especially in those prone to visual problems.
In order to prevent this, it is suggested that one take regular breaks from staring at the screen maybe
with brief eye closure.
sitting with the hands resting on the keyboard, the elbows should be slightly above the wrists. The chair
should have firm lumbar support and it is important that the individual maintain good posture to minimize
back strain.
4. Depression:
Another syndrome more recently recognized and associated primarily with the Internet is depression.
A recent study found a high degree of correlation between the time spent on line, including chat rooms,
and an increased incidence of depression. It is believed that at least some of the individuals who spend
long periods of time on line may have somewhat unfulfilled social lives. This is very likely the reason
they spend many hours on line in the first place. However, the time on line may also serve to magnify
the very loneliness the user may have been attempting to blunt. It is also likely that as one spends more
and more time on the computer, it naturally takes away from the time the individual has for normal social
or family relations and this in turn may lead to depression.
5. Electromagnetic Radiation:
There has been much debate about the possible effects of electromagnetic radiation. Most people
agree that long term exposure to strong EMR fields, as occur near high voltage lines, can lead to health
problems over the years. What is not clear is whether exposure to the much weaker fields that are
generated by computers and other types of electronic equipment present any threat to one's health. To
date there has been no clear evidence of a link. However, computers are still in their relative infancy and
so we do not have decades of data to go on. Also this is really the first generation of children with
widespread access to and use of computers. The odds are though, that no one will suffer significant ill
effects from the weak EMR fields generated by computers.
Because CTDs develop slowly over a period of time the symptoms of these illnesses can be
initially very mild. But a CTD can rapidly become very painful and even crippling if left untreated
and if the worker does not change faulty work habits. If you have any of these symptoms, see
your doctor immediately! Delaying treatment of a CTD can only make the healing process more
difficult. Prevention of CTDs involves eliminating risk factors in the workplace. The harmful
effects of fixed and awkward work postures can be avoided or reduced through several means: