Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21
Name– Shubhangi Pandey
Class & Sec- 9th A
Subject- Computer Topic- Computing and ethics Introduction • Ethics- Ethics is division of philosophy that deals with moral ideologies. It directly deals with the decisions made by people in real life and is always concerned with the morals of society and the individuals living in it. It came from the Greek word “Ethos”, which means ‘Custom’ or ‘Character’. In other words, it is the person’s character and behavior that define how a person makes decisions in life. • Computing- Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both hardware and software. Computing has Scientific, engineering, mathematical, technological and social aspects. Data Privacy Data Privacy is an area of data security that deals with the handling of sensitive data such as personal, financial or intellectual data. It is the ability of a person to decide when, how and to what extent their personal information is shared with others. Personal information includes person’s name, contact information, location and online or real world behavior. Intellectual Property Rights Intellectual property rights (IPR) are legal rights that give creators or inventors the exclusive right to use their work for a set period of time. IPRs protect non-physical property, or intangible assets, such as inventions, designs, literary and artistic works, and symbols, names, and images used in commerce. IPRs are intended to encourage creativity and innovation by balancing the interests of innovators with the public interest. Flowchart Intellectual Property Rights
Trademar Copyright Trade
Patents secrets ks s • Patent- This means only the owner has the sole rights to produce, use or sell the item for at least the first 5 years before their can start manufacturing it. • Trademark- They are visuals such as symbols, designs or written matter such as words or phrases or even sound that identifies or separates the items or services of one company from another company. • Copyrights- This is used for protecting different literary works, such as different codes of computer programs, databases, novels, poems, musical compositions etc. Cybercrime Any crime that is committed through the internet and by using a computer, mobile, or laptop and software is known as Cybercrime. This type of crime can be committed from any location, even from remote areas, without being present in the crime area. These types of crime can be committed against individuals, corporate, banks or even government of different countries. Thus, criminals involved in cybercrime know no borders, either physical or virtual, and cause serious harm and pos very real threats to victims worldwide. Some of the common Cybercrimes are Phishing, Grooming, Cyber stalking etc. Hacking Hacking refers to the act of breaking into someone else’s computer with the intent of stealing information, installing malware, or disrupting their services. It is the act of gaining unauthorized access to a computer system or network by exploiting its weaknesses. It can also be referred to as cyber hacking. Some of the most common reasons for hacking are Data Theft, Revenge, Publicity etc. Net Extortion Net extortion is a broad category of internet and computer-related crime that involves criminals using threats to force people and businesses to give up money or sensitive data. Net extortion can involve hackers using phishing emails, ransomware attacks, and other methods to trick, bully, or convince victims to give up money or data. Net extortion can result in data breaches, financial loss, identity theft, or cyber espionage. Net extortion occurs when the attacker gains access to sensitive data on a victim's computer network or system through methods such as ad scams, phishing emails, infected websites and other techniques. Net Extortion - Types • Ransomware- Malicious software that encrypts an organization's systems and databases, making them unusable. The attacker then demands money to decrypt the systems. • DDoS Attack(Distributed denial of service)- A cyber extortionist sends a large number of requests to a web server, making it unable to handle them. The website then stops working properly and can't serve legitimate visitors. • Denial of Service- An attack that affects a company's access to its data, devices, and servers. The hacker may demand payment or request money to prevent the attack. • Phishing- A broad extortion style that involves a website that looks like a real one, but aims to collect sensitive information like passwords, account details, or credit card numbers. • Double extortion- A technique that involves stealing data from businesses while also encrypting the files. The attacker may demand a ransom to decrypt the data, and threaten to release the stolen data if a second payment isn't made. • Infiltration- Cybercriminals gain unauthorized access to a victim's network, system, device, data, or server. They can then prepare for cyber extortion or launch a cyber attack. Viruses A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Some viruses are harmless, others may damage data files, and some may destroy files. There are different types of viruses. Some of them are given on next slide. Viruses - Types • Boot sector virus- Infects the boot sector of a computer's hard disk or floppy disk during the boot process. This can cause the system to slow down, files to disappear, or the computer to not boot up properly. • Resident Virus- Embeds itself into the computer's memory and can execute malicious code. • Memory Resident virus- Hides in the computer's memory and can infect any files that are opened when the operating system is running. This can cause the system to • Macro virus- Written in the same macro language used to create software programs like Microsoft Excel or Word. • Multipartite Virus- A fast-acting malware that attacks a device's boot sector and executable files simultaneously. • Network Virus- Uses a computer's networking capability to spread malicious programs, steal data, and Antiviruses Antivirus software is a security program that protects devices from viruses, malware, hackers, and cybercriminals. It can detect, prevent, and remove malware and viruses, and can also identify and block malicious software and infected links. Antivirus software is often included as part of a security package, but it can also be purchased as a standalone option. Once installed, most antivirus software runs automatically in the background to provide real- time protection against virus attacks. Trojan Horse A Trojan horse is a type of malware that disguises itself as a legitimate program to gain access to a user's computer system. Once inside, it can cause a number of issues, including data theft, system damage, identity theft, exporting files, modifying data, and deleting files. Attackers can use social engineering, spoofing, and phishing to trick users into downloading a Trojan horse. The term "Trojan horse" comes from the large wooden horse filled with Greek soldiers that was used to gain entrance into Troy during the Trojan War. Malware & Bancos • Malware- Malware, or malicious software, is a term for any intrusive software developed by cyber criminals to damage or destroy computers and computer systems, or steal data Some of the malware are Trojans, Viruses, Worms, Adware etc. • Bancos- Bancos, also known as Infostealer. Bancos is a family of Trojan horses that primarily targets online banking users, particularly in Brazil. This malware is designed to steal sensitive information, such as login credentials, from infected computers and send the stolen data to malicious hackers through email, ftp, or another protocol to a remote server, depending on the variant. Gator & Spyware • Gator- Gator is a type of adware, or software, that automatically displays or downloads advertisements onto a computer. It's also known as Gain AdServer. It is considered one of the most controversial adware programs because it's difficult to remove and can cause performance issues. Gator's main purpose is to load an advertising spyware module called Offer Companion, which displays pop-up ads when a user visits certain websites. • Spyware- Spyware is a type of malicious software (malware) that secretly collects information from a computer without the user's consent. It can gather personal information like: Keystrokes, Screenshots, Banking details, Email addresses etc. Spammer & Firewall • Spammer- A spammer is a person or group that sends unsolicited messages in bulk, usually for advertising, phishing, or other purposes. Spam messages can be promotional emails, but they can also be fraudulent or malicious scams. Spam is most commonly associated with unsolicited emails, but it can also be sent through other electronic means, such as instant messaging, social media, or mobile apps. • Firewall- A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It usually creates a barrier between a trusted network and an untrusted network, like the internet