0% found this document useful (0 votes)
12 views

Computing & Ethics

Computer Powerpoint presentation
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Computing & Ethics

Computer Powerpoint presentation
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Name– Shubhangi Pandey

Class & Sec- 9th A


Subject- Computer
Topic- Computing and ethics
Introduction
• Ethics-
Ethics is division of philosophy that deals with
moral ideologies. It directly deals with the
decisions made by people in real life and is
always concerned with the morals of society and
the individuals living in it. It came from the
Greek word “Ethos”, which means ‘Custom’ or
‘Character’. In other words, it is the person’s
character and behavior that define how a person
makes decisions in life.
• Computing-
Computing is any goal-oriented activity
requiring, benefiting from, or creating
computing machinery. It includes the study
and experimentation of algorithmic
processes, and the development of both
hardware and software. Computing has
Scientific, engineering, mathematical,
technological and social aspects.
Data Privacy
Data Privacy is an area of data security
that deals with the handling of
sensitive data such as personal,
financial or intellectual data. It is the
ability of a person to decide when, how
and to what extent their personal
information is shared with others.
Personal information includes person’s
name, contact information, location
and online or real world behavior.
Intellectual
Property Rights
Intellectual property rights (IPR) are legal
rights that give creators or inventors the
exclusive right to use their work for a set
period of time. IPRs protect non-physical
property, or intangible assets, such as
inventions, designs, literary and artistic
works, and symbols, names, and images
used in commerce. IPRs are intended to
encourage creativity and innovation by
balancing the interests of innovators with
the public interest.
Flowchart
Intellectual
Property Rights

Trademar Copyright Trade


Patents secrets
ks s
• Patent- This means only the owner has the sole
rights to produce, use or sell the item for at least the
first 5 years before their can start manufacturing it.
• Trademark- They are visuals such as symbols,
designs or written matter such as words or phrases
or even sound that identifies or separates the items
or services of one company from another company.
• Copyrights- This is used for protecting different
literary works, such as different codes of computer
programs, databases, novels, poems, musical
compositions etc.
Cybercrime
Any crime that is committed through the
internet and by using a computer, mobile, or
laptop and software is known as Cybercrime.
This type of crime can be committed from any
location, even from remote areas, without being
present in the crime area. These types of crime
can be committed against individuals, corporate,
banks or even government of different countries.
Thus, criminals involved in cybercrime know no
borders, either physical or virtual, and cause
serious harm and pos very real threats to victims
worldwide. Some of the common Cybercrimes
are Phishing, Grooming, Cyber stalking etc.
Hacking
Hacking refers to the act of breaking
into someone else’s computer with
the intent of stealing information,
installing malware, or disrupting their
services. It is the act of gaining
unauthorized access to a computer
system or network by exploiting its
weaknesses. It can also be referred to
as cyber hacking. Some of the most
common reasons for hacking are Data
Theft, Revenge, Publicity etc.
Net
Extortion
Net extortion is a broad category of internet and
computer-related crime that involves criminals
using threats to force people and businesses to
give up money or sensitive data. Net extortion can
involve hackers using phishing emails,
ransomware attacks, and other methods to trick,
bully, or convince victims to give up money or
data. Net extortion can result in data breaches,
financial loss, identity theft, or cyber espionage.
Net extortion occurs when the attacker gains
access to sensitive data on a victim's computer
network or system through methods such as ad
scams, phishing emails, infected websites and
other techniques.
Net Extortion -
Types
• Ransomware- Malicious software that encrypts an
organization's systems and databases, making them
unusable. The attacker then demands money to
decrypt the systems.
• DDoS Attack(Distributed denial of
service)- A cyber extortionist sends a large number
of requests to a web server, making it unable to
handle them. The website then stops working properly
and can't serve legitimate visitors.
• Denial of Service- An attack that affects a
company's access to its data, devices, and
servers. The hacker may demand payment or
request money to prevent the attack.
• Phishing- A broad extortion style that involves a
website that looks like a real one, but aims to collect
sensitive information like passwords, account details,
or credit card numbers.
• Double extortion- A technique that involves
stealing data from businesses while also encrypting
the files. The attacker may demand a ransom to
decrypt the data, and threaten to release the stolen
data if a second payment isn't made.
• Infiltration- Cybercriminals gain unauthorized
access to a victim's network, system, device,
data, or server. They can then prepare for cyber
extortion or launch a cyber attack.
Viruses
A computer virus is a program that
spreads by first infecting files or the
system areas of a computer or
network router's hard drive and then
making copies of itself. Some viruses
are harmless, others may damage
data files, and some may destroy
files. There are different types of
viruses. Some of them are given on
next slide.
Viruses -
Types
• Boot sector virus- Infects the boot
sector of a computer's hard disk or floppy
disk during the boot process. This can cause
the system to slow down, files to disappear,
or the computer to not boot up properly.
• Resident Virus- Embeds itself into the
computer's memory and can execute
malicious code.
• Memory Resident virus- Hides in the
computer's memory and can infect any files
that are opened when the operating system
is running. This can cause the system to
• Macro virus- Written in the same
macro language used to create
software programs like Microsoft
Excel or Word.
• Multipartite Virus- A fast-acting
malware that attacks a device's boot
sector and executable files
simultaneously.
• Network Virus- Uses a computer's
networking capability to spread
malicious programs, steal data, and
Antiviruses
Antivirus software is a security program that
protects devices from viruses, malware, hackers,
and cybercriminals. It can detect, prevent, and
remove malware and viruses, and can also
identify and block malicious software and
infected links. Antivirus software is often
included as part of a security package, but it can
also be purchased as a standalone option. Once
installed, most antivirus software runs
automatically in the background to provide real-
time protection against virus attacks.
Trojan
Horse
A Trojan horse is a type of malware that
disguises itself as a legitimate program to gain
access to a user's computer system. Once
inside, it can cause a number of issues,
including data theft, system damage, identity
theft, exporting files, modifying data, and
deleting files. Attackers can use social
engineering, spoofing, and phishing to trick
users into downloading a Trojan horse. The
term "Trojan horse" comes from the large
wooden horse filled with Greek soldiers that
was used to gain entrance into Troy during the
Trojan War.
Malware &
Bancos
• Malware- Malware, or malicious software, is a
term for any intrusive software developed by cyber
criminals to damage or destroy computers and
computer systems, or steal data Some of the
malware are Trojans, Viruses, Worms, Adware etc.
• Bancos- Bancos, also known as Infostealer.
Bancos is a family of Trojan horses that primarily
targets online banking users, particularly in Brazil.
This malware is designed to steal sensitive
information, such as login credentials, from infected
computers and send the stolen data to malicious
hackers through email, ftp, or another protocol to a
remote server, depending on the variant.
Gator &
Spyware
• Gator- Gator is a type of adware, or software, that
automatically displays or downloads advertisements
onto a computer. It's also known as Gain AdServer. It
is considered one of the most controversial adware
programs because it's difficult to remove and can
cause performance issues. Gator's main purpose is to
load an advertising spyware module called Offer
Companion, which displays pop-up ads when a user
visits certain websites.
• Spyware- Spyware is a type of malicious software
(malware) that secretly collects information from a
computer without the user's consent. It can gather
personal information like: Keystrokes, Screenshots,
Banking details, Email addresses etc.
Spammer &
Firewall
• Spammer- A spammer is a person or group that
sends unsolicited messages in bulk, usually for
advertising, phishing, or other purposes. Spam
messages can be promotional emails, but they can
also be fraudulent or malicious scams. Spam is most
commonly associated with unsolicited emails, but it
can also be sent through other electronic means, such
as instant messaging, social media, or mobile apps.
• Firewall- A firewall is a network security system
that monitors and controls incoming and outgoing
network traffic based on predetermined security
rules. It usually creates a barrier between a trusted
network and an untrusted network, like the internet

You might also like