COMPUTER ETHICS AND SECURITY RISKS



                                       COMPUTER ETHICS


  Image result for netiquette pictures

What is Netiquette?
  • Netiquette,(short for Internet etiquette), is the code of acceptable behaviors users should follow while on the Internet.
  • Netiquette is the code of acceptable behavior.
 The areas where good netiquette is highly stressed are:
Image result for pictures of logo world wide web
www

                      


  
Image result for pictures of online discussions                     Image result for pictures of e-mailImage result for pictures of newsgroup                    Related imageImage result for pictures of ftp
  •  WWW
  • Newsgroup
  • Online Discussions
  • FTP
  • Chat room/Online chat
  • Instant messaging
  • E-mail
  • Social Media

                       

                                      COMPUTER SECURITY

  • Any action that could cause a loss or damage to computer hardware,software,data,information and processing capabilities.

      Image result for types of computer security risks

Malware or Malicious Code
  • Malware is a malicious software,which are programs that act without a users knowledge purposely alter the computer's operations.











Image result for types of malware




                                                                
COMPUTER VIRUSES
A potentially damaging program that affects or infects a computer or mobile devices negatively by altering the way the computer or devices works without user's knowledge or permission.
  • Spread throughout and may damage files and system software,including the operating systems.
WORMS
 A program that itself repeatedly,for example in memory,using up a resources and possibly shutting down the computer,devices or network

Trojan Horse 
A program that hides within or looks like a legitimate program.Unlike a virus or worm , a trojan horse does not replicate itself to other computer or device.
It usually appears to be a game or utility programs.
Cannot replicate itself.Must be downloaded or installed.
Can sabotage a computer without users knowledge , such as installing rootkit or turning the computer into a botnet.

UNAUTHORIZED ACCESS AND USE 

 Image result for unauthorized access and use

 
 UNAUTHORIZED ACCESS
  •  Is the use of computer network without permission 
UNAUTHORIZED USE 
  • Is the use of computer , or its data unapproved or possibly illegal activities. 
Example:Using a colleague's computer without permission , Johan can use computer in his university lab because every student is given an account and password.However , Johan uses it to play network games with his friends in the lab instead of using it to do university assignments.Johan may have authorized access but he has committed unauthorized use.

HARDWARE THEFT AND VANDALISM

HARDWARE THEFT
  • Is the act of stealing computer equipment. 
HARDWARE VANDALISM 
  • Is the act of defacing and destroying computer equipment.
Image result for hardware theft
Hardware is stolen from an individual or from a business,school or other organization.



SOFTWARE THEFT
 
  1. STEALS SOFTWARE MEDIA 
  2.  INTENTIONALLY ERASES PROGRAM
  3.  ILLEGALLY COPIES A PROGRAM
  4.  ILLEGALLY REGISTERS AND/OR ACTIVATES A PROGRAM
STEALS SOFTWARE MEDIA 
Image result for pictures steals software media
An dishonest library assistant might steal Encyclopedia Britannica optical disc.

 INTENTIONALLY ERASES A PROGRAM


Image result for pictures entationally erases a program
A programmer is terminated from , or stop working for a company , and intentionally remove or disable the program they have written from company computers.













                                  
 ILLEGALLY COPIES A PROGRAM
Image result for pictures ILLEGALLY COPIES A PROGRAM

Image result for pictures ILLEGALLY COPIES A PROGRAM
A software is stolen from software manufactures 

 ILLEGALLY REGISTERS AND/OR ACTIVATES THE PROGRAM
  • Users illegally obtaining registration numbers and/or activation codes using a program called a KEYGEN ,shot for KEY GENERATOR.

 INFORMATION THEFT 
Occurs when someone steals personal or confidential information.

IDENTITY THEFT 
  • to purchase goods or services
  • to obtain new credit cards or bank loans.
  • illegally pretend to be as individual 
PHARMING AND PHISHING

PHARMING



  • Creating a fraudulent website which is identical to the original website and asking the user to key in their personal details into the website.   

 PHISHING  
  •  A link created in an e-mail to request that customers update their personal details,at the same time revealing their password and credit card number. 

 SYSTEM FAILURE

 System failure is the prolonged malfunction of a computer system.
Cause a loss of hardware , software , data and information.













Comments