Computer Securit and ethics.docx
Computer Securit and ethics.docx
Computer Securit and ethics.docx
(Unhu/Ubuntu/Vumunhu)
COMPUTER ETHICS
Ethics is a set of moral principles that govern the behavior of a society, group or
individual.
Computer ethics is set of moral principles that regulate the use of
computers.
Pg 1 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
3. Do not spy on another person's computer data.
Explanation: it is wrong to read someone else's email messages or files.
Obtaining data from another person's private files is nothing less than breaking
into someone's room and this is invasion of privacy.
6. Refrain from copying software or buying pirated copies. Pay for software unless it
is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A
piece of code is the original work of the individual who created it. It is copyrighted
in his/her name. In case of a developer writing software for the organization she
works for, the organization holds the copyright for it. Copyright holds true unless
its creators announce it is not. Obtaining illegal copies of copyrighted software is
unethical and also encourages others to make copies illegally.
9. Before developing a software, think about the social impact it can have.
Pg 2 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
Explanation: Looking at the social consequences that a program can have,
describes a broader perspective of looking at technology. A computer software on
release, reaches millions. Software like video games and animations or
educational software can have a social impact on their users. When working on
animation films or designing video games, for example, it is the programmer's
responsibility to understand his target audience/users and the effect it may have
on them. For example, a computer game for kids should not have content that
can influence them negatively. Similarly, writing malicious software is ethically
wrong. A software developer/development firm should consider the influence their
code can have on the society at large.
10. In using computers for communication, be respectful and courteous with the
fellow members.
Explanation: The communication etiquette we follow in the real world applies to
communication over computers as well. While communicating over the Internet,
one should treat others with respect. One should not intrude others' private
space, use abusive language, make false statements or pass irresponsible
remarks about others. One should also be considerate with a novice computer
user.
PRIVACY
Data privacy, or Information privacy or data protection is the privacy of personal
information and usually relates to personal data stored on computer systems.
The following organizations are the most common sources of violation of personal data.
Healthcare records
Criminal justice investigations and proceedings
Financial institutions and transactions
Biological traits, such as genetic material
Residence and geographic records
Web surfing behavior or user preferences using persistent cookies
Pg 3 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
Academic institution
Recreational site
Employee institutions
COMPUTER SECURITY
In the computer industry, the term security or the phrase computer security refers to
techniques for ensuring that data stored in a computer cannot be read or compromised by
any individuals without authorization.
System security includesthose measures necessary to detect, document, and counter such
threats.
The process makes sure computer software and information is confidential, available, and
assuring its integrity.
Computer security refers to the protection of a computer, its data and software against damage or loss.
Computer security therefore deals with the protection of
(a) The computer itself and its accessories
(b) Computer data or information
(c) Computer software
Computer security can therefore be classied as physical security and data or software security
PHYSICAL SECURITY
The following are threats that can cause computer or information loss or damage
1. Storms
2. Burglars (thief)
3. Dust
4. Heat
5. Fire
Pg 4 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
6. Electrical faults
7. Accidental loss
1. Make sure the most vulnerable devices are in that locked room
2. Use rack mount servers
3. Keep intruders from opening the case
4. Protect the portables
5. Disable the drives
6. Protect your printers
Pg 5 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
DATA /SOFTWARE LOSS OR DAMAGE
Threats to data and software examples are
1. Virus or malicious software
2. Accidental loss
3. Hackers
4. Sniffing
5. Software piracy
6. etc
19. Remove or disable accounts upon loss of eligibility: Separate user and administrator accounts:
20. Administrator accounts must not be used for non-administrative purposes.
21. Use unique passwords for administrator accounts: Throttle repeated unsuccessful login-attempts:
22. A maximum rate for unsuccessful login attempts must be enforced. Account lockout is not required,
but the rate of unsuccessful logins must be limited.
23. Enable session timeout: Sessions must be locked or closed after some reasonable period.
24. Enforce least privilege: Non-administrative accounts must be used whenever possible. User accounts
and server processes must be granted the least-possible level of privilege that allows them to perform
their function.
25. Enable system logging and auditing: The facilities required to automatically generate, retain, and
expire system logs must be enabled.
26. Access control: Access to confidential data must be provided on a least-privilege basis. No person or
system should be given access to the data unless required by business process. In such cases where
access is required, permission to use the data must be granted by the data steward.
27. For data loss, use data recovery tools such as RECUVA and many others
28. Also create a recovery plan
Pg 6 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
CYBERCRIME
Computer Crime or cyber crime is the use of a computer to take or alter data, or to gain
unlawful use of computers or services. Computer crime is an act performed by a
knowledgeable computer user, sometimes referred to as a hacker that illegally browses or
steals a company's or individual's private information. In some cases, this person or group
of individuals may be malicious and destroy or otherwise corrupt the computer or data
files.
Individual: This type of cyber crime can be in the form of cyber stalking, distributing
pornography, trafficking and “grooming”.
Property: In the cyber world criminals resort to stealing and robbing using computers. In
this case, they can steal a person’s bank details and siphon off money; misuse the credit
card to make numerous purchases online; run a scam to get naïve people to part with their
hard earned money; use malicious software to gain access to an organization’s website or
disrupt the systems of the organization.
Pg 7 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
other malware this encryption key remains on the hacker’s server. Attacked users
are then asked to pay huge ransoms to receive this private key.
9. Spam
Spamming and phishing are two very common forms of cybercrimes. There is not
much you can do to control them. Spam is basically unwanted emails and
messages sent onto an online computer.
10. Phishing is a method where cyber criminals offer a bait so that you take it and give
out the information they want. The bait can be in form of a business proposal,
announcement of a lottery to which you never subscribed, and anything that
promises you money for nothing or a small favor. There are online loans companies
too, making claims that you can get insecure loans irrespective of your location.
Doing business with such claims, you are sure to suffer both financially and
mentally.
15. Pharming: False websites that fish for personal and financial information by
planting false URLs in Domain Name Users.
16. Fraud A wide-ranging term for theft and fraud committed using a credit card or
any similar payment mechanism as a fraudulent source of funds in a transaction.
Also the manipulation of computer records for personal gain or credit. Salami
slicing a from of fraud which is committed by the practice of stealing money
repeatedly in extremely small quantities
17. Forgery
The process of making, adapting, or imitating objects, statistics, or documents,
with the intent to deceive. Digital Forgery: New technologies are used to create
fake checks, passports, visas, birth certificates with little skill or investments.
Pg 8 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
18. Intellectual property theft, including software piracy.
21. Sniffing is a cyber crime which uses illegal data interception technologies. A
Sniffer is a program that monitor or read all network traffic passing in and out
over a network. It is also called eavesdropping.
Pg 9 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved
10. Disabling Features in Microsoft Windows that makes my computer vulnerable to
attacks.
ACTIVITY
Pg 10 Reproduction and/or distribution of this book, in any form, is prohibited. All rights reserved