0% found this document useful (0 votes)
50 views7 pages

Computing Ethics

The document discusses various aspects of computing ethics, including definitions of cybercrime, software piracy, spam, and hacking. It emphasizes the importance of ethical values in computer usage, the role of cyber laws, and methods to protect data and systems from malicious activities. Additionally, it outlines the significance of intellectual property rights and provides guidelines for avoiding software piracy and spam.

Uploaded by

Nive Droid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views7 pages

Computing Ethics

The document discusses various aspects of computing ethics, including definitions of cybercrime, software piracy, spam, and hacking. It emphasizes the importance of ethical values in computer usage, the role of cyber laws, and methods to protect data and systems from malicious activities. Additionally, it outlines the significance of intellectual property rights and provides guidelines for avoiding software piracy and spam.

Uploaded by

Nive Droid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Computing Ethics

I. Fill in the blanks:


1. The crime committed on the internet is called cybercrime.
2. The process of making duplicate copy of the original software illegally is known as
software piracy.
3. Unwanted emails are called spam.
4. A program which may corrupt the files/documents in your computer is known as virus.
5. Hackers are the cyber criminals who crack the password to access the information from the
internet.
6. Ethics is a set of moral values, which regulates the use of computers.
7. It is advised to have antivirus software to protect system from viruses.
8. Cyber criminals are punished under cyber laws.
9. Malicious code is a threat which corrupts the system and cannot be blocked by an antivirus
software.
10. Antivirus can be used to protect any document on the Internet.
II. Write short notes on:
1. Software piracy
When we purchase an original software, we become the licensed user and we get the
right to use it. However, we cannot make copies of this software and load it in other
computers. Thus, when someone copies a software without buying the appropriate license or
copyright, it is known as software piracy. Piracy can come in many forms:
i) Licensed user duplication for unlicensed users
ii) Illegal internet distribution
2. Spam
Sometimes when we connect to a website and open our email account, we find that
our inbox is filled with many unwanted emails. Often, the titles of these messages are very
fascinating and they compel us to read the message. Such messages are called spam and they
contain commercial advertising, dubious products or get-rich-quick schemes. Spam messages
waste the valuable time of the users and also occupy memory space of the system. Sometimes
spam may also come with virus files that corrupt the systems.
3. Cyber crime
Crimes such as illegal copying of software, computer viruses, stealing of hardware
data and other computer related crimes or online computer crimes are called Cybercrimes.
Cyber criminals take advantage of the lapses and negligence in the computer system and gain
unauthorized access and retrieve data from other people’s computers. Cyber criminals can be
divided into various groups on the basis of their objectives as follows:
Organised hackers, Professional hackers / crackers, Discontent employees
4. Hacking
The skills and knowledge of computer systems are applied in illegal activities like
breaking passwords, releasing viruses to corrupt the system or stealing valuable data. Hackers
are people who use their computer expertise to gain illegal access to confidential data in the
systems. Hackers run publicly available programs that automate attempts to break into
systems. Hackers also merge wrong information, viruses or corrupt data in the users’ data and
thus corrupt the computer systems.
Hacking is usually done due to one of the following reasons:
i. Theft of services
ii. To take valuable files
iii. For thrill and excitement
iv. Mental disease
v. For knowledge and experiment
5. Software copyright
Intellectual property means “Ownership of Ideas” i.e. the software/program that is
originally developed by the person(s), becomes the intellectual property of the developers.
Copyright prohibits the users of a software program from making copies of it without the
permission of the person or the company concerned which issues the license for the program
6. Cyber Law
The ‘Information Technology Law’ is also known as Cyber Law. Thus, cyberlaw is
the area of law that deals with the Internet’s relationship to technological and electronic
elements, including computers, hardware, software and Information Systems.
Cyberlaws prevent or reduce large scale damage from cybercriminal activities.
They protect Privacy, Intellectual Property and Freedom of Speech related to the use of
Internet, Cell phones, Computers (Hardware and Software).
Since cyberlaws vary by jurisdiction and country, enforcement is challenging and
punishments for Cybercrimes can range from fines to imprisonment.
III. Answer the following questions:
1. What do ethics mean? Mention at least five ethical values related to computers.
Ethics is a set of moral principles that govern the behaviour of a group or an
individual. Some common issues of computer ethics include Intellectual Property Rights,
Privacy concerns and how computers affect society. Some of the following ethical values are
necessary to foster good relations with the concerned people, which will help to make a
healthy environment.
 Software must not be installed or uninstalled without the permission of the owner.
 Follow the rules and regulations while working in a computer lab.
 Secret information should not be stolen from other computers.
 Unpaid software and proprietary software must not be copied or used.
 Confidential documents should be protected using a password.

2. How will you protect your data on the internet?


The following precautions must be followed to protect data:
i. Passwords and account information must not be disclosed to others.
ii. Unwanted or free software must not be downloaded. It may corrupt the system.
iii. Unwanted emails offering different schemes and free gifts must not be opened.
iv. Install high quality antivirus programs of a reputed company in the computer to
protect it against viruses.
3. What is meant by malicious code?
Malicious code refers to a new kind of threat, which cannot be blocked by using an
antivirus software and which corrupts the system in due course of time. Malicious code is any
program that acts in unexpected and potentially damaging ways (e.g. Trojan Horse). It can
attack the infrastructure of a system and can change, delete, insert or even transmit data
outside the institution. Malicious code may hide in different forms and enter our system
while:
i. Working on Emails
ii. Surfing websites
iii. Downloading files/documents/software
Antivirus tools and code blocking are not comprehensive solutions for malicious code.
Protection from malicious code involves limiting the capabilities of the server and web
applications to only functions necessary to support the file.
4. How will you protect your system from malicious intent and malicious code?
The following precautions can protect the system against malicious code.
i. Using high quality antivirus or signature-based antivirus
ii. Suppose the downloading of software seems suspicious, then stop downloading
immediately.
iii. Avoid the use of pirated and unauthorised software since it causes great damage to the
system.
iv. Avoid using other people’s pen drives, memory cards etc which may be virus infected.
If necessary, scan and use them.
v. Emails from unknown sources should not be opened. They should be deleted before
opening.
5. What are the advantages of Cyber law? Mention any five.
i. Cyberlaws prevent or reduce large scale damage from cybercriminal activities.
ii. Cyberlaws protect Information Privacy and also ensure Hardware and Software
security.
iii. Cyber laws allow governments to issue notification on the web.
iv. Cyber laws allow companies to carry out electronic commerce using the legal
infrastructure provided by laws.
v. Cyber laws also regulate the Freedom of Speech related to the use of Internet, Cell
phones, Computers.

6. How will you avoid software piracy? Explain.


i. Software piracy can be avoided by taking the following preventive steps:
ii. Software bought must always be from a reputed organisation. If doubtful,
[email protected] should be contacted.
iii. Confirm that newly bought software comes with a license agreement, original disk
and authentic packaging.
iv. Buying multiple software titles from different publishers on a single disk must be
avoided.
v. If the seller provides a serial number other than the one mentioned in the package, it
indicates that the software is not authentic.
7. What are the different ways to stop spam?
Spam causes serious problems to our system. However, spam can be stopped by
installing a good antivirus software (also known as filters) in our computer system. Some
useful filters are Spam attack, Spam Hater etc. Reading email messages from unrecognized
senders must be avoided and they must be deleted.
8. What role can you play to stop Cybercrimes? Explain.
Precautions against cybercrimes can be listed as follows:
i. Personal identity or personal information should not be disclosed online.
ii. Personal photographs and files should not be sent to strangers and online friends.
iii. The updated and latest antivirus software must be used to guard against virus attacks.
iv. A back-up of data must be maintained to prevent loss of data due to virus
contamination.
v. Credit / Debit card numbers should not be entered in sites that may not be secure.
vi. Web servers running public sites should be separated and protected from the internal
corporate network .
Notes:
Intellectual Property Rights (IPR) bestow exclusive privileges upon creators for their
intellectual creations, providing control for a specific duration. These encompass patents,
safeguarding inventions; copyrights, protecting literary and artistic works; trademarks,
ensuring brand identification; and trade secrets.
Copyright
Description: Copyright protects the rights of creators over their literary and artistic works.
This includes a broad spectrum of creations such as books, music, paintings, films, computer
programs, databases, and technical drawings.
Significance: Grants creators exclusive rights, fostering creativity and ensuring they control
the use of their works.
Patents
Description: A patent is an exclusive right granted for an invention. It allows the patent owner
to decide how the invention is used by others.
Significance: Encourages innovation by providing inventors with a monopoly for a specified
period in exchange for disclosing technical information.
Trademark
Description: Trademarks distinguish the goods or services of one enterprise from others.
Traditionally, artisans market their products, and today, trademarks include symbols, names,
or marks.
Significance: Essential for brand identity, helping consumers make informed choices and
fostering fair competition.
Intellectual Description
Property Right
Copyright Protects literary and artistic works, including books, music, paintings,
films, and computer programs.
Patents Grants exclusive rights for inventions, allowing the patent owner to
control how the invention is used by others.
Trademark Distinguishes goods or services of one enterprise from others,
including symbols, names, or marks.
Trade Secrets Protects confidential business information from unauthorized
acquisition, use, or disclosure.

Harmful effects of software piracy:

1. Financial Loss to Companies – Software makers lose money, affecting future


development.
2. Legal Issues – Using pirated software is illegal and can lead to fines or jail.
3. Virus and Malware Risk – Pirated software may contain harmful programs.
4. No Updates or Support – Users miss out on official updates and customer support.
5. Poor Performance – Pirated software may be unstable, buggy, or incomplete.

Cyber Crime
Crimes such as illegal copying of software, computer viruses, stealing of hardware data and
other computer related crimes or online computer crimes are called Cybercrimes. Cyber
criminals take advantage of the lapses and negligence in the computer system and gain
unauthorized access and retrieve data from other people’s computers. Cyber criminals can be
divided into various groups on the basis of their objectives as follows: Organised hackers,
Professional hackers / crackers, Discontent employees

1. Phishing
Phishing is a cybercrime in which attackers deceive individuals into revealing
personal information, such as passwords or banking details.
This is commonly done through fake emails or websites that appear genuine.
The primary aim is to steal sensitive data for misuse.
2. Hacking
Hacking refers to the unauthorized access of a computer system or network.
It is often carried out to steal, alter, or destroy data.
Hacking is illegal and can cause serious security breaches.
3. Virus
A computer virus is a malicious program that attaches itself to files and spreads from
one system to another.
It can corrupt or delete data, slow down operations, and disrupt normal computer
functions.
Viruses require a host file to replicate and spread.
4. Malware
Malware, short for "malicious software," refers to any software designed to damage,
disrupt, or gain unauthorized access to a system.
It includes viruses, worms, trojans, ransomware, and more.
Malware poses a serious threat to data security and system functionality.

Types of Malware

1. Worm
A worm is a self-replicating type of malware that spreads independently across
networks.
Unlike viruses, it does not require a host file to propagate.
Worms can consume system resources and cause significant damage to network
performance.
2. Trojan Horse (Trojan)
A Trojan is a type of malware disguised as legitimate software.
Once installed, it can create security vulnerabilities, steal data, or allow remote access
to the system.
It does not self-replicate like viruses or worms.
3. Sweeper
A sweeper is a form of malware designed to delete or wipe data from a computer
system.
It is often used in cyberattacks to erase crucial information.
This type of attack can lead to permanent data loss.
4. Password Guessing
Password guessing involves attempting to gain access to an account by trying
different combinations of letters, numbers, and symbols.
Hackers may use automated tools to speed up this process.
Weak or common passwords make systems vulnerable to such attacks.
5. Ransomware
Ransomware is a type of malware that encrypts or locks users' data and demands
payment (ransom) to restore access.
It usually spreads through malicious links or infected attachments.
Victims often lose access to important files unless they pay the demanded amount.

6. Adware
Adware is a type of software designed to display advertisements on a user's device,
often without their consent. It can be bundled with other programs or installed
unintentionally. While not usually harmful, adware can slow down a device and
compromise user experience or privacy.

Ways to protect against cyberattacks:


Authentication

Authentication is the process of verifying the identity of a user or system.


It ensures that the person trying to access a system is who they claim to be.
Examples include entering a username and password, using fingerprints, or OTP (One-Time
Password).

Authorization

Authorization is the process of giving a user permission to access certain resources or


perform specific actions.
It occurs after authentication and determines what a user is allowed to do.
For example, a student may be authenticated to log in, but only a teacher may be authorized
to edit marks.

Accounting

Accounting refers to tracking and recording user activities in a system.


It helps maintain a log of what actions were performed, when, and by whom.
This is useful for auditing, detecting unauthorized activities, and ensuring responsible usage.

Confidentiality

Confidentiality means protecting information from being accessed by unauthorized people.


Only those with proper permission should be able to view or use the data.
This ensures sensitive information like passwords, personal details, or financial data stays
private.

Netiquettes (Internet Etiquettes)

1. Always use polite language and respect others’ opinions in emails, messages, and
forums.
2. Avoid sharing personal or false information. Once something is online, it’s hard to
remove. So, Think Before You Post.
3. Use Proper Language and Grammar.
4. Do not share someone else’s personal information, photos, or messages without
permission. Respect Others’ Privacy.
5. Do not send unwanted messages, repeated texts, or unnecessary links to others. Avoid
Spamming.

Email Etiquettes

1. Use a Clear and Relevant Subject Line that tells the reader what the email is about.
2. Begin your email with a polite greeting like “Dear Sir/Madam” or “Hello [Name]”.
3. Keep Your Message Short. Avoid long, unnecessary details.
4. Avoid using SMS language. Always check for spelling or grammatical errors.
5. Avoid Using All Uppercase Letters as it is considered shouting and is generally seen
as rude or aggressive.

You might also like