0% found this document useful (0 votes)
26 views26 pages

Lecture (1) Introduction To Computer

Uploaded by

carab4 english
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views26 pages

Lecture (1) Introduction To Computer

Uploaded by

carab4 english
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Ethics For Computing

Eng Ahmed Mohamoud Goud

Kismayo University
Learning Objectives

There are some objectives why computer ethics was created:


 To ensure the privacy and safety of the computer users.
 To help people use the computer in the right ways.
Warta Nabada
To ensure District of the works done by someone did not declare by
the guarantee
other people.
Introduction to Computer
Ethics
What are Ethics?
Ethics are a structure of standards and practices that influence how people lead
their lives.
Warta
It is not Nabada
strictly Districtto follow these ethics, but it is basically for the
implemented
benefit of everyone that we do.
Continue….
Computer Ethics
Computer Ethics are a set of standards that govern the use of computers.
It is society’s views about the use of computers, both hardware and software.
Computer Ethics is a set of ethical principles that manage the performance of an individual
or group.

Warta Nabada District


Some common issues of computer ethics are privacy concerns, intellectual property rights
and effects on society.
Continue….
(1) Privacy Concerns
(1) Hacking:- Is unlawful intrusion in to a computer or a network.
A hacker can intrude through the security levels of a computer system or
network and can acquire unauthorized access to other computers.
 Broadly speaking,District
Warta Nabada you can say that hackers attempt to break into
computers and networks for any of the below four reasons.
Continue….

Broadly speaking, you can say that hackers attempt to break into

computers and networks for any of the below four reasons.

1) There's criminal is for financial gain, meaning the theft of credit card

numbers
Warta or defrauding
Nabada Districtbanking systems.

2) Next, gaining and burnishing one's reputation within hacker.


Continue….

3) Then there's corporate espionage or industrial espionage, when one


company's hackers seek to steal information on a competitor's products and
services to gain a marketplace advantage.
4) Finally, entire nations engage or hire in state-sponsored hacking to steal
business
Wartaand/or
Nabadanational intelligence, to destabilize or upset the stability of their
District
competitor’s infrastructure, or even to sow discord and confusion in the target
country.
Types of hacking/hackers
1. White Hat Hackers
White hat hackers, also known as ethical hackers:- Are the cybersecurity experts who help the
Government and organizations by performing penetration testing and identifying loopholes in
their cybersecurity. They even do other methodologies and ensure protection from black hat
hackers and other malicious cyber crimes

Simply stated, Nabada


Warta these are the right people who are on your side. They will hack into your
District
system with the good intention of finding vulnerabilities and help you remove virus and
malware from your system.
2. Black Hat Hackers

A black hat hacker is the type of hackers that you should be worried.
If you heard a news about a new cybercrime today? One of the black hat hackers may be
behind it.

While their agenda may be monetary most of the time, it’s not always just that. These
hackers look for vulnerabilities in individual PCs, organizations and bank systems.
Warta Nabada District
Using any loopholes they may find, they can hack into your network and get access to your
personal, business and financial information.
3. Gray Hat Hackers

Gray hat hackers fall somewhere in between white hat hackers and black hat hackers.
While they may not use their skills for personal gain, they can, however, have both good
and bad intentions.
For instance, a hacker who hacks into an organization and finds some vulnerability may
leak it over the Internet or inform the organization about it.

A grayWarta Nabada
hat hacker is not aDistrict
White hat hacker. because he is not legally authorized to hack the
organization’s cybersecurity, he can’t be considered a Black hat either.
4. Script Kiddies

A derogatory term often used by amateur hackers who don’t care much about the coding
skills. These hackers usually download tools or use available hacking codes written by
other developers and hackers.
Their primary purpose is often to impress their friends or gain attention.
Hacker’s Hats
5. State/Nation Sponsored Hackers

State or Nation sponsored hackers are those who have been employed by
their state or nation’s government to investigate and penetrate through full
security to gain confidential information from other governments to stay at
the top online.
They have an endless budget and extremely advanced tools for their activities
to reach their target.
6. Hacktivist

Hacktivist is a hacker or a group of anonymous hackers who think they


can bring about social changes and often hack government and
organizations to gain attention or share their displeasure over opposing
their line of thought.
Continue….

(2) Malware, or “malicious software,” is an umbrella term that describes


any malicious program or code that is harmful to systems.

Malware can reveal itself with many different aberrant behaviors. Here are a few signs that
indicates whether you have malware on your system or not:
 Your computer slows down. One of malware’s side effects is to reduce the speed of
Warta Nabada District
your operating system (OS), whether you’re navigating the Internet or just using your local
applications.
Continue….
 Your screen is overpower with annoying ads. Unexpected pop-up ads are
a typical sign of a malware infection.
 Your system crashes. This can come as a freeze or a BSOD (Blue Screen of
Death).
 You notice a mysterious loss of disk space. This could be due to malware
Warta Nabada District
squatter or intruder, hiding in your hard drive aka Bundleware.
Continue….
 Your browser settings change. If you notice your homepage changed or
you have new toolbars, extensions, or plugins installed, then you might
Training of 60 small business proprietors on:-
have some sort of malware infection.
 Your antivirus product stops working and you cannot turn it back on,
leaving you unprotected against the sneaky malware that disabled it.
Warta Nabada District
Continue….
How do I get malware?
The two most common ways that malware accesses your system are the Internet and email.
So basically, anytime you’re connected online, you’re vulnerable.
Most Common Forms of Malware
1) Adware is unwanted software designed to throw advertisements up on your screen, most
often within a web browser.
WartaisNabada
2) Spyware malware District
that secretly observes the computer user’s activities without
permission and reports it to the software’s author.
Continue….
3) A virus is a program which can harm our device and files and infect them for no further
use.
4) A Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Trojans can be used to steal
financial information or install other forms of malware, often ransomware.
5) Ransomware is a form of malware that locks you out of your device and/or encrypts
Warta
your Nabada
files, then forcesDistrict
you to pay a ransom to regain access.
Ransomware has been called the cybercriminal’s weapon of choice.
Continue….
6) A keylogger is malware that records all the user’s keystrokes on the keyboard, typically
storing the gathered information and sending it to the attacker, who is seeking sensitive
information like usernames, passwords, or credit card details.

How to remove malware

I. Download and install a good cybersecurity program.


Warta Nabada District
II. Run a scan using your new program.
III. Change all your passwords.
Continue….
How to protect against malware
Avoid clicking on pop-up ads while browsing the Internet.
Avoid opening email attachments from unknown senders.
Do not click on strange, unverified links in emails, texts, and social media messages.
Delete any programs you don’t use anymore.
Back up your data regularly. If your files become damaged, encrypted, or otherwise
inaccessible, you’ll beDistrict
Warta Nabada covered.
Download and install a cybersecurity program that actively scans and blocks threats from
getting on your device.
Continue….

(3) Data Protection: Also known as information privacy or data


privacy is the process of safeguarding data which intends to influence a
balance between individual privacy rights while still authorizing data to
be used for Nabada
Warta businessDistrict
purpose.
(2) Intellectual Property Rights
Intellectual property rights are the rights given to the persons over the creations of their minds
and the main social purpose of protection of copyright and related rights to encourage and reward
creative work.
o A copyright - is a type of intellectual property that gives its owner the right to copy and
distribute a creative work, usually for a limited time.
o Plagiarism - Is the act of copying and publishing another person’s work with out proper
Warta Nabada District
citation.
o Cracking - It’s a way of skipping the registration and authentication steps when installing
software.
Some Commandments of Computer Ethics are:
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. ThouWarta
shalt notNabada
use other District
people’s computer resources without authorization or proper
compensation.
8. Thou shalt not appropriate other people’s intellectual output.
(3) Effects On Society
 Computer gaming influence society both positively and negatively.
 Computer technology helps the government in improving services to its citizens.
 Computer technology aids business by automating process, reports and analysis

Warta Nabada District


The END

You might also like