Computer Project '24
Computer Project '24
ETHICS
● ACKNOWLEDGEMENTS
● INTRODUCTION
● COMPUTER ETHICS
● MAJOR ETHICAL ISSUES
● HACKING AND PIRACY
● GETTING PROTECTED
● COMPUTER CRIME
● 10 COMMANDMENTS OF COMPUTER
ETHICS
● BIBLIOGRAPHY
● THANK YOU
ACKNOWLEDGEMENT
I would like to express my Gratitude to the sources that have helped
me in writing this project.
Thank you..
INTRODUCTION
Ethics play an important role in our life styles and way of
doing things.In general we may define ethics as the field of
study that is concerned with question of value i.e. making
judgements about good or bad behaviour in any given
situation.
The term is derived from the Greek word ethos which means
custom Habitat character or disposition.
➢ Collecting Information
➢ Storing Information
➢ Distributing Information
INTELLECTUAL PROPERTY RIGHTS
Intellectual
property rights THE INTELLECTUAL PROPERTY RIGHTS MUST BE
are the rights of PROTECTED FOR :
the owner of
information is to ➢ Encourages businesses and individuals to
exchanged,shar create new software applications, as well as
ed or
distributed.
improving existing applications.
● SOFTLIFTING
● SOFTWARE COUNTERFEITING
● RENTING
4
COMMON FORMS OF ATTACK:
1. SPAMMING
2. COMPUTER VIRUSES
3. WORMS
4. MALWARE
GETTING 5.
6.
SPYWARE
ADWARE
PROTECTED 7.
8.
9.
TROJAN HORSES
SWEEPER
DENIAL OF SERVICES
10. PASSWORD GUESSING
11. PHISHING
PROTECTIVE MAINTENANCE
MEASURES
● TIMELY BACKUPS AT
● AUTHORIZATION REGULAR INTERVALS
● TRACING USER’S
HISTORY
● AUTHENTICATION
● SYSTEM SCANNING
● CHANGING PASSWORDS
● FIREWALL FREQUENTLY
● GOOD BROWSING
HABITS
TROUBLESHOOTING OR CURATIVE
MEASURES
COMPUTER ●
●
Sabotage
Theft of Documentation
● Forging of data
CRIMES ●
●
Fraud in figures
Selling reports
● Embezzling funds
● Installing bugs
6 ● Thou shalt not use a computer to harm others
MENTS OF ●
you have not paid
➔ SUMITA ARORA
COMPUTER
APPLICATION BOOK
FOR CLASS 9
➔ SITES USED:
britannica.com
chubb.com
THANK
YOU