Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Security, Privacy, and Ethics Online Computer Crimes.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
New Data Regulation Law 201 CMR TJX Video.
Internet safety By Lydia Snowden.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
IT in Business Issues in Information Technology Lecture – 13.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
CONTENTS What is Virus ? Types of computer viruses.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Computer Ethics, Viruses, and Copyrights
Information Technology
Unit A: Exploring Computer Systems
Computing Issues that Affect Us All
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Ethics, Viruses, and Copyrights
Computer Ethics.
BCT 2.00 Analyze Technology Issues
What is Information Security?
Computing Issues that Affect Us All
Computing Issues that Affect Us All
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Course: Introduction to Computers Lecture: 6

 Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.  You should do the following:  Copy the software only for back up.  Don’t share the software with other people.  Copying the software over the network should be under the terms of license agreement.  Software piracy is a crime.

 When you buy a software you purchase a license to use it not for copyright.  There is a license agreement that written on the back of the carton or in the software installation start.  There are two type of license:  A Single user license : can install the software into only one computer.  A multi-use license : can install the software into a number of computers, the number that is specified by the license agreement.

 Commercial software: Any software you buy is a commercial software. ”Has copy rights”.  Trail Software: Software where you can install it via the internet or CD’s for a period of time, after this period the software will stop working. ”Has copy rights”.  Free Software : Software that is distributed freely on the internet, there is no payment. ”Has copy rights”.  Public Software: It is public, free, without copy rights.

 Copy your software, files and information.  Use it when your original copies are damaged.  Backups can be made by different methods:  Copy onto external HD, CD’s, DVD’s, … etc.  Backups must be made on regular basis.  Can use automatic back-up programs.  Keep it in a secure and safe place.  Keep different copies in different places.  Label it.  Disks should be write-protected.

 Information Security: is a system of guarantees for protecting information technology against disasters, system failure, unauthorized access that can result in damage or loss.  Security not only involved physical security, but also the security of the data.  Do the following:  Computer must be protected from damage (hardware, software).  Data must be backed up and protected from viruses.  Password must be used.  Use encryption and decryption cods.  Use anti-viruses.

 Means maintaining data confidentiality and no one is authorized to access them.  You should follow these points to protect the privacy of others:  Use of data: for one or more people or for specified purposes.  Retention of data: shall not kept for longer than necessary.  Disclosing information: for anything than the purpose.  Security.  Rights for the person to access his information.

 Access for only who have a legitimate right to access to them through the following:  User Passwords  User Authentication  User Authorization

 Computer Crimes : Are the unlawful uses of any component of a computer system.  Computer crimes issues such as:  fraud, espionage, fraud, vandalism and theft issues.

 The theft of a laptop computer will causes the access to a confidential files, and loss of important contact details.  Never leave your laptops, PDAs in a public places.

 They are software programs, which are written with the intention of causing inconvenience and disruption of series damages in a computer system.  Viruses Spread ways:  Computer networks.  Copying and distribution of illegal software through the internet.  attachments.

Viruses cont. 12  Types of viruses:  Worms.  Time bombs.  Boot-sector virus.  File virus.  Multipartite virus.  Macro viruses.  Trojan horse.

 It is important to keep the Anti-virus software up-to-date. (updated) Example on famous anti viruses: Avira, Norten, Avast..etc  Do the following if don’t have the last update:  Do not use CD from unreliable source.  Use only registered software.  Never open an attachment unless it is from a reliable source.  Keep regular back-up.

Symptoms of Virus Attack 14  Computer runs slower then usual  Screen sometimes flicker  System crashes for no reason  Files/directories sometimes disappear  Display a message

 With computing systems became personal data stored in all areas (health - banks - telecommunications companies, electricity and water - Internet companies - government entities - insurance companies - social security, etc.)  Your personal data is no longer yours alone (the possibility of counterfeiting and Change)  There is legislation that protects personal data have been enacted in some countries.  Ex: you can check if your ID used in somewhere (work field)without you know by check this out: 

 Set of rules that’s controls the use and the users of the computer and the result data.  The data processor or the data user must know that:  It is personal data shall be processed, fairly and lawfully.  To use the data for the purpose that it was collected.  To keep the information accurate and up to date.  To keep the data safe and never disclose it to other.  To retain the information only as long as required.  To provide access to person whom the data refers to, upon request.

 The following data types are excluded from the ethics above:  Data for national security protection.  Data of retirement salaries.  Personal data for family purposes.