Page 1 :
After completing this chapter, you will be able to, Computers are used now-a-days in almost all fields of life. This age is called the age of, Computer Ethics,, Crime And Security, 18, LEARNER'S OUTCOMES, define computer ethics, define software piracy and its types, list the various computer security issues, • list major ethical issues in computer, • define hacker and cracker, ue Cordova Smart Class Software on the smart board in class to learn about computer ethics, crime and security., OINTRODUCTION, omputers. Computers are used in education, business, manufacturing, designing,, entertainment, research and development. It is one of the greatest inventions of our time., But as some great inventions are misused by few people to cause harm, similarly, computers can also be used to cause harm., O COMPUTER ETHICS, You must be aware of certain ethics related to the use of computers. Ethics are beliefs, and rules. These rules state what is right and what is wrong Ethics are important in our, day-to-day life also., The advancement of technology makes it possible for unethical and criminal activities to, be carried out in a more sophisticated way Children should thus be aware of moral and, ethical issues, and must develop a good sense of social responsibılity There are always, people who are violating the rules of society for'money'or sometiımes just for 'fun', Let us discuss some of the major ethical issues in the world of computers now-a-days., Intellectual Property Rights, Property is something you own. You have right over your property It is protected by law., Similarly, ideas and thoughts produced by the mind are also protected by law. It is illegal, to use them without the permission of the owner or producer. The rights related to literary, or artistic work, inventions and discoveries are called intellectual property rights., Copyright©, You must have seen this © symbol. The © symbol is widely used. It means All Rights, Reserved. This symbol shows the material to be the sole property of the owner It is, unlawful and unethical to use them without the permission of the owner. If some material, is downloaded and used, you must acknowledge the author sincerely. This is called, referencing., Computers-8, 000, 91, Scanned by Scanner
Page 2 :
Software piracy is the illegal reproduction and distribution of the software application, Software Piracy, Software piracy has a significant impact on the economy. It leads to job losses and t, losses to the software companies. The different forms of software piracy are:, End-User Piracy : All software are licensed. When someone copies software without, appropriate license for each copy, it is called the end-user piracy., Internet Piracy : Unauthorised copies downloaded over the Internet falls under Inten, piracy., reven, Pre-Installed Software Piracy : When a computer manufacturer takes one copy of, particular software and illegally installs it on more than one computer, it performs p, installed software piracy., Counterfeiting: People make duplicate CDs of original software and sell them at lo, price. This activity falls under counterfeiting., Online Auction Piracy : This is selling of software that is never authorised for resale bya, third party. Some of the limitations of pirated software are, • can contain viruses, • no warranty protection, Privacy, Privacy is an important aspect of life It is unethical to infringe the privacy of other people, without the consent of the person. If you are given permission to access someone else, computer and allowed to view his or her information, you must not disclose it to other people, COMPUTER CRIME, CRIME SC, As in the case of other systems and fields, there are also crimes, related to computers. Computer crimes result from the deliberate, tampering with data and information, The people who are associated with computer crimes are often called Hackers, Cracker, Virus Programmers, Breachers and Information Warriors. Whatever name they mu, have, they are the people who violate computer security., A hacker is a person who breaks into a computer system to get illegal access to th, information stored there. A hacker may not cause any harm to the system or organisati, but hacking is still llegal and unethical., A cracker is a person who breaks into a computer system just like a hacker, with t, intention to steal passwords, files or programs for unauthorised use. They may sell th, information to some other people for money. Crackers cause financial damages to, organisation., 92, Scanned by Scanner
Page 3 :
lultiple Choice Questions, Acknowledging the other for downloading and using the material is called, ick ()the correct option., . are beliefs and rules stating what is right and whatis wrong., (b) Ethics, (a) Privacy, Copyright means, (a) All Rights Reserved, (c) None of these, (b) Intellectual Right, (c) both (a) and (b), (a) privacy, (b) referencing, (c) counterfeiting, ) COMPUTER SECURITY, mputer security includes procedures and techniques that are, signed to protect a computer from accidental or intentional theft,, Lauthorised access or manipulation., mputer security breaches are often viewed as a disaster for the user because they can, use serious damages to both the individual user and the organisation. Such damages, ay include loss of revenue, valuable data loss, productivity loss and many more which, ay even lead to bankruptcy. Computer security breaches are broadly divided into the, llowing categories., , Hardware breaches can be both intentional and accidental. Cables, modems and, phone lines are often vulnerable to security breaches., | Software breaches include computer viruses and password cracking., | Networks are used to transmit data and information, they may be trapped by, unethical people to access information about the various aspects of a company., | Natural disasters like hurricanes, earthquakes and floods could cause security, breaches., mputer security controls are established and implemented to reduce security breaches., lore Fun In Lab, fisit the computer lab and find out the measures used to ensure the computer security., ey Points, * Ethics are beliefs and rules stating what is right and what is wrong., • Copyright means All Rights Reserved. The © symbol shows that the material to be the sole, property of the owner, * Software piracy is the illegal reproduction and distribution of software, ' A hacker is a person who breaks into a computer system to get illegal access to the information, stored there, A cracker is a person who breaks into a computer system with the intention to steal passwords,, files and programs for unauthorised use, mputers-8, 93, Scanned by Scanner Go, 000
Page 4 :
Use Cordova Smart Class Software on the smart board in class to do these exercises, EXERCISES, Section-A, A Quiz, 1. Name any two ethical issues in the world of computers., 2. Name the different forms of software piracy., B Multiple Choice Questions, Tick () the correct option., 1. © is the symbol of., (b) emoticons, |(c) copyright, (a) e-mail, 2 When someone copies software without the appropriate licence for each copy, it is a, | (b) End-User Piracy, |(c) both (a) and (b), (a) Online Auction Piracy, 3. Pirated software may contain ., (a) hacker, (b) viruses, (c) none of these, 4. Which of the following is not a computer security breach?, (a) Copyright, C Fill in the blanks, 1 Software piracy 1is the illegal, 2. It is., 3. Computer security includes the, protect the computer system, (b) Networks, (c) Natural Disasters, and, of software, to infringe the privacy of other people without their consent., that are designed, and, Section-B, Answer the following, 1 What does a copyright symbol indicate?, 2. What are the limitations of a pirated software?, 3. Explain the importance of ethics., 4. What do you mean by privacy?, 5. What are intellectual property rights', 6. Whatis the difference between hacker and cracker?, 7. What is software piracy? Explain the dıfferent forms of software piracy., 8. Explain security breaches in computers., FUN ZONE, TIVITY, Prepare a poster to show the importance of ethics., Scanned by Scanner Go, maial uww rordovaiovfullearning.com