Computer Security and Ethical and social issues in ICT
COMPUTER SECURITY
Explain the term computer security.
Computer Security refers to protecting computer system (hardware and software) and its resources such as information (data and programs), against unwanted access, damage, modification or destruction.
What are computer security goals?
Computer
Security Goals:
a)
Confidentiality
b)
Integrity
c)
Availability
What are computer security threats?
Computer
security threats
a) Phishing : Phishing is the fake attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
b) Rootkit: A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
c) Botnet :A botnet is a network of computers infected with malware that are controlled by a bot herder.
d) Keylogger : Keylogger is hardware or software for recording the keys pressed on a keyboard secretly so that person using the keyboard does not know that their actions are being monitored.
e) Hacking : Unauthorized means of accessing others system resources for illicit purposes.
f) Malicious code : Malicious code is the kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems.
g) Malware
: The word Malware is short for malicious software and is a general term used
to describe all of the viruses, spyware, worms, adware, nagware, trojan, and
pretty much anything that is specifically designed to cause harm to your PC or
steal your information
What is computer virus?
Computer virus -Computer Virus is a self-replicating computer program
that interferes with the computer’s hardware or the operating system resulting
in the malfunctioning of a computer system.Viruses are designed to replicate
and elude detection.
Examples of viruses: TIME BOMB,
C-BRAIN,DATA CRIME, WIN32 VIRUS etc.
What is a worm?
Worm-A worm only makes a copy of itself so it cramps the computer’s memory and slows down the processes.
Explain the nature of trojan horse.
Trojan horse -A Trojan is a type of malicious code or software it appears to be something interesting, such as a game but when it runs it may have harmful effects on your data or network.
Define ransomware.
Ransomware -Ransomware is a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key,
What is spyware?
Spyware - Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
Security
mechanisms
a)User identification and authentication (password/email/sms codes for verification etc.)
b)Biometric techniques (finger print/face recognition etc.)
c)
Firewall- A
firewall is software or firmware that prevents unauthorized access to a
network. It inspects incoming and outgoing traffic using a set of rules to
identify and block threats
What is cryptography? why it is used?
Cryptography/data
and information security (cipher /coded message/ encrypted)
cryptography is used to protect digital data. It transforms data into formats that cannot be recognized by unauthorized users. An example of basic cryptography is a encrypted message in which letters are replaced with other characters.
Explain the term decipher or de-encryption.
de-cipher/de-code/ de-encryption- the process converting encrypted content to readable/understandable form.
What is data/software backup? Why do we need backup?
Data/software
backup (copy of original data and software) Backup is the process of creating a
copy of the data on your system that you use for recovery in case your original
data is lost or corrupted.
List hardware security measures.
Hardware
security
Regular
maintenance
Power
protection devices
Why do we need power protection devices like UPS in a computer system?
UPS-an uninterruptible power supply, is a device used to backup a power supply to prevent devices and systems from electricity failure. UPS saves the system from any electric damages to any unit or circuits and from loss of data.
Why do we need voltguard?
Voltguard-
Volt Guard:
Volt Guard is another power protection device. It provides constant
output voltage to the computer system in case of high input voltage coming from
the source.
What is spike guard?
surge/spike protector-A Spike Guard is an electrical device used to protect electrical equipments from voltage spikes, surges, and fluctuations.
Explain the importance of an anti virus software in a computer system
Antivirus software : Antivirus software’s are the best possible means of
protecting a computer system and its resources from viruses.
Antivirus software are capable
of detecting and eliminating viruses. Antivirus software’s needs to be updated
constantly (daily).
Examples of antivirus software:
AVAST,AVIRA,AVG,MCAFEE,KASPERSKY,
BIT DEFENDER, NORTRON ANTIVIRUS,PC-CILLIN,CPAV,MSAVetc.
Computer Security
Questions
1. Explain
the term computer security.
2. What
are computer security goals?
3. List
the computer security threats
4. Define
the following terms
a) Phishing
b) Rootkit
c) Botnet
d) Keylogger
e) Ransomware
f) Spyware
g) spam
h) Malware/malicious
code/computer virus
i) Worm
j) Trojan
horse
k) Hacking
5. List
two computer hardware security measures.
6. List
two software security measures.
7. What
is password?
8. List
two biometric technique used for authentication.
9. What
is data encryption?
10. What
is data de-encryption?
11. What
is the importance of backup in terms of computer security?
12. Why
do we need power protection devices like UPS in a computer system?
13. Mention
the use of voltguard and spike guard.
14. Explain the importance of an anti virus software in a computer system
Ethical and social issues in ICT
Cyber Law- Cyber law may be
defined as the law or acts or rules framed and adopted by the concerned
authority like the individuals, organizations or Government for safeguarding
against digital crime or any crimes concerned with computers or any other
digital media that are performed by the people willfully to damage, make loss
or steal information etc.
Define cyber crime.
Cyber Crime- Cyber -crime relates
to the criminal activity involving the use of computers and other electronic
media. Cyber Crime may be defined in a general way as an unlawful act
wherein the computer is either a tool or a target or both.
Cyber- crime involves activities such as theft of
money, services, data and programs , destruction of data and programs by
computer viruses, violation of privacy (hacking) and violation of anti-trust or
International law etc.
What is cyberbullying?
Cyberbullying: Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.
The most common places where cyberbullying
occurs are:
Social Media, such as Facebook, Instagram,
Snap Chat, and Twitter
SMS
(Short Message Service) also known as Text Message sent through cell phone
Instant Message, Email etc.
Examples of cyberbullying:
*Sending rude emails, texts or instant
messages online or on the phone
* Offensive chat on online gaming Posting
hurtful things about someone on social media
Spreading rumours or gossip about someone
online
Making fun of someone in an online chat
that includes multiple people
Pretending to be another person by creating a fake online profile
Threatening or intimidating someone online
or in a text message
Taking an embarrassing photo or video and
sharing it without permission
Effects of cyber crime
a)
Loss of time and resources
(money/information) in tracing, fixing and managing the safety mechanisms.
b)
Privacy of public and important
governmental information can be leaked and used for ulterior motives.
Safety from cyber crime:
a)
Controlling the access of computer
and its resources with authentication system such as the username and password.
b)
Using firewalls and antivirus
programs etc.
Cyber Space-In computer jargon,
the community of networked computers and the culture that has developed among
the users of these computers is termed as cyberspace.
***note***
The term cyber space was coined by an American writer
William Gibson and is first published in his 1984 science fiction novel
Neuromancer. In which he described cyberspace as a place of unthinkable complexity.
The term has given rise to a vocabulary of cyber
terms such as cyber-cafes, cyber-malls etc.
Computer Ethics
What is computer ethics?
Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making/ causing harm to other users.
Computer ethics emphasizes to use computer for
performing only legal and accepted activities, and it encourages users to
abstain from illegal activities such as :
a) Plagiarism
b) Copyright
Infringement
c) Software
Piracy
d) Hacking
etc.
Important points (commandments) of computer ethics:
a)
Do not use a computer to harm other
people.
b)
Do not copy or use proprietary software
for which you have not paid.
c) Be responsible about the social
consequences of the program you are writing or the system you are designing.
d) Be mindful to use a computer in ways that
demonstrate consideration and respect for your fellow humans.
Cyber
ethics: Cyber ethics is a code of behaviour for
using the Internet for performing only legal and accepted activities.
Mention three do’s of cyber ethics.
Do’s
a)
Use the Internet responsibly and respect
others privacy.
b)
Tell someone if you are being bullied
online
c)
Use chat-room site that are public,
monitored and are child friendly.
Mention three don'ts of cyber ethics.
Don’t
a)
Don’t copy any material and call it your
own.
b)
Don’t give/share personal information to
others.
c)
Don’t fake identity and pretend to be
someone else.
What is digital citizenship?
Digital citizenship-
Digital citizenship is the responsible use of technology and etiquette
pertaining to an online presence.
Nine elements of digital citizenship
a)
Digital access
b)
Digital commerce
c)
Digital communication and collaboration
d)
Digital etiquette
e)
Digital fluency
f)
Digital health and welfare
g)
Digital law
h)
Digital rights and responsibilities
i)
Digital security and privacy
Digital footprint
– Digital footprint is the trace you leave with your online activity. It can
include:
a)
What you post to social network or blogs.
b)
What other people post about you on
social networks. (photos, videos, comments etc.)
Categories of digital footprint.
a)
Active – Active digital footprint is
created when a user willingly releases personal data for the purpose of sharing
information.
b) Passive- Passive digital footprint is
created when data is collected about online activity without client activation.
Cyber
law of Nepal – cyber law of Nepal commonly known as the
Electronic Transaction and Digital Signature act-ordinance was enacted in Nepal
in 2061 BS (2004)
What is Electronic
Transaction Act (ETA)?
ETA
2063 (2006) commenced from Bhadra 2063
it was formulated to deal with issues related to cybercrime and also
help in making and implementing laws over cybercrime and other IT related
issues.
IT
policy-
It policy is a set of rules and guidelines on how IT resources should be used
and how daily operations should be conducted.
IT
policy of Nepal 2072 (2015)
The
latest IT policy of Nepal was formulated and published in the year 2015. It was
named “Nepal Information and Communication Technology Policy 2015.
The
vision of this policy is to transform Nepal into an information and knowledge
based society and economy.
Define social media.
Social
media-
social media is an Internet based technology that supports the sharing of
ideas, thoughts and information by building the virtual networks and
communities.
What are social media opportunities?
Social
media opportunities: Great opportunities for individuals and
organizations to connect and exchange information.
a)
Brand development
b)
Target Audience
c)
Customer interaction
d)
Attracting customer
e)
Research
What are Social media threats?
Social Engineering - One of the biggest threats of social media is social engineering. It allows attackers to find personal information that can be used to target specific individuals.
Targeted Phishing Attacks
Fake Accounts
Social Media used for spreading spam and malware
Ethical and social issues in ICT
Questions:
1. Define
cyber crime.
2. List
effects of cybercrime.
3. Explain
safety measures from cybercrime.
4. Why
is cyber law needed? (what is cyber law)
5. Explain
the term cyber bullying. Cite examples of cyber bullying.
6. What
is computer ethics?
7. Write
four important points of computer ethics
8. Mention
three do’s of cyber ethics.
9. Mention
three don’t of cyber ethics.
10. Explain
the term digital citizenship.
11. List
four elements of digital citizenship.
12. What
is digital footprint?
13. Explain
active and passive digital footprints.
14. Write
a note on cyber law of Nepal.
15. Write
a note of electronic transaction act of Nepal.
16. Write
a note on IT policy of Nepal.
17. What
is social media.
18. List
the scope social media.
19. What
are social media threats?
20. Explain
the term social engineering
Comments