Presentation Computer Crime A type of crime in which a computer is the target or tool for an illegal activity is called computer crime . Computer Criminals. Types of computer criminals......... Hacker Cracker script Kiddie Corporate spy Unethical employee Cyber Extortionist Cyber Terrorist Methods used by computer criminals Bomb Data diddling Denial of service Piggy backing Salami Technique Security:~ Is a system that is used to protect a computer system and data . Protects from intentional Or accidental damage or access by unauthorized persons . Controlling Access . what you have? what you know? what you do? what you are? Disaster of security violation. Loss of hardware. Loss of processing ability Loss of software Loss of data Data security The protection of data is called data security. A data stood in computer can be lost due to different reasons.it can be lost accidentally or some one can damage it. Data can be lost completely or partially some organization obtain data from the users and store data online to provide fast services . A credit card company may store data of its customers online. . A bank may provide online services using online data storage data storage for the records. . A university may provide the facility of online results. BACKUP OF DATA. An additional copy of data or information stored on secondary storage media is called the backup of data. The common media for backup. Zip Disk Floppy Disk Magnetic tape CD-ROM. Purpose of Backup 1.An important file can be deleted accidentally. 2.The user may overwrite a part or a whole of an existing file. 3.A mechanical failure in the computer may result in loss of data. 4.a virus may damage the data stored on the computer. 5.The computer system may be stolen by anybody. TYPES OF BACKUP 1.Complete backup. Backup of all data on the hard disk is called complete backup. 2.Incremental backup. Incremental backup creates a copy of only the data that is newly created or modified since the last backup. MEDIA FOR DATA BACKUP. Different type of media can be used for backup of data. USB flash drive zip disk Magnetic tape CD. Computer Virus. A computer virus is a program that may disturb the normal working of a computer system. A file containing a virus is called infected files. ACTIVATION OF VIRUS. When the computer virus start working, it is called the activation of virus different viruses are activated in different ways. DAMAGE CAUSED BY VIRUS. Computer virus cannot damage computer hrdware.it may cause many damages to a computer system. A virus can, 1.A computer virus can damage data or software on the computer. 2.it can delete some or all files on the computer system. 3.It can destroy all data by formatting hard drive. 4.It may display a political or false message every few times. CAUSES OF COMPUTER VIRUS. 1.Infected flash drives 2.Email attachments 3.insecure websites PROTECTION FROM VIRUS. virus infect computer system if Antivirus is not installed. Latest Antivirus software should be installed on computer to protect it from virus. 1.The latest anti-virus should be installed on the computer. 2.The antivirus software must be upgrade regularly. 3.The floppy disk should be scanned for virus before use. 4.Junk or unknown email should not be opened. 5.Unathorized or pirated software should not be installed on the computer. 6.An important way of protection against virus is the use of backup of data. The backup is used if the virus deletes data or modifies it. HACKING An illegal access to a computer or a network is called HACKING. HACKING involves compromising the security of networks. Breaking the security of application software or creating malicious programs such as virus. The most popular form of network hacking are denial of service (DOS) attacks and mail bombs. DoS attacks are designed to attack a computer network to crash it. Privacy. privacy means that an individual has the right to see the data collected about him. He also has the right to submit an application to view that data at any time. he also has the right to stop the processing of his data by an organization. ENSURING PRIVACY. -The organization is responsible for keeping the data updated. -The organization should keep data for the specified period of time only. It cannot keep it longer than necessary time period. -The organization is responsible for all kinds of security of data. Privacy Risks. Data protection laws are defined to ensure data protection. many countries define data protection legislation. Data protection legislation of all countries is based on same principle. But there are many privacy risks yet. 1.public information availability 2.wireless communication 3.Government threat to privacy 4.workplace threat to privacy Commercial Threats to Privacy. -cookies -global unique identifiers -Location tracking -Spyware -Spam Protection from Threat to Privacy. - Industry self regulation - Government Regulation passing - consumer self protection - Secure socket layer (SSL) - Email filtering - Anti Spyware Copy right laws related related to computer & software use. copyright laws cover software programs to protect them from privacy. A copy right mean that original author or creator of the work retains ownership of the work. different laws related to computer and software use are as follow.... Copyright Act 1976 Computer Fraud & abuse Act 1984 1987 Computer security Act Computer misuse act 1990 CAN-SPAM Act 2003 Spam. Spam is an unsolicited email message or newsgroup posting. Spam is sent to a large number of recipients are once, It is also known as Junk mail . The average user receives more than 1000 spam email messages each year. Spam is normally used for following purposes. . Selling a product or service . promoting a business opportunity. . Advertising offensive material etc. The user can avoid spam messages with the following techniques. Some email programs provide built-in settings to delete spam automatically. Email filtering can be used to block spam emails. Email filtering is a service that block emails messages from specified sources. Anti- spam program can be used to remove spam before it reach inbox. The disadvantage of using email filter and anti - spam programs is that these programs something remove valid email filter and anti-spam programs is that these programs sometimes remove valid email messages also. Antivirus. Antivirus software is used to detect and remove viruses worms and adware etc. Antivirus software contain information about different known viruses. Antivirus software runs in the background all the time. It alerts the computer user when any virus is detected. Examples Some examples of antivirus software are as follows. . Symantec Antivirus. . McAfee . AVG . Kaspersky . Bit Defender . NOD32 Managing an Antivirus. Antivirus software is very important for the safety of a computer system. It protects the data and files stored on the computer from different security threats. The latest antivirus program must be installed on the computer. The antivirus software should be managed properly to detect and remove viruses worms and adware from the computer system. Many new viruses are created and spread continuously. The antivirus software must be updated regularly in order to protect the computer properly. Virus Definitions / Updates. A virus is also called virus signature. Virus definitions contain the information about different security threats like virus worm and adware . Importance of virus Definitions / Updates. Virus definitions / updates are very important to protect the computer from security threats. The virus definition must be updated regularly . McAfee. McAfee is an American organization that develops antivirus programs . It developed an antivirus program called McAfee Virus scan . Site license. Site license is a permission to use software on a fixed numbers of computers in an organization. In a large organization, it is very expensive to purchase separate copyright of software for every individual computer. If the same software is to be used on many computers , an organization can purchase single copy the software along with site license. the software with the site license is normally installed in a network environment. it is available to all computers connected to the network. Many users of that organization can use the same software. It is less expensive than purchasing license for all users individually. Security on the Internet. internet security is the practice of protecting and preserving private resources and information on the internet. The information transmitted over the internet has a high degree of security risk. there is no central administrator on the internet. The data sent over the internet travels on different computers. every computer can read this data the un authorized persons like hackers can excess personal data and misuse it. Internet Security Risks. 1.unauthorized access 2.spoofing 3.Online predators 4.denial of service attack 5.Information theft Protection from internet security risks. 1.FIREWALL 2.Encryption. basic types of encryption...: (1).secret key (2).public key encryption Protecting children on the internet. .access privileges .blocking software .child monitoring Ethics in Computing Ethics are the rules to determine the right and wrong. most ethical beliefs are learned in childhood and are derived from family, society or religion. ethics are different from laws. a law is an external rule that causes punishment if it is violated. ethics are internal principles that influence decisions. 1.the computer should not be used to harm others. 2.the user should not be used to abuse his power. 3.the copyrighted software should not be copied illegally. 1.digital divide the gap between the people who have access to computers and the internet and the people who do not have these facilities is called digital divide. this Division allows people with computers and internet access to take advantage of personal and economic opportunities. The world bank and other international bodies have created initiatives to overcome the digital divide around the world. 2.workplace important issues at workplace. 1.Healhty Computing some serious health problems are occur if a user sits in front of computer in awkward positions for a long period of time. these problems include stress, eyestrain ,headache and back pain. A. Physical Health/Ergonomics. 1.Eyestrain and headache 2.back and neck pain 3.Repetitive Strain Injury 4.Employee Monitoring 2.Envirnomental concerns The Environmental protection Agency (EPA) has created Energy Star program to discourage waste in microcomputer industry. It resulted in the concept of Green PC. system unit Display Manufacturing 3.personal Responsibilities for protect environment Conserve Recycle Educate 2.Significance of Ethics in computing 1.Professional Ethics there are different types of computer professionals. these professional are include the programmer, system analyst, administrator and computer operator etc. Well-known organization ASSOCIATION FOR COMPUTING MACHINERY (ACM) has developed a code for ethics and professional conduct. The code is divided into three sections * General Principals * Professional responsibilities * Guidelines for organizational system 4.Intellectual Property Intellectual property is unique and original works such as idea, inventions, writings and logos etc. 1. Categories of intellectual property rights 1.copyright a copyright is a type of legal protection that is given to an intellectual property. * digital contents * digital images * software • Plagiarism 2. patent are designed to protect inventions the patent holder is granted exclusive rights to the invention for twenty years 3. Trademark a trademark is a word, name, symbol or device that is use to distinguish one company and its products from another. the business identity is typically protected by trademark.