Thursday, 20 September 2012

COMPUTER ETHICS



"It is not enough that you should understand about applied science in order that your work may increase man’s blessings. Concern for man himself and his fate must always form the chief interest of all technical endeavors."
Albert Einstein.

Computer Ethics are the moral guidelines that govern the use of computers and information systems.

Seven frequently discussed areas of computer ethics are:
  • Unauthorized use of computers and networks
  • software theft (piracy)
  • information accuracy
  • intellectual property rights
  • codes of conduct
  • information privacy
  • green computing

Unauthorized use of computers and networks


Unauthorized access is the use of a computer or network without permission.

Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.


Software theft


Software theft occurs when someone;
  1. steals software media
  2. intentionally erases programs
  3. illegally copies a program or
  4. illegally registers and/or activates a program.
The first type of software theft involves a perpetrator physically stealing the media that contains the media. For example, an unscrupulous library patron might steal the Encyclopedia Britannica optical disc.

The second type of software theft can occur when a programmer is terminated from or stops working for a company. Although the programs are company properties, some dishonest programmers intentionally remove or disable the programs they have written from company computers.

The third type of software theft occurs when software is stolen from software manufacturers. This type of theft is called piracy, is the most common software theft. Software piracy is the unauthorized and illegal duplication of copyrighted software.
The forth type of software theft involves uses illegally obtaining registration numbers and/or activation codes. Some unscrupulous individuals create and post keygens so that users can install software illegally purchasing it.
Information accuracy

Many users access information maintained by other people or companies such as on the Internet. Do not assume that because the information is on the Web that it is correct. Be aware that the organization providing access to the information may not be the creator of the information.

Intellectual property rights

 It refers to unique and original works such as ideas, inventions, arts, writings, processes, company and product names, and logos. Intellectual property rights are the rights to which creators are entitled for their work. certain issues arise surrounding IP today because many of these works available digitally.

Codes of conduct
  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not use or copy software for which you have not paid.
  7. Thou shalt not use other people's computer resources without authorization.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you write.
  10. Thou shalt use a computer in ways that show consideration and respect.
Internet Privacy


Information Privacy refers to the right of individual and companies to deny or restrict the collection and use of information about them.

  • Electronic profiles
  • Cookies- a small text file that a Web server stores on your computer.
  • SPAM- an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroup at once. (Internet junk mail)
  • Phishing- a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

Green computing
 
Green computing, the study and practice of efficient and Eco-friendly computing resources, is now under the attention of not only environmental organizations, but also businesses from other industries. In recent years, companies in the computer industry have come to realize that going green is in their best interest, both in terms of public relations and reduced costs. This article will take a look at several green initiatives currently under way in the computer industry, as well as issues that have been raised regarding these initiatives. We will also have a talk with VIA to learn more about the future of green computing. 

VIA Technologies Green Computing;

* carbon-free computing   

*solar computing

*Lead-free and RoHS computing

*Energy-efficient computing  



Source:








SECURITY MEASURES

 

Security measures mean the precautionary measures taken toward possible danger or damage. There are 6 type of security measures.

1) DATA BACKUP


Data Backup is a duplicate of a file, program or disk that can be used if the original is lost, damaged or destroyed.Thus, to back up a file means to make a copy of it.

In the case of system failure or the discovery of corrupted files, you restore the files by copying the backed up files to their original location on the computer.

2) CRYPTOGRAPHY


Cryptography is a process of hiding information by altering the actual information into different representation.

Almost all cryptosystems depend on a key such as a password like the numbers or a phrase that can be used to encrypt or decrypt a message.

The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.

3) ANTIVIRUS


An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in the computer memory, on storage media or incoming e-mail files.

 An antivirus program scans for programs that attempt to modify the boot program, the operating system and other programs that normally are read from but not modified.

One technique that antivirus programs use to identify a virus is to look for virus signatures.A virus signatures, also called a virus definition, is a known specific pattern of virus code.

Example of antivirus programs :
  • AVG Anti-Virus
  • avast! antivirus
  • CA Anti-Virus
  • F-Secure
  • Kaspersky Anti-Virus


4) ANTI-SPYWARE


Spyware is a program placed on a computer without the user’s knowledge. It secretly collects information about the user.

The spyware program communicates information to the outside source.

An anti-spyware application program sometime called tracking software or a spybot is used to remove spyware.

Among of the popular anti-spyware programs are:
• Spybot Search and Destroy
• Ad-aware
• Spyware Blaster

5) FIREWALL


Firewall is a piece of hardware or software that protects a network's resources from intrusion by users on another network such as Internet.

Firewall implement a security policy. It might permit limited access from in or outside the network perimeters or from certain user or for certain activities.

Examples of stand alone personal firewall software :
  •  BitDefender Internet Security
  • CA Personal Firewall
  • McAfee Internet Security


6) HUMAN ASPECTS OF SECURITY MEASURES

Human aspects refer to the user and also the intruder of a computer system.
It is one of the hardest aspects to give protection to.

The most common problem is the lack of achieving a good information security procedure


 source: