SlideShare a Scribd company logo
CHAPTER – 5
Information and Society
1
OUTLINES
 5.1 Introduction
 5.2 Virtual Society
 5.3 Issues and Ethics in IT
 5.4 Computer Crimes
 5.5 Computer Viruses and Worms
2
5.1 INTRODUCTION
 In an information society, the focus of commerce becomes the generation and
distribution of information.
 A technology revolution is changing our way of life; the way we live, work,
and play.
 The cornerstone of this revolution, the computer, is transforming the way we
communicate, do business, and learn and an explosion of computing advances
is speeding this change.
3
5.2 VIRTUAL SOCIETY
4
 A virtual society refers to an online community or network where individuals
interact, communicate, and engage in various activities through digital
platforms.
It is a space where people from different backgrounds come together virtually to
connect, share ideas, collaborate, and build relationships.
In a virtual society, individuals can participate in discussions, join interest groups,
play games, attend virtual events, and more, all within an online environment
… VIRTUAL SOCIETY
 In Digital technology, there are 3 ways a computer system can verify whether
the user have authorized right of access.
 What you have? such as a smart card.
 What you know? Such as password.
 What you are? such as fingerprint, voice, face recognition etc.
5
…VIRTUAL SOCIETY
 Authentication mechanism are used to satisfy the user that entities, people, data, applications
or computers are actually what they claim to be.
 One of the most commonly used mechanism for authenticating people has been the password.
 Passwords are expected to be known only by the owner.
 However, passwords can be guesses or learnt by intruders through interception of
communications networks or re-use of encrypted passwords.
 Re-use of passwords can be prevented by time stamping or by using passwords only once.6
VIRTUAL IDENTITY
 Virtual identity refers to the online representation of an individual or entity in the digital
world.
 Virtual identities can include usernames, profiles, or any other form of online representation
that distinguishes an individual in the online realm.
 Identification theft: stealing your good name – TOI – Theft of Identity – is a crime in which
thieves hijack your Name and identity and use your good credit rating to get cash .
 To do these, what they need is simply knowing your individual credentials such as full name
and social security number.
7
VIRTUAL UNIVERSITY
 Distance learning is the use of computer and/or video networks to teach courses
to students outside the conventional classroom.
 Until recently, distance learning has been largely outside the mainstream of
campus life.
 That is, it concentrates principally on part time students, those who cannot easily
travel to campus, those interested in noncredit classes, or those seeking special
courses in business or engineering.
8
VIRTUAL SUPER MARKET
 We can view items by category [snack foods], item [cookies], or by brand and pursue items
on sale.
 We can request that items be arranged alphabetically by brand, price per unit, package size,
or we can even request a listing by nutritional value.
 In the minds of the busy people who shop online, the cost of the e-service is easily offset by
other savings [better prices, less spent on travel and so on].
9
VIRTUAL OFFICE
 Now big foreign companies are eliminating office and allowing employees to work from
any location they choose.
 Virtual offices are possible because of cellular telephones, fax machines, portable
computers, and other mobile computing and communication devices.
 Virtual offices helps to:
 To reduce office space
 Eliminate office infrastructure and cost
 Eliminate real estate costs
 Eliminate unwanted traveling time to office 10
5.3 ISSUES AND ETHICS IN IT
 Issues in IT can be classified into four categories such as:
 Security issue
 Quality of Life issue
 Economical Issue
 Privacy issue
11
ETHICS
 Ethics can be defined as a branch of philosophy dealings with the determination
of what is right or wrong, good or bad.
 Simply if we define” ethics are moral standards that help to guide, behavior,
actions, and choices.
 Ethics are grounded in the notion of responsibility and accountability.
12
ETHICS IN AN INFORMATION SOCIETY
 Basic concepts of ethics are:
 Responsibility
 Accepting the potential costs, duties and obligations for the decisions one makes
 Accountability
 The mechanisms for assessing responsibility for decisions made and actions taken
 Liability
 The existence of laws that permit individuals to recover the damages done to them by other
 Due process
 A process in which laws are well known and understood and there is an ability to appeal to
higher authorities to ensure that laws are applied correctly.
13
5.4 COMPUTER CRIMES
 The term computer crime includes any unauthorized use of a computer
system including software piracy or theft of system resources for personal
use including computer processing time and network access time.
 Actions intended to alter data and programs or to damage or destroy data,
software, or equipment is also crimes.
14
COMMON TYPES OF COMPUTER CRIMES
DATA DIDLING Changing data and information before they enter a system
DATA LEAKAGE Erasing or removing data and files from a system without indicating that they were
removed or leaving any trace, they ever existed.
LOGIC BOMB A program designed to execute when certain conditions occur. Designed to
sabotage system data, programs or processing [refer time bomb]
TIME BOMB A program designed to execute on a specific date and time. The program monitors
the computer’s internal clock or calendar. When the preset date arrives, the
program comes to life causing its damage.
TRAPDOOR An illicit and unknown point of entry into a program or network that can be used to
gain access to the system
TROJAN HORSE A program that appears to do one thing, but actually does something very
15
COMPUTER CRIMES….
 All these crimes are committed through intrusion, forced and unauthorized
entry into the system.
Computer crime through intrusion can occur by following ways:
 Hackers
 Crackers
 Viruses
16
COMPUTER CRIMES----
 Hackers
 A hacker is a person who gains access to a system illegally.
 Hackers usually gain access to a system through a network, but sometimes they will physically
enter a computer or network facility.
 Techniques helpful in deterring intrusion by hackers
 Change access passwords frequently
 Allow workers access to only the system functions they need to use
 Permit workers to access only the data that they need to use
 Encrypt data by scrambling or coding information.
 Keep staff well informed through education programs
17
COMPUTER CRIMES ---
Crackers
 Crackers also gain unauthorized access to information technology but do so for
malicious purposes.
 Crackers attempt to break into computers and deliberately obtain information
for financial gain, shut down hardware, pirate software, destroy and etc.
18
HACKERS VS CRACKERS
 In the context of computer security, hackers and crackers are often used interchangeably, but
they can have slightly different connotations.
 Generally, hackers refer to individuals who have advanced technical skills and knowledge in
computer systems and networks.
 Black hat hackers are individuals who engage in unethical and illegal activities related to
computer security.
 Ethical hackers, also known as white-hat hackers, work to enhance security and protect
systems from potential threats.
19
HACKERS VS CRACKERS….
 On the other hand, crackers are individuals who use their technical skills for
malicious purposes.
 Crackers are often associated with illegal activities, such as identity theft,
financial fraud, or spreading malware.
 It's important to note that not all hackers are crackers, as hacking itself is a
neutral term that can be used for both good and bad purposes.
20
5. 5 COMPUTER VIRUSES AND WORMS
VIRUS: A hidden program that alters, without the user’s knowledge the way a
computer operates or modifies the data and program stored on the computer.
 Computer intrusion occurs by way of software in the name of virus.
 Each virus has its own characteristics its own signature.
 Some destroy irreplaceable data.
21
…COMPUTER VIRUSES AND WORMS
 A virus is a typical program that attaches itself to a computer system and destroys or corrupts
data.
 Viruses are passed in three ways
 By diskette [copying ]
 By network [data sharing]
 By internet [ e-mail ]
 Some worms erase, destroy, and change the data.
 WORMS: A Worm is a program that copies itself repeatedly into memory or on to a disk
drive until no more space is left. 22
VIRUSES VS WORMS
 Viruses and worms are both types of malicious software (malware), but they differ in
how they spread and operate.
 A virus is a type of malware that attaches itself to a host file or program and replicates
when that file or program is executed.
 Viruses often need human action to spread, such as executing an infected file or
opening an infected email attachment.
 On the other hand, worms are standalone malware programs that can replicate and
spread independently without needing to attach themselves to other files or programs.
23
VIRUSES VS WORMS…
 In summary, viruses need a host file or program to replicate and spread,
while worms are self-contained and can spread independently.
 Both viruses and worms can cause significant damage to computer systems
and networks if not detected and mitigated in a timely manner.
24
METHODS OF VIRUS DETECTION
 All types of computers are vulnerable to viruses.
 To protect against them, companies must buy and use virus detection software. There are
three methods of virus detection.
 Scanning programs – search the computer and main memory to detect a virus
 Detection Programs – monitor processing activities and signal the user when a virus tries to
infect the system
 Digital signature encryption – uses a mathematical coding scheme designed to foil a virus’s
attempt to attack programs and data. 25
Thank You!
26

More Related Content

DOCX
THESIS-2(2)
PPT
Shailendra Pandey.ppt
PPTX
Computer ethics
PPTX
Introduction to Cyber Security
PPTX
Ethics and privacy ppt 3rd period
PPTX
Computer-Security.pptx
PPTX
12 c business i environment i society mba 2016
PPT
Shailendra Pandey.ppt
THESIS-2(2)
Shailendra Pandey.ppt
Computer ethics
Introduction to Cyber Security
Ethics and privacy ppt 3rd period
Computer-Security.pptx
12 c business i environment i society mba 2016
Shailendra Pandey.ppt

Similar to Computer application lecture note-Chapter-5.pptx (20)

PPTX
Chapter 1
PPTX
Chapter 1
DOCX
Hamza
PPTX
Kinds of cybercrime (Social Networking for Social integration .pptx
PPT
Computer
DOCX
Target Data Breach Case Study 10242014
DOCX
Cyber crime
PPTX
TC160_PowerPoint_presentation_gbraga
PDF
Why is Cybersecurity Important in the Digital World
PPTX
Cyber crime
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
DOC
Computer Secutity.
PPTX
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
DOCX
Cyber crime
PPTX
computer and security
PPT
ethics final project
PPT
SHAILENDRA.ppt
PPTX
Cybercrime
PDF
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
DOCX
Cyber crime
Chapter 1
Chapter 1
Hamza
Kinds of cybercrime (Social Networking for Social integration .pptx
Computer
Target Data Breach Case Study 10242014
Cyber crime
TC160_PowerPoint_presentation_gbraga
Why is Cybersecurity Important in the Digital World
Cyber crime
chapter 5.pptxggggggggggggggggggggggggggg
Computer Secutity.
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
Cyber crime
computer and security
ethics final project
SHAILENDRA.ppt
Cybercrime
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
Cyber crime
Ad

More from gadisaAdamu (20)

PDF
Addis ababa of education plan.docxJOSY 10 C.pdf
PDF
Addis ababa college of education plan.docxjosy 10 A.pdf
PPT
Lecture -3 Classification(Decision Tree).ppt
PPT
Lecture -2 Classification (Machine Learning Basic and kNN).ppt
PPT
Lecture -8 Classification(AdaBoost) .ppt
PPT
Lecture -10 AI Reinforcement Learning.ppt
PPTX
Updated Lensa Research Proposal (1).pptx
PPTX
Lensa research presentation Powepoint.pptx
PPTX
Lensa Habtamu Updated one Powerpoint.pptx
PPTX
Updated Lensa Research Proposal (1).pptx
PPTX
Lensa Updated research presentation Powerpoint.pptx
PPTX
AI Chapter Two.pArtificial Intelligence Chapter One.pptxptx
PPTX
Artificial Intelligence Chapter One.pptx
PPTX
Introduction to Embeded System chapter 1 and 2.pptx
PPT
Chapter Five Synchonization distributed Sytem.ppt
PPTX
Introduction to Embeded System chapter one and 2.pptx
PPT
chapter distributed System chapter 3 3.ppt
PPTX
Chapter 2- distributed system Communication.pptx
PPTX
Chapter 1-Introduction to distributed system.pptx
PPTX
chapter AI 4 Kowledge Based Agent.pptx
Addis ababa of education plan.docxJOSY 10 C.pdf
Addis ababa college of education plan.docxjosy 10 A.pdf
Lecture -3 Classification(Decision Tree).ppt
Lecture -2 Classification (Machine Learning Basic and kNN).ppt
Lecture -8 Classification(AdaBoost) .ppt
Lecture -10 AI Reinforcement Learning.ppt
Updated Lensa Research Proposal (1).pptx
Lensa research presentation Powepoint.pptx
Lensa Habtamu Updated one Powerpoint.pptx
Updated Lensa Research Proposal (1).pptx
Lensa Updated research presentation Powerpoint.pptx
AI Chapter Two.pArtificial Intelligence Chapter One.pptxptx
Artificial Intelligence Chapter One.pptx
Introduction to Embeded System chapter 1 and 2.pptx
Chapter Five Synchonization distributed Sytem.ppt
Introduction to Embeded System chapter one and 2.pptx
chapter distributed System chapter 3 3.ppt
Chapter 2- distributed system Communication.pptx
Chapter 1-Introduction to distributed system.pptx
chapter AI 4 Kowledge Based Agent.pptx
Ad

Recently uploaded (20)

PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Digital Literacy And Online Safety on internet
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPT
tcp ip networks nd ip layering assotred slides
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
artificial intelligence overview of it and more
RPKI Status Update, presented by Makito Lay at IDNOG 10
Digital Literacy And Online Safety on internet
Slides PDF The World Game (s) Eco Economic Epochs.pdf
WebRTC in SignalWire - troubleshooting media negotiation
Slides PPTX World Game (s) Eco Economic Epochs.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Introuction about WHO-FIC in ICD-10.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Decoding a Decade: 10 Years of Applied CTI Discipline
tcp ip networks nd ip layering assotred slides
An introduction to the IFRS (ISSB) Stndards.pdf
The Internet -By the Numbers, Sri Lanka Edition
Sims 4 Historia para lo sims 4 para jugar
SAP Ariba Sourcing PPT for learning material
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
Paper PDF World Game (s) Great Redesign.pdf
artificial intelligence overview of it and more

Computer application lecture note-Chapter-5.pptx

  • 2. OUTLINES  5.1 Introduction  5.2 Virtual Society  5.3 Issues and Ethics in IT  5.4 Computer Crimes  5.5 Computer Viruses and Worms 2
  • 3. 5.1 INTRODUCTION  In an information society, the focus of commerce becomes the generation and distribution of information.  A technology revolution is changing our way of life; the way we live, work, and play.  The cornerstone of this revolution, the computer, is transforming the way we communicate, do business, and learn and an explosion of computing advances is speeding this change. 3
  • 4. 5.2 VIRTUAL SOCIETY 4  A virtual society refers to an online community or network where individuals interact, communicate, and engage in various activities through digital platforms. It is a space where people from different backgrounds come together virtually to connect, share ideas, collaborate, and build relationships. In a virtual society, individuals can participate in discussions, join interest groups, play games, attend virtual events, and more, all within an online environment
  • 5. … VIRTUAL SOCIETY  In Digital technology, there are 3 ways a computer system can verify whether the user have authorized right of access.  What you have? such as a smart card.  What you know? Such as password.  What you are? such as fingerprint, voice, face recognition etc. 5
  • 6. …VIRTUAL SOCIETY  Authentication mechanism are used to satisfy the user that entities, people, data, applications or computers are actually what they claim to be.  One of the most commonly used mechanism for authenticating people has been the password.  Passwords are expected to be known only by the owner.  However, passwords can be guesses or learnt by intruders through interception of communications networks or re-use of encrypted passwords.  Re-use of passwords can be prevented by time stamping or by using passwords only once.6
  • 7. VIRTUAL IDENTITY  Virtual identity refers to the online representation of an individual or entity in the digital world.  Virtual identities can include usernames, profiles, or any other form of online representation that distinguishes an individual in the online realm.  Identification theft: stealing your good name – TOI – Theft of Identity – is a crime in which thieves hijack your Name and identity and use your good credit rating to get cash .  To do these, what they need is simply knowing your individual credentials such as full name and social security number. 7
  • 8. VIRTUAL UNIVERSITY  Distance learning is the use of computer and/or video networks to teach courses to students outside the conventional classroom.  Until recently, distance learning has been largely outside the mainstream of campus life.  That is, it concentrates principally on part time students, those who cannot easily travel to campus, those interested in noncredit classes, or those seeking special courses in business or engineering. 8
  • 9. VIRTUAL SUPER MARKET  We can view items by category [snack foods], item [cookies], or by brand and pursue items on sale.  We can request that items be arranged alphabetically by brand, price per unit, package size, or we can even request a listing by nutritional value.  In the minds of the busy people who shop online, the cost of the e-service is easily offset by other savings [better prices, less spent on travel and so on]. 9
  • 10. VIRTUAL OFFICE  Now big foreign companies are eliminating office and allowing employees to work from any location they choose.  Virtual offices are possible because of cellular telephones, fax machines, portable computers, and other mobile computing and communication devices.  Virtual offices helps to:  To reduce office space  Eliminate office infrastructure and cost  Eliminate real estate costs  Eliminate unwanted traveling time to office 10
  • 11. 5.3 ISSUES AND ETHICS IN IT  Issues in IT can be classified into four categories such as:  Security issue  Quality of Life issue  Economical Issue  Privacy issue 11
  • 12. ETHICS  Ethics can be defined as a branch of philosophy dealings with the determination of what is right or wrong, good or bad.  Simply if we define” ethics are moral standards that help to guide, behavior, actions, and choices.  Ethics are grounded in the notion of responsibility and accountability. 12
  • 13. ETHICS IN AN INFORMATION SOCIETY  Basic concepts of ethics are:  Responsibility  Accepting the potential costs, duties and obligations for the decisions one makes  Accountability  The mechanisms for assessing responsibility for decisions made and actions taken  Liability  The existence of laws that permit individuals to recover the damages done to them by other  Due process  A process in which laws are well known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly. 13
  • 14. 5.4 COMPUTER CRIMES  The term computer crime includes any unauthorized use of a computer system including software piracy or theft of system resources for personal use including computer processing time and network access time.  Actions intended to alter data and programs or to damage or destroy data, software, or equipment is also crimes. 14
  • 15. COMMON TYPES OF COMPUTER CRIMES DATA DIDLING Changing data and information before they enter a system DATA LEAKAGE Erasing or removing data and files from a system without indicating that they were removed or leaving any trace, they ever existed. LOGIC BOMB A program designed to execute when certain conditions occur. Designed to sabotage system data, programs or processing [refer time bomb] TIME BOMB A program designed to execute on a specific date and time. The program monitors the computer’s internal clock or calendar. When the preset date arrives, the program comes to life causing its damage. TRAPDOOR An illicit and unknown point of entry into a program or network that can be used to gain access to the system TROJAN HORSE A program that appears to do one thing, but actually does something very 15
  • 16. COMPUTER CRIMES….  All these crimes are committed through intrusion, forced and unauthorized entry into the system. Computer crime through intrusion can occur by following ways:  Hackers  Crackers  Viruses 16
  • 17. COMPUTER CRIMES----  Hackers  A hacker is a person who gains access to a system illegally.  Hackers usually gain access to a system through a network, but sometimes they will physically enter a computer or network facility.  Techniques helpful in deterring intrusion by hackers  Change access passwords frequently  Allow workers access to only the system functions they need to use  Permit workers to access only the data that they need to use  Encrypt data by scrambling or coding information.  Keep staff well informed through education programs 17
  • 18. COMPUTER CRIMES --- Crackers  Crackers also gain unauthorized access to information technology but do so for malicious purposes.  Crackers attempt to break into computers and deliberately obtain information for financial gain, shut down hardware, pirate software, destroy and etc. 18
  • 19. HACKERS VS CRACKERS  In the context of computer security, hackers and crackers are often used interchangeably, but they can have slightly different connotations.  Generally, hackers refer to individuals who have advanced technical skills and knowledge in computer systems and networks.  Black hat hackers are individuals who engage in unethical and illegal activities related to computer security.  Ethical hackers, also known as white-hat hackers, work to enhance security and protect systems from potential threats. 19
  • 20. HACKERS VS CRACKERS….  On the other hand, crackers are individuals who use their technical skills for malicious purposes.  Crackers are often associated with illegal activities, such as identity theft, financial fraud, or spreading malware.  It's important to note that not all hackers are crackers, as hacking itself is a neutral term that can be used for both good and bad purposes. 20
  • 21. 5. 5 COMPUTER VIRUSES AND WORMS VIRUS: A hidden program that alters, without the user’s knowledge the way a computer operates or modifies the data and program stored on the computer.  Computer intrusion occurs by way of software in the name of virus.  Each virus has its own characteristics its own signature.  Some destroy irreplaceable data. 21
  • 22. …COMPUTER VIRUSES AND WORMS  A virus is a typical program that attaches itself to a computer system and destroys or corrupts data.  Viruses are passed in three ways  By diskette [copying ]  By network [data sharing]  By internet [ e-mail ]  Some worms erase, destroy, and change the data.  WORMS: A Worm is a program that copies itself repeatedly into memory or on to a disk drive until no more space is left. 22
  • 23. VIRUSES VS WORMS  Viruses and worms are both types of malicious software (malware), but they differ in how they spread and operate.  A virus is a type of malware that attaches itself to a host file or program and replicates when that file or program is executed.  Viruses often need human action to spread, such as executing an infected file or opening an infected email attachment.  On the other hand, worms are standalone malware programs that can replicate and spread independently without needing to attach themselves to other files or programs. 23
  • 24. VIRUSES VS WORMS…  In summary, viruses need a host file or program to replicate and spread, while worms are self-contained and can spread independently.  Both viruses and worms can cause significant damage to computer systems and networks if not detected and mitigated in a timely manner. 24
  • 25. METHODS OF VIRUS DETECTION  All types of computers are vulnerable to viruses.  To protect against them, companies must buy and use virus detection software. There are three methods of virus detection.  Scanning programs – search the computer and main memory to detect a virus  Detection Programs – monitor processing activities and signal the user when a virus tries to infect the system  Digital signature encryption – uses a mathematical coding scheme designed to foil a virus’s attempt to attack programs and data. 25