SlideShare a Scribd company logo
Computer security  & ethics
SAMINA KHAN
FAZAIA DEGREE COLLEGE RISALPUR
COMPUTER SECURITY
 Computer security refers to protecting
computer hardware, software and
information stored on computer from
threats .
Importance of computer
security
• Computer users often exchange
information or communicate over
internet.
• This can infect a user's computer with
virus or other types of malicious
software.
• Computer security or safety is
important for computer users to protect
their computers from different threats.
Computer security  & ethics
Computer security  & ethics
Cyber Crime
 cybercrime refers to any crime that is
committed by means of computer and
internet technology by having unlawful
access to other computers.
 Computer & internet have improved
our lives but the same technology is
also used by criminals to harm the
society.
SAMINA KHAN, FAZAIA DEGREE
COLLEGE RISALPUR
Cyber crime
 Cyber crime now include the activities
that cross international borders and
can be considered global epidemic.
SAMINA KHAN, FAZAIA DEGREE
COLLEGE RISALPUR
Cyber crime
 The following are the commonly
committed cyber crimes.
 Computers have been involved in
crimes such as fraud, kidnapping,
murder and stealing money from banks
 Criminals use internet to steal personnel
information of other users and commit
various types of cyber crime .
SAMINA KHAN, FAZAIA DEGREE
COLLEGE RISALPUR
Cyber crime
 Downloading illegal software, music
files and videos are also cybercrimes
 Internet harassment or cyber bullying
is also a serious crime
Computer security  & ethics
Hacker
 A person who illegally breaks into
others computer system is known as
hacker .
 Hacking is a cybercrime.
 Hackers are computer experts who try
to gain unauthorized access to
computer systems for stealing and
corrupting information.
 Most of the hackers break into
computers for financial benefits.
Hacker
 They have in-depth knowledge of
network programming and create
software to break into networks and
create problems.
Cracker
 Cracker is a computer user who
breaks into computer systems
without permission using hacking
tools for personal gain or damage
and commits cybercrimes.
 Most of the crackers do not have
professional computer skill to hack
 computer systems but they have
knowledge about using hacking tools.
Cracker
 Crackers break into computers and
cause serious damage.
 They also break into Web servers
and replace the home page of a
website with a page of their own
design.
 These criminals are dangerous and
harder to catch .
Computer security  & ethics
MALWARE AND ITS TYPES
 Malware is malicious software.
 It comprises of a number of harmful
software that are threat to all computer
users.
 Malware are created to attack on
privacy , destruction and financial
benefits.
 Worms, viruses, spyware. Adware are
different types of malware.
Computer security  & ethics
VIRUS
 A computer virus is a software
program that can get onto your
computer when you download a file
that contains the virus.
 It generates it’s copies and disturb
the activities of other program.
 It move with data from one
computer to another.
VIRUS
 It can spread through an email or it
connect with data and spread in your
computer.
WORMS
 A worm is a malware that transmits
itself over a network to infect other
computers.
 Worm can be harmful like a computer.
 It spreads automatically in computer
networks and replicates itself.
 It enters a computer through a
weakness in the operating system of
computer.
WORMS
 It can travel from computer to
computer without any human action.
Computer security  & ethics
SPYWARE
 Spyware programs are developed to
spy on computer users by gathering
information about their activities.
 When you download a software from
internet, spyware download with that
software without your knowledge.
 Steal passwords of computer.
 Access to bank account pin
SPYWARE
 Developed for the personal benefit of
the creator.
 Slow down the performance of
computer
ADWARE
Computer security  & ethics
ADWARE
 Adware is a malware software that
attaches itself to free software on the
internet.
 It pop up advertisements during
execution of the infected program.
 Pop-up block option in browsers helps
protect computer from adware.
 Collect user information without their
permission.
Computer security  & ethics
COMPUTER VIRUSES
COMPUTER VIRUSES
• Computer experts create malware such as
virus, worms, spyware etc and spread it
through internet.
• It is important to understand how malware
spreads and how to protect computer from
them.
How malware spreads?
• Malware can spread in computers through:
• Infected flash drives/CDs
• Pirated software
• Network and internet
• E-mail attachments
Computer security  & ethics
Computer security  & ethics
Common symptoms of malware
attacks
• The computer reboot automatically.
• Different types of error messages appear on
screen.
• Unexpected messages appear on screen.
• Programs don’t run in a normal way.
• Computer is running very slow.
• New files and folders are created on the hard
disk.
• Web browsers does not run properly.
System restart automatically
Effect of Malware on web browser
• Malware can hijack your browser to
redirect you to sites for its
purposes. Malware can infect your
computer and use it as a server to
broadcast various files or attacks.
• Browser hijacker is a malware program
that modifies web browser settings
without the user's permission and
redirects the user to websites the user
had not intended to visit.
Computer security  & ethics
Computer security  & ethics
PROTECTING COMPUTER FROM
MALWARE
• Install antivirus
• Install anti-spyware
Antivirus Software
• Antivirus software is a class of program
designed to prevent, detect and
remove malware infections.
• Antivirus software typically runs as a
background process, scanning computers to
detect and restrict the spread of malware.
Antivirus Software
• Since new infections are always being made
by PC programmers, antivirus programs must
keep an updated database of the most recent
malware codes.
• Most antivirus programs auto update the
infection database all the time.
• Whenever connect a USB or any other storage
device, must run antivirus software to ensure
that it does not contain any virus.
Computer security  & ethics
Antispyware software
• Anti-spyware programs help to block and
prevent spyware and other malware infections
on computers.
• These programs monitor incoming data from
e-mail, websites, and downloads of files and
stop spyware programs from getting in into
computer system.
Antispyware software
• This program runs in the background of
computer and continually scan spyware
threats.
AUTHENTICATION
MECHANICS
AUTHENTICATION MECHANICS
• Mechanics of user identification and
authentication.
AUTHENTICATION
Authentication mean identifying a person
based on a method such as:
USERNAME AND PASSWORD
PIN (PERSONNEL IDENTIFICATION NUMBER)
ACCESS CARD
BIOMETRICS
Computer security  & ethics
AUTHORIZATION
• Authorization mean to give someone
permission to do something
Computer security  & ethics
Computer security  & ethics
UNAUTHORIZED ACCESS
• If a person gains access to a
computer system without identity
approval then he has unauthorized
access which is crime
UNAUTHORIZED ACCESS
• If a person gains access to a
computer system without identity
approval then he has unauthorized
access which is crime
AUTHENTICATION
METHODOLOGIES
AUTHENTICATION
METHODOLOGIES
•The following are the common methodologies
used for authentication purpose.
 Username and password
 Pin (personnel identification number)
 Access card
 Biometric
USERNAME AND PASSWORD
USERNAME AND PASSWORD
• Username is a name that identifies a person
on a computer.
• It is used with a password.
• Username and password combination is
known as login information.
• Username and password are used to authorize
users to have access to computer, email
account, bank account and other services
available on computer.
USERNAME AND PASSWORD
• User name is known as part of login
information whereas password is secret.
PIN (PERSONNEL IDENTIFICATION
NUMBER)
PIN (PERSONNEL IDENTIFICATION
NUMBER)
PIN is a confidential numeric password used to
authenticate a user to get access to a computer.
When a user enter the PIN, it is searched in the
database stored in computer. If it matches, the
user is authorized.
PIN are commonly used with debit and credit in
retail stores.
It is also used with ATM cards to withdraw cash
from ATM.
ACCESS CARD
ACCESS CARD
Access cards are very similar in appearance to
the credit cards.
They do not require username, password or PIN.
They are commonly used to open security gates,
hotel rooms and to open barriers in parking.
They are an alternative to key.
BIOMETRICs
BIOMETRICs
• Biometric refers to authentication method
based on the physical characteristics of
individuals such as features of face, hand
geometry, retina ,voice and fingerprint.
• It provides highly secure identification and
personal verification technologies.
• Use for financial transactions, electronic
banking and personal data privacy.
MULTIMODEL
AUTHENTICATION
• Multimodal authentication is the combination of
two or more types of authentication methods .
• It uses multiple sources of information for
identification.
Multimodal biometrics
• Multimodal biometrics is the use of more
than one biometric modality simultaneously,
such as face and voice together, which
improves matching performance and makes
spoofing much more difficult.
Computer security  & ethics
COMPUTER ETHICS
•Computer Ethics mean an acceptable behavior
for using computer technology.
•It is a code of behavior for moral and social
issues while using computer technology,
particularly Internet.
•Computer user should be honest, respect the
rights of others on the Internet and obey laws
that apply to online behavior.
12/15/2020
COMPUTER ETHICS
•We should not use bad language while chatting
and social networking.
•We need to respect others views and should
not criticize people.
•We should not pretend as someone else and
fool others.
COMPUTER ETHICS
•We should not download copyrighted material
such as music, movies, etc.
•People should not do something on the
internet that is objectionable or illegal.
ETHICAL USE OF COMPUTER
•The following are some important moral
guidelines for ethical use of computer
technology.
•Computer should not be used to harm other
people.
•Computer users should not break into other
computer systems to steal, change or destroy
information.
ETHICAL USE OF COMPUTER
• Computer user should not read documents
and emails of other users without their
consent.
• People should not make illegal copies of
copyright software and sell it for financial
benefit.
•Computer user who have special computer
knowledge and ability should not create
malicious software and spread it to other
computers.
ETHICAL USE OF COMPUTER
•People should not
commit any type of
crime with the help of
computer technology.
•Computer users
should respect the
privacy of others.
AREAS OF COMPUTER ETHICS
•The following are the main areas if Computer
Ethics.
Information accuracy
Information ownership/intellectual rights
Intellectual property
Software piracy
Information privacy
Internet and privacy
Information Accuracy
• Information stored on
computer must be
accurate, up-to-date and
complete.
• If wrong information is
entered in computer, it
can be very harmful.
Information
ownership/intellectual rights
• It means persons who create ideas in any form
are the actual owners.
• Ideas can be poem, article, play, novel, film
and drawing.
• Intellectual rights protect creative work from
unauthorized access.
Intellectual property
• It means legal rights of an
individual or a corporation that
result from intellectual activity
in literary, artistic, scientific &
industrial fields.
• Countries have law to protect
intellectual property to foster
innovation and promote
creativity.
Software piracy
• It means making illegal copies of software for
use or sale for financial benefits.
• Software copyright law does not allow to
make illegal copies of software and install it on
other computers or sell it.
Information privacy
• It refers to an individual’s right to the privacy
of personal information.
• The Data Protection Act(law) protects the
rights of the individual against misuse of
personal information by organizations.
Internet and privacy
• Internet users enter personal
information in websites to sign
up register for services without
realizing that this may lead to
invasions of privacy.
• The information can be
accessed by hackers and used
for harmful purpose.
• This poses a serious threat to
privacy.
Computer security  & ethics

More Related Content

PPT
cyber ethics
PPTX
computer ethics slides
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
PPTX
computer and society impact of Computer in society
PPT
Computer Ethics
PDF
Computer Security Threats
PPTX
Threats to a computer
PPT
Cyber Ethics
cyber ethics
computer ethics slides
Class 11 ca chapter 17 computer ethics and cyber crime
computer and society impact of Computer in society
Computer Ethics
Computer Security Threats
Threats to a computer
Cyber Ethics

What's hot (20)

PPTX
Cyber Security
PPTX
An Introduction to Cyber Ethics
PPTX
Cyber Security
PPTX
Cyber Crime
PPTX
Virus and malware presentation
PPTX
Cyber crime and security
PPT
Trojan Horse Presentation
PPTX
Hacking & its types
PPTX
Cyber Crime
PPTX
Cyber crime, cyber law and cyber ethics
PPTX
Computer Security and Ethics
PPTX
Ethical hacking presentation
PPT
Cyber Crime and Security
PPTX
PPT
Computer Ethics Presentation
PPTX
Cyber crime
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPT
Ethical hacking
PPTX
Cyber crime
PPTX
Cyber security
Cyber Security
An Introduction to Cyber Ethics
Cyber Security
Cyber Crime
Virus and malware presentation
Cyber crime and security
Trojan Horse Presentation
Hacking & its types
Cyber Crime
Cyber crime, cyber law and cyber ethics
Computer Security and Ethics
Ethical hacking presentation
Cyber Crime and Security
Computer Ethics Presentation
Cyber crime
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Ethical hacking
Cyber crime
Cyber security
Ad

Similar to Computer security & ethics (20)

PPTX
Computer security
PPTX
IT Threats and Computer Security
PPT
COMPUTER SECURITY
PPTX
BCE L-3omputer security Basics.pptx
PPTX
Computer security
PDF
Computer Crime & Security about computer
PPTX
Computer security ethics_and_privacy
PPTX
Network security and viruses
PPTX
Internet security powerpoint
PPTX
Data protection and security
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
Security threats and safety measures
PPTX
Internet security powerpoint
DOCX
Cyber crime
PPTX
Cyber crime , threats and their security measures
PDF
Notacd02
PPTX
Computer Security Presentation
DOC
Notacd02
PDF
The process of computer security
PPTX
Computer crime and internet crime privacy
Computer security
IT Threats and Computer Security
COMPUTER SECURITY
BCE L-3omputer security Basics.pptx
Computer security
Computer Crime & Security about computer
Computer security ethics_and_privacy
Network security and viruses
Internet security powerpoint
Data protection and security
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Security threats and safety measures
Internet security powerpoint
Cyber crime
Cyber crime , threats and their security measures
Notacd02
Computer Security Presentation
Notacd02
The process of computer security
Computer crime and internet crime privacy
Ad

More from samina khan (20)

PPTX
TYPES AND HIERARCHY OF COMPUTER MEMORY.pptx
PPTX
DATA COMMUNICATION components, modes of transmission & communication devices ...
PPTX
UNDERSTANDING SELF AND OTHERS.pptx
PPTX
INFORMATION TECHNOLOGY.pptx
PPTX
scaffolding in teaching.pptx
PPTX
REFLECTIVE TEACHING.pptx
PPTX
PEDAGOGICAL SKILLS.pptx
PPTX
What is an Autobiography?
PPTX
Picture description
PPTX
The Internet and World Wide Web
PPT
Computer logic and gates
PPTX
Problem solving
PPTX
Computer networks
PPT
Classroom management
PPTX
More on number system
PPTX
Stress management
PPT
Classroom management
PPTX
The future of technology
DOCX
Lesson plan:Multiplication and division of binary numbers
PPTX
Computer networks grade 7
TYPES AND HIERARCHY OF COMPUTER MEMORY.pptx
DATA COMMUNICATION components, modes of transmission & communication devices ...
UNDERSTANDING SELF AND OTHERS.pptx
INFORMATION TECHNOLOGY.pptx
scaffolding in teaching.pptx
REFLECTIVE TEACHING.pptx
PEDAGOGICAL SKILLS.pptx
What is an Autobiography?
Picture description
The Internet and World Wide Web
Computer logic and gates
Problem solving
Computer networks
Classroom management
More on number system
Stress management
Classroom management
The future of technology
Lesson plan:Multiplication and division of binary numbers
Computer networks grade 7

Recently uploaded (20)

PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPT
tcp ip networks nd ip layering assotred slides
DOCX
Unit-3 cyber security network security of internet system
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introduction to Information and Communication Technology
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Internet___Basics___Styled_ presentation
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Funds Management Learning Material for Beg
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
tcp ip networks nd ip layering assotred slides
Unit-3 cyber security network security of internet system
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introduction to Information and Communication Technology
Tenda Login Guide: Access Your Router in 5 Easy Steps
Paper PDF World Game (s) Great Redesign.pdf
QR Codes Qr codecodecodecodecocodedecodecode
Decoding a Decade: 10 Years of Applied CTI Discipline
WebRTC in SignalWire - troubleshooting media negotiation
Internet___Basics___Styled_ presentation
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Sims 4 Historia para lo sims 4 para jugar
Funds Management Learning Material for Beg
PptxGenJS_Demo_Chart_20250317130215833.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Testing WebRTC applications at scale.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf

Computer security & ethics

  • 2. SAMINA KHAN FAZAIA DEGREE COLLEGE RISALPUR
  • 3. COMPUTER SECURITY  Computer security refers to protecting computer hardware, software and information stored on computer from threats .
  • 4. Importance of computer security • Computer users often exchange information or communicate over internet. • This can infect a user's computer with virus or other types of malicious software. • Computer security or safety is important for computer users to protect their computers from different threats.
  • 7. Cyber Crime  cybercrime refers to any crime that is committed by means of computer and internet technology by having unlawful access to other computers.  Computer & internet have improved our lives but the same technology is also used by criminals to harm the society. SAMINA KHAN, FAZAIA DEGREE COLLEGE RISALPUR
  • 8. Cyber crime  Cyber crime now include the activities that cross international borders and can be considered global epidemic. SAMINA KHAN, FAZAIA DEGREE COLLEGE RISALPUR
  • 9. Cyber crime  The following are the commonly committed cyber crimes.  Computers have been involved in crimes such as fraud, kidnapping, murder and stealing money from banks  Criminals use internet to steal personnel information of other users and commit various types of cyber crime . SAMINA KHAN, FAZAIA DEGREE COLLEGE RISALPUR
  • 10. Cyber crime  Downloading illegal software, music files and videos are also cybercrimes  Internet harassment or cyber bullying is also a serious crime
  • 12. Hacker  A person who illegally breaks into others computer system is known as hacker .  Hacking is a cybercrime.  Hackers are computer experts who try to gain unauthorized access to computer systems for stealing and corrupting information.  Most of the hackers break into computers for financial benefits.
  • 13. Hacker  They have in-depth knowledge of network programming and create software to break into networks and create problems.
  • 14. Cracker  Cracker is a computer user who breaks into computer systems without permission using hacking tools for personal gain or damage and commits cybercrimes.  Most of the crackers do not have professional computer skill to hack  computer systems but they have knowledge about using hacking tools.
  • 15. Cracker  Crackers break into computers and cause serious damage.  They also break into Web servers and replace the home page of a website with a page of their own design.  These criminals are dangerous and harder to catch .
  • 17. MALWARE AND ITS TYPES  Malware is malicious software.  It comprises of a number of harmful software that are threat to all computer users.  Malware are created to attack on privacy , destruction and financial benefits.  Worms, viruses, spyware. Adware are different types of malware.
  • 19. VIRUS  A computer virus is a software program that can get onto your computer when you download a file that contains the virus.  It generates it’s copies and disturb the activities of other program.  It move with data from one computer to another.
  • 20. VIRUS  It can spread through an email or it connect with data and spread in your computer.
  • 21. WORMS  A worm is a malware that transmits itself over a network to infect other computers.  Worm can be harmful like a computer.  It spreads automatically in computer networks and replicates itself.  It enters a computer through a weakness in the operating system of computer.
  • 22. WORMS  It can travel from computer to computer without any human action.
  • 24. SPYWARE  Spyware programs are developed to spy on computer users by gathering information about their activities.  When you download a software from internet, spyware download with that software without your knowledge.  Steal passwords of computer.  Access to bank account pin
  • 25. SPYWARE  Developed for the personal benefit of the creator.  Slow down the performance of computer
  • 28. ADWARE  Adware is a malware software that attaches itself to free software on the internet.  It pop up advertisements during execution of the infected program.  Pop-up block option in browsers helps protect computer from adware.  Collect user information without their permission.
  • 31. COMPUTER VIRUSES • Computer experts create malware such as virus, worms, spyware etc and spread it through internet. • It is important to understand how malware spreads and how to protect computer from them.
  • 32. How malware spreads? • Malware can spread in computers through: • Infected flash drives/CDs • Pirated software • Network and internet • E-mail attachments
  • 35. Common symptoms of malware attacks • The computer reboot automatically. • Different types of error messages appear on screen. • Unexpected messages appear on screen. • Programs don’t run in a normal way. • Computer is running very slow. • New files and folders are created on the hard disk. • Web browsers does not run properly.
  • 37. Effect of Malware on web browser • Malware can hijack your browser to redirect you to sites for its purposes. Malware can infect your computer and use it as a server to broadcast various files or attacks. • Browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • 40. PROTECTING COMPUTER FROM MALWARE • Install antivirus • Install anti-spyware
  • 41. Antivirus Software • Antivirus software is a class of program designed to prevent, detect and remove malware infections. • Antivirus software typically runs as a background process, scanning computers to detect and restrict the spread of malware.
  • 42. Antivirus Software • Since new infections are always being made by PC programmers, antivirus programs must keep an updated database of the most recent malware codes. • Most antivirus programs auto update the infection database all the time. • Whenever connect a USB or any other storage device, must run antivirus software to ensure that it does not contain any virus.
  • 44. Antispyware software • Anti-spyware programs help to block and prevent spyware and other malware infections on computers. • These programs monitor incoming data from e-mail, websites, and downloads of files and stop spyware programs from getting in into computer system.
  • 45. Antispyware software • This program runs in the background of computer and continually scan spyware threats.
  • 47. AUTHENTICATION MECHANICS • Mechanics of user identification and authentication.
  • 48. AUTHENTICATION Authentication mean identifying a person based on a method such as: USERNAME AND PASSWORD PIN (PERSONNEL IDENTIFICATION NUMBER) ACCESS CARD BIOMETRICS
  • 50. AUTHORIZATION • Authorization mean to give someone permission to do something
  • 53. UNAUTHORIZED ACCESS • If a person gains access to a computer system without identity approval then he has unauthorized access which is crime
  • 54. UNAUTHORIZED ACCESS • If a person gains access to a computer system without identity approval then he has unauthorized access which is crime
  • 56. AUTHENTICATION METHODOLOGIES •The following are the common methodologies used for authentication purpose.  Username and password  Pin (personnel identification number)  Access card  Biometric
  • 58. USERNAME AND PASSWORD • Username is a name that identifies a person on a computer. • It is used with a password. • Username and password combination is known as login information. • Username and password are used to authorize users to have access to computer, email account, bank account and other services available on computer.
  • 59. USERNAME AND PASSWORD • User name is known as part of login information whereas password is secret.
  • 61. PIN (PERSONNEL IDENTIFICATION NUMBER) PIN is a confidential numeric password used to authenticate a user to get access to a computer. When a user enter the PIN, it is searched in the database stored in computer. If it matches, the user is authorized. PIN are commonly used with debit and credit in retail stores. It is also used with ATM cards to withdraw cash from ATM.
  • 63. ACCESS CARD Access cards are very similar in appearance to the credit cards. They do not require username, password or PIN. They are commonly used to open security gates, hotel rooms and to open barriers in parking. They are an alternative to key.
  • 65. BIOMETRICs • Biometric refers to authentication method based on the physical characteristics of individuals such as features of face, hand geometry, retina ,voice and fingerprint. • It provides highly secure identification and personal verification technologies. • Use for financial transactions, electronic banking and personal data privacy.
  • 66. MULTIMODEL AUTHENTICATION • Multimodal authentication is the combination of two or more types of authentication methods . • It uses multiple sources of information for identification.
  • 67. Multimodal biometrics • Multimodal biometrics is the use of more than one biometric modality simultaneously, such as face and voice together, which improves matching performance and makes spoofing much more difficult.
  • 69. COMPUTER ETHICS •Computer Ethics mean an acceptable behavior for using computer technology. •It is a code of behavior for moral and social issues while using computer technology, particularly Internet. •Computer user should be honest, respect the rights of others on the Internet and obey laws that apply to online behavior.
  • 71. COMPUTER ETHICS •We should not use bad language while chatting and social networking. •We need to respect others views and should not criticize people. •We should not pretend as someone else and fool others.
  • 72. COMPUTER ETHICS •We should not download copyrighted material such as music, movies, etc. •People should not do something on the internet that is objectionable or illegal.
  • 73. ETHICAL USE OF COMPUTER •The following are some important moral guidelines for ethical use of computer technology. •Computer should not be used to harm other people. •Computer users should not break into other computer systems to steal, change or destroy information.
  • 74. ETHICAL USE OF COMPUTER • Computer user should not read documents and emails of other users without their consent. • People should not make illegal copies of copyright software and sell it for financial benefit. •Computer user who have special computer knowledge and ability should not create malicious software and spread it to other computers.
  • 75. ETHICAL USE OF COMPUTER •People should not commit any type of crime with the help of computer technology. •Computer users should respect the privacy of others.
  • 76. AREAS OF COMPUTER ETHICS •The following are the main areas if Computer Ethics. Information accuracy Information ownership/intellectual rights Intellectual property Software piracy Information privacy Internet and privacy
  • 77. Information Accuracy • Information stored on computer must be accurate, up-to-date and complete. • If wrong information is entered in computer, it can be very harmful.
  • 78. Information ownership/intellectual rights • It means persons who create ideas in any form are the actual owners. • Ideas can be poem, article, play, novel, film and drawing. • Intellectual rights protect creative work from unauthorized access.
  • 79. Intellectual property • It means legal rights of an individual or a corporation that result from intellectual activity in literary, artistic, scientific & industrial fields. • Countries have law to protect intellectual property to foster innovation and promote creativity.
  • 80. Software piracy • It means making illegal copies of software for use or sale for financial benefits. • Software copyright law does not allow to make illegal copies of software and install it on other computers or sell it.
  • 81. Information privacy • It refers to an individual’s right to the privacy of personal information. • The Data Protection Act(law) protects the rights of the individual against misuse of personal information by organizations.
  • 82. Internet and privacy • Internet users enter personal information in websites to sign up register for services without realizing that this may lead to invasions of privacy. • The information can be accessed by hackers and used for harmful purpose. • This poses a serious threat to privacy.