SlideShare a Scribd company logo
Ethics in IT and System Usage
Ethics 
• Derived from the Greek word “ethos”, which 
means “custom”, “habit”, and “way of living” 
• Definition: "the discipline and practice of 
applying value to human behavior, 
resulting in meaningful conduct.“
Cont………. 
• Professional Ethics: concerns one's conduct of 
behavior and practice when carrying out professional 
work, e.g., consulting, researching, teaching and 
writing. 
• A computing professional must understand 
– Cultural, social, legal, and ethical issues in computing. 
– Responsibility and possible consequences of failure.
Computer Ethics 
• Computer ethics defined as the application of classical 
ethical principles to the use of computer technology. 
• Ethical problems related to computers: 
– Privacy 
• Computers create a false sense of security 
• People do not realize how vulnerable information 
stored on computers are 
– Property 
• Physical property 
• Intellectual property (in both copyright and patent) 
• Data as property
• Access 
– Access to computing technology 
– Access to data 
• Accuracy 
– Accuracy of information stored 
• Hacking, cracking and virus creation 
• Software piracy
Ethical 
dilemmas 
in IT 
Ethical 
dilemmas 
in IT 
PPrrivivaaccyy 
Degree of privacy and 
dissemination of 
information about 
individual. 
AAcccceessssibibiliiltityy 
AAccccuurraaccyy 
PPrrooppeerrttyy 
Involves right of 
accessing the required 
info. As well as true 
payment of charges to 
access the information 
The information which 
is viable and being 
accessed is now much 
more accurate 
&authenticate. 
Talks about 
ownership & 
value of 
information.
The Ten Commandments of computer ethics 
have been defined by the Computer Ethics 
Institute. 
• 1) One should not use a computer to harm 
other people. 
• 2) One should not interfere with other 
people's computer work. 
• 3) One should not snoop around in other 
people's files. 
• 4) One should not use a computer to steal. 
• 5) One should not use a computer to bear 
false witness.
• 6) One should not use or copy software for 
which you have not paid. 
• 7) One should not use other people's 
computer resources without authorization. 
• 8) One should not distribute other people's 
intellectual output; without permit. 
• 9) One should think about the social 
consequences of the program you write. 
• 10) One should use a computer in ways that 
show consideration and respect.
Some threats to information system are:- 
• Computer Abuses:- hacking Id & sending mail 
through hacked id. 
• Computer crime:-Hacking &theft 
• Theft of equipment 
• Theft of data 
• Equipment malfunctions:- virus in excel sheet 
• Environmental hazards 
• Destruction from viruses 
• Errors in handling & usage of data.
Computer Virus
What is Computer Virus? 
• Computer viruses are small software programs that 
are designed to spread from one computer to another 
and to interfere with computer operation.
Spreading of Virus 
• Virus are most easily spread, 
• Spread through E-mail Attachments, 
– Instant Messaging messages, 
– Funny Images, 
– Audio and Videos files, 
– Downloading files from Internet, 
– Greeting cards and many more.
Steps to help avoid Viruses 
• Use an Internet firewall, 
• Subscribe to 
industry standard antivirus software, 
• Never open an e-mail attachment from 
someone you don't know, 
• Scan each and every attachment, 
• Rules to be followed, while surfing net
Software piracy and Hacking
What is PIRACY??????? 
Reselling Media 
 Downloading from a website 
 Taping songs 
Buying a used book or CD 
Watching broadcast television but skipping 
commercials
Types of PIRACY 
End User Piracy 
Client – Server Piracy 
Internet Piracy 
Hard-Disk Piracy 
Software Counterfeiting
End-User Piracy 
• This occurs when a company employee 
reproduces copies of software without 
authorization 
 Copying disk for installation and 
distribution 
Swapping disks in or outside the 
workplace
Client-Server Piracy 
• This type of piracy occurs when too many 
employees on a network are using a central 
copy of a program at the same time. 
 System Overuse
Internet Piracy 
• This occurs when software is downloaded 
from the Internet The same purchasing 
rules should apply to online software 
purchase as for those bought in traditional 
ways. 
Pirate website 
Unauthorized transfer of 
copyrighted program
Hard-Disk Loading 
• This occurs when a business who sells new 
computers loads illegal copies of software 
onto the hard disks to make the purchase of 
the machines more attractive. 
Value Added Resellers (VAR)
Software Counterfeiting 
• This type of piracy is the illegal 
duplication and sale of copyrighted 
material with the intent of directly 
imitating the copyrighted product .
HACKER 
• Some one who bypasses the system’s access 
controls by taking advantage of security 
weaknesses left in the system by 
developers .
What HACKER do??????? 
• SYSTEM 
Access confidential information 
Threaten someone from YOUR computer 
Broadcast your confidential letters or materials . 
Store illegal material
Evils of Hacking 
• Compromise the security of system without permission 
from an authorized party, usually with the intent of 
accessing computers connected to the network.
Advantage of Ethical Hacking 
• To determine problem and weakness for program 
• Creation of firewall 
• Useful for military purpose 
• Better computer security
Ethics in IT and System Usage
BY-TUSHAR 
SINGH 
JATIN UPPAL 
BEVAN GIDEON 
NIKHIL SHARMA

More Related Content

PPTX
Introduction to security
PPTX
Information Security Management System ISO/IEC 27001:2005
PPT
Cyber security standards
PPTX
Cyber Security roadmap.pptx
PPT
Ethics in IT Security
PPT
Legal, Ethical and professional issues in Information Security
PPTX
Physical security
PDF
ICS security
Introduction to security
Information Security Management System ISO/IEC 27001:2005
Cyber security standards
Cyber Security roadmap.pptx
Ethics in IT Security
Legal, Ethical and professional issues in Information Security
Physical security
ICS security

What's hot (20)

PPTX
Incident response
PDF
Ethical and Social Issues in ICT
PPTX
Cyber-Security-Unit-1.pptx
PPTX
Ethics in-information-security
PPT
Information Assurance And Security - Chapter 2 - Lesson 1
PPTX
Information Privacy
PPT
Information Serurity Risk Assessment Basics
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
System Security-Chapter 1
PDF
Computer security priciple and practice
PDF
Cybersecurity in Industrial Control Systems (ICS)
PPT
Chapter 15 Presentation
PPTX
07. datacenters
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Information security management system
PPTX
Cybersecurity Audit
PDF
IT vs. OT: ICS Cyber Security in TSOs
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
PPT
Information security management
Incident response
Ethical and Social Issues in ICT
Cyber-Security-Unit-1.pptx
Ethics in-information-security
Information Assurance And Security - Chapter 2 - Lesson 1
Information Privacy
Information Serurity Risk Assessment Basics
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
System Security-Chapter 1
Computer security priciple and practice
Cybersecurity in Industrial Control Systems (ICS)
Chapter 15 Presentation
07. datacenters
Cybersecurity Roadmap Development for Executives
Information security management system
Cybersecurity Audit
IT vs. OT: ICS Cyber Security in TSOs
Information Assurance And Security - Chapter 2 - Lesson 2
Information security management
Ad

Similar to Ethics in IT and System Usage (20)

PPTX
Computer Ethics
PPTX
Computer Ethics and History Of computer .pptx
PPTX
L2 COMPUTER ETHICS PPT [Autosaved].pptx
PPT
Ethical hacking
PPTX
Computer Ethics, Cyber ethics and securi
PDF
Ethics for IT Professionals
PPTX
BCE L-3omputer security Basics.pptx
PPT
ITBIS105 3
PPTX
Cyber ethics
PPTX
c13.security_and_ethics.pptx managemet info
PPTX
Computer ethics and crime
DOCX
Computer virus
PDF
Computer ethics
PPTX
c13 Security and Ethics(1)(1)(1).pptsasdax
PPT
9 ethics in it space
PPTX
ten important crimes of Computer Crimes.pptx
PPTX
Week_7.pptx Computer science topic 7 Notes
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
PPT
Presentation1
Computer Ethics
Computer Ethics and History Of computer .pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptx
Ethical hacking
Computer Ethics, Cyber ethics and securi
Ethics for IT Professionals
BCE L-3omputer security Basics.pptx
ITBIS105 3
Cyber ethics
c13.security_and_ethics.pptx managemet info
Computer ethics and crime
Computer virus
Computer ethics
c13 Security and Ethics(1)(1)(1).pptsasdax
9 ethics in it space
ten important crimes of Computer Crimes.pptx
Week_7.pptx Computer science topic 7 Notes
chapter 5.pptxggggggggggggggggggggggggggg
Presentation1
Ad

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Complications of Minimal Access Surgery at WLH
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Classroom Observation Tools for Teachers
PDF
Pre independence Education in Inndia.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
master seminar digital applications in india
PPTX
Pharma ospi slides which help in ospi learning
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Anesthesia in Laparoscopic Surgery in India
102 student loan defaulters named and shamed – Is someone you know on the list?
Complications of Minimal Access Surgery at WLH
Insiders guide to clinical Medicine.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
2.FourierTransform-ShortQuestionswithAnswers.pdf
Basic Mud Logging Guide for educational purpose
Classroom Observation Tools for Teachers
Pre independence Education in Inndia.pdf
VCE English Exam - Section C Student Revision Booklet
master seminar digital applications in india
Pharma ospi slides which help in ospi learning
Microbial disease of the cardiovascular and lymphatic systems
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

Ethics in IT and System Usage

  • 2. Ethics • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“
  • 3. Cont………. • Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing. • A computing professional must understand – Cultural, social, legal, and ethical issues in computing. – Responsibility and possible consequences of failure.
  • 4. Computer Ethics • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy • Computers create a false sense of security • People do not realize how vulnerable information stored on computers are – Property • Physical property • Intellectual property (in both copyright and patent) • Data as property
  • 5. • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy
  • 6. Ethical dilemmas in IT Ethical dilemmas in IT PPrrivivaaccyy Degree of privacy and dissemination of information about individual. AAcccceessssibibiliiltityy AAccccuurraaccyy PPrrooppeerrttyy Involves right of accessing the required info. As well as true payment of charges to access the information The information which is viable and being accessed is now much more accurate &authenticate. Talks about ownership & value of information.
  • 7. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. • 1) One should not use a computer to harm other people. • 2) One should not interfere with other people's computer work. • 3) One should not snoop around in other people's files. • 4) One should not use a computer to steal. • 5) One should not use a computer to bear false witness.
  • 8. • 6) One should not use or copy software for which you have not paid. • 7) One should not use other people's computer resources without authorization. • 8) One should not distribute other people's intellectual output; without permit. • 9) One should think about the social consequences of the program you write. • 10) One should use a computer in ways that show consideration and respect.
  • 9. Some threats to information system are:- • Computer Abuses:- hacking Id & sending mail through hacked id. • Computer crime:-Hacking &theft • Theft of equipment • Theft of data • Equipment malfunctions:- virus in excel sheet • Environmental hazards • Destruction from viruses • Errors in handling & usage of data.
  • 11. What is Computer Virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 12. Spreading of Virus • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more.
  • 13. Steps to help avoid Viruses • Use an Internet firewall, • Subscribe to industry standard antivirus software, • Never open an e-mail attachment from someone you don't know, • Scan each and every attachment, • Rules to be followed, while surfing net
  • 15. What is PIRACY??????? Reselling Media  Downloading from a website  Taping songs Buying a used book or CD Watching broadcast television but skipping commercials
  • 16. Types of PIRACY End User Piracy Client – Server Piracy Internet Piracy Hard-Disk Piracy Software Counterfeiting
  • 17. End-User Piracy • This occurs when a company employee reproduces copies of software without authorization  Copying disk for installation and distribution Swapping disks in or outside the workplace
  • 18. Client-Server Piracy • This type of piracy occurs when too many employees on a network are using a central copy of a program at the same time.  System Overuse
  • 19. Internet Piracy • This occurs when software is downloaded from the Internet The same purchasing rules should apply to online software purchase as for those bought in traditional ways. Pirate website Unauthorized transfer of copyrighted program
  • 20. Hard-Disk Loading • This occurs when a business who sells new computers loads illegal copies of software onto the hard disks to make the purchase of the machines more attractive. Value Added Resellers (VAR)
  • 21. Software Counterfeiting • This type of piracy is the illegal duplication and sale of copyrighted material with the intent of directly imitating the copyrighted product .
  • 22. HACKER • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers .
  • 23. What HACKER do??????? • SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material
  • 24. Evils of Hacking • Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network.
  • 25. Advantage of Ethical Hacking • To determine problem and weakness for program • Creation of firewall • Useful for military purpose • Better computer security
  • 27. BY-TUSHAR SINGH JATIN UPPAL BEVAN GIDEON NIKHIL SHARMA

Editor's Notes