SlideShare une entreprise Scribd logo
1  sur  40
THE LSPU MISSION AND VISION
MISSION “The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”
VISION “A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”
COMPUTER            ETHICS
What is a Computer Ethics: …………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
Introduction:	             A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
…..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live.
What are the consequences of the widespread presence of the computer technology??
.…..The threats to computers and communication systems…….
Introduction:              Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…
….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…
Is computer technology creating more problems than its solving??
The threats to computers and communications systems… Errors and Accidents Natural and Other Hazards Crimes Against Information Technology Crimes Using Information Technology Virus
Errors and Accidents
…….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….
People Errors            Recall that one part of computer system is the people who manage it or run it…
Procedural Errors           Some spectacular computer failures have occurred because someone didn’t follow procedures..
Software Errors  		We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..
Electromechanical Problems 		 Absence of Electricity or power failure causing the system not to work ..
Dirty Data 		Is Data that is incomplete, outdated or otherwise inaccurate that causes errors in the computer  system..
Natural and Other Hazards
Natural Hazards 		  What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters… 	………Natural Hazards can disable all the electronic systems we take for granted…
Civil Strife and Terrorism
Crimes Against Computers and Communications
Information-technology Crime can be of two types: Illegal act perpetrated against computers or telecommunications.. Use of computers or telecommunications to accomplish an illegal act..
Crimes against information technology include theft…. Theft of Hardware Theft of Software Theft of Time and Services Theft of Information Theft of Malice and Destruction
Crimes Using Computers and   Communications…… 		Computers and communications or information technology has also been used to solve crimes…. 	……..Just as a car can be used to assist  	in a crime, so can a computer or communication system..
VIRUSES
Viruses 		Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…
They are passed in two ways……. Via an Infected Diskette Via a Network
Some common forms of Viruses… Boot-sector Virus File Virus Worm Logic Bomb Trojan Horse Polymorphic Virus Virus Mutation Engines
Antivirus Software Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..
Computer Criminals
What kind of people are perpetrating most of the Information Technology??? Employees Outside Users Hackers Crackers Professional Criminals
COMPUTER ETHICS

Contenu connexe

Tendances

Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethicsbadak sumbu
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 

Tendances (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
7 computer ethics
7 computer ethics7 computer ethics
7 computer ethics
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 

Similaire à COMPUTER ETHICS

A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
Speech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfSpeech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfHome
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Anna Gomez
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Audrey Britton
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdfHome
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyUlduz Sadiq
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...ijaia
 

Similaire à COMPUTER ETHICS (20)

Computers
ComputersComputers
Computers
 
Computer
ComputerComputer
Computer
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
Speech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdfSpeech on Computers a boon or a bane.pdf
Speech on Computers a boon or a bane.pdf
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
 
Essay About Computers
Essay About ComputersEssay About Computers
Essay About Computers
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Computers a boon or a bane.pdf
Computers a boon or a bane.pdfComputers a boon or a bane.pdf
Computers a boon or a bane.pdf
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 

Dernier

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Dernier (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

COMPUTER ETHICS

  • 1.
  • 2. THE LSPU MISSION AND VISION
  • 3. MISSION “The University shall serve a center of excellence in agriculture, fisheries, forestry, science, engineering and industrial technology, teacher education, information technology and other related fields in arts and sciences. It also serves as research and extension services centers in its fields of expertise.”
  • 4. VISION “A premier university in CALABARZON, offering academic programs and related services designed to respond to the requirements of the Philippines and the global economy particularly Asian countries”
  • 5.
  • 6. COMPUTER ETHICS
  • 7. What is a Computer Ethics: …………..Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct..
  • 8. Introduction: A computer system consists not only of software , hardware, data/information and procedures, but also people (the users of computer system). Because computers systems are the products of human efforts, we cannot trust them anymore than we trust people. People can use computer systems for both good and bad purposes, and they may appreciate them or be suspicious of them when they use them.
  • 9. …..…….But regardless of how they use them or how they feel about them, most people realize that computers have changed the way we live.
  • 10.
  • 11. What are the consequences of the widespread presence of the computer technology??
  • 12. .…..The threats to computers and communication systems…….
  • 13. Introduction: Information technology can be disabled by a number of occurrences. It may be harmed by people, procedural, and software errors; by electromechanical problems; and by “dirty data”. It may be threatened by natural hazards and by civil strife and terrorism. Criminal acts perpetrated against computers include theft of hardware, software, time and services, and information; and crimes of malice and destruction…
  • 14. ….Computers may be harmed by viruses. Computers can also be used as instruments of crime. Criminals may be employees, outside users, hackers, crackers, and professional criminals…
  • 15.
  • 16. Is computer technology creating more problems than its solving??
  • 17. The threats to computers and communications systems… Errors and Accidents Natural and Other Hazards Crimes Against Information Technology Crimes Using Information Technology Virus
  • 19. …….In general, errors and accidents in computer systems may be classified as People Errors, Procedural Errors, Software Errors, Electromechanical Problems, and “Dirty Data” problems….
  • 20. People Errors Recall that one part of computer system is the people who manage it or run it…
  • 21. Procedural Errors Some spectacular computer failures have occurred because someone didn’t follow procedures..
  • 22. Software Errors We are forever hearing about “Software Glitches” or software bugs. A Software Bug is an error in a program that causes it to malfunction..
  • 23. Electromechanical Problems Absence of Electricity or power failure causing the system not to work ..
  • 24. Dirty Data Is Data that is incomplete, outdated or otherwise inaccurate that causes errors in the computer system..
  • 25. Natural and Other Hazards
  • 26. Natural Hazards What ever is harmful to property and to people, is harmful to computers and communication system. This certainly includes natural disasters… ………Natural Hazards can disable all the electronic systems we take for granted…
  • 27. Civil Strife and Terrorism
  • 28. Crimes Against Computers and Communications
  • 29. Information-technology Crime can be of two types: Illegal act perpetrated against computers or telecommunications.. Use of computers or telecommunications to accomplish an illegal act..
  • 30. Crimes against information technology include theft…. Theft of Hardware Theft of Software Theft of Time and Services Theft of Information Theft of Malice and Destruction
  • 31. Crimes Using Computers and Communications…… Computers and communications or information technology has also been used to solve crimes…. ……..Just as a car can be used to assist in a crime, so can a computer or communication system..
  • 33. Viruses Viruses are a form of high-tech maliciousness. Computer Viruses are “Deviant” programs that can cause destruction to computers that contract them…
  • 34. They are passed in two ways……. Via an Infected Diskette Via a Network
  • 35. Some common forms of Viruses… Boot-sector Virus File Virus Worm Logic Bomb Trojan Horse Polymorphic Virus Virus Mutation Engines
  • 36.
  • 37. Antivirus Software Scans a computer’s hard disk, diskettes, and main memory to detect viruses, and sometimes, to destroythem…..
  • 39. What kind of people are perpetrating most of the Information Technology??? Employees Outside Users Hackers Crackers Professional Criminals