0% found this document useful (0 votes)
13 views

Chapter 5 - Computer Security & Ethics

The document discusses computer security and ethics, emphasizing the importance of protecting sensitive data from cyber threats and various forms of cybercrime, including hacking, phishing, and malware. It also covers ethical hacking, software piracy, plagiarism, and the significance of professional ethics in the computing field. Additionally, it provides guidelines for securing email accounts, safeguarding against malware, and the importance of intellectual property rights.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Chapter 5 - Computer Security & Ethics

The document discusses computer security and ethics, emphasizing the importance of protecting sensitive data from cyber threats and various forms of cybercrime, including hacking, phishing, and malware. It also covers ethical hacking, software piracy, plagiarism, and the significance of professional ethics in the computing field. Additionally, it provides guidelines for securing email accounts, safeguarding against malware, and the importance of intellectual property rights.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 1

CHAPTER 5
Computer Security and
Ethics
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 2

COMPUTER SECURITY
We store important data on our computers in the shape of documents, pictures, programs,
etc. Therefore, we expect that all our information must remain safe and our computer runs
properly without any problem. To prevent our computer from various threats, we need to
abide by computer security.

Importance of Computer Security


 It keeps our sensitive and private information protected and helps prevent viruses.
 Maintaining proper computer security ensures computer’s overall health.
 It protects individuals and organizations against cyber threats and loss of data.
 It enables people to perform their work in safe environment.
 It helps in the execution of essential business processes.

CYBERCRIMES
Cybercrime is committed through a computer. Cybercriminal uses devices to gain
unauthorized access to important information. Stealing passwords and important
information, hacking social media accounts, committing online frauds are some of the
examples of cybercrime. Cybercrimes are illegal and also punishable. Computer crime can
range from an international data security threat to a personal offense.

There are many genres of computer crimes. Some examples of such crimes in real life are
discussed here.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 3

Hacking
Hacking is the most common crime in the computer world. Hackers can steal our Wi-Fi,
email or social media account passwords. Hackers also attack website and take it down.
Hackers can also steal sensitive information from government and business organizations,
make fraudulent transactions and erase data on the cloud or network computers.

Credit/Debit Card Scam


There are various ways to get information from credit/debit card we are using. One way is
through scamming. Scammers set small machines inside an ATM or credit card machine.
These machines copy the data which is then misused.

Phishing
Phishing is a method of gathering personal information using false e-mails and websites. In
phishing, perpetrators contact the target person through email, telephone or text message
and pose as a legitimate and trusted individual. He or she asks the target to provide
sensitive data such as banking and credit card details which is then misused.

Examples of Phishing
 A fraudulent SMS, social media message or other in-app message asks the recipient to
update their account details, change their password, or tell them their account has been
violated.

 E-mails informing users of suspicious activity on their accounts and ask them to change
their password. These phishing attacks aim to steal credentials or other sensitive
information.

 Cyber criminals send phishing emails that include links to fake websites, such as the
Facebook account login page asking the victim to enter credentials into fake interface.

 A Facebook friend request arrives from someone and you don’t immediately recognize
the person. This new friend then sends you a message with a link that, when clicked,
installs malware on your computer.

Click Jacking
This is a kind of fraud in which culprits target children or novice internet users. It is a
malicious technique of tricking a user into clicking on something different from what the
user perceives, thus potentially revealing confidential information or allowing others to
take control of their computer
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 4

Cyber Bullying
Cyber bullying is a form of harassment using electronic
means. It has become increasingly common, especially
among teenagers, as the digital space has expanded and
technology has advanced. Cyber bullying is when someone
bullies or harasses others on the internet particularly on social
media sites. Harmful bullying behavior can include posting
rumors, threats, inappropriate remarks, blackmailing etc.

Examples of Cyber Bullying


 Hacking into someone’s social networking profile
 Spreading secrets or rumors about people online
 Pretending to be someone else or hiding real identity to spread hurtful messages online
 Harassing or threatening someone

HACKERS AND CRACKERS


Hacker
Hacker is a person who has in-depth knowledge of computer systems, networks, and
programs. They use their extensive skills to identify and overcome network flaws. A
hacker breaks into a computer system. A hacker can install malware, steal or destroy data,
disrupt service, and much more.

Cracker
The sole aim of crackers is to make the software available for free for their personal use or
unlicensed copying and distribution. They also try to gain access to a software premium
version without any payments to its creators. They commit these activities generally for
money but they may do it for fame or just for challenge or fun.

ETHICAL HACKING
Ethical Hacking is an authorized practice of bypassing system security to identify potential
data breaches and threats in a network. The company that owns the network allows cyber
security engineers (ethical hackers) to perform such activities in order to test the system’s
defense. Thus, unlike malicious hacking, this process is planned, approved, and legal.
Ethical hackers, also known as white hat hackers are security experts that perform these
security assessments.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 5

SOFTWARE PIRACY
Software piracy is referred to the illegal use, copying
or distribution of copyright protected software.
Software piracy is a huge threat to the software
industry. It causes a significant loss of revenue for
developers and vendors. Software companies have
tried various techniques to stop software piracy but
most of them have remained unsuccessful. It causes
following harmful effects to the software
developers…

 Because of piracy, vendors have fewer resources for research and development.
 Piracy eats profit so vendors are forced to pass extra cost to their customers.
 Piracy brings losses to software companies and directly affects the people working for it.

PLAGIARISM
Plagiarism is presenting someone else’s work or ideas as your own without
acknowledgment to the author. It is unethical and can have serious consequences. Colleges
and universities encourage students to submit their original work. There are various online
services to check the plagiarism issues some of which are…
 Turnitin  Grammarly  WriterZen  QueText

PROFESSIONAL ETHICS IN COMPUTER FIELD


The role of professional code of ethics is to clarify value of rules and can be used as a
framework for discipline. Computing professionals actions change the world.
Here are some guiding principles…

 Be honest and trustworthy


 Respect the equipment and avoid causing any harm
 Be fair and act not to discriminate, bully or harass
 Respect privacy and maintain confidentiality
 Create opportunities for individuals to grow as professional
 Access computing and communication resources only when authorized
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 6

STEPS TO SECURE EMAIL ACCOUNT


Following are the general measures to protect an email account from hackers attack…
 Use a unique password and two-factor authentication method.
 Do not open suspicious emails and hyperlinks.
 To be anonymous, use a VPN on your computer and your phone.
 Avoid using public Wi-Fi and computers.
 Get a strong antivirus with internet protection and keep it updated.
 Secure your router and Wi-Fi.
 Keep your computer and smartphone OS and apps updated.

ADVICE FOR CYBERCRIME VICTIMS


There are certain ways to act if we became a cybercrime victim…
 Change all passwords immediately and especially for bank accounts.

 Report such incidents immediately to people you trust such as your parents and teachers.

 Keep record of evidence such as call recording, screenshot, date and time it occurred etc.

 Government of Pakistan has setup National Response Centre to curb such crimes.

 Online complaint can be launched on [email protected] or by calling helpline 9911.


Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 7

INTELLECTUAL PROPERTY RIGHT


Intellectual property is intangible creations of the
human intellect. When any person develops software,
writes a book or research paper or invents any method
or the machine, it becomes the intellectual property of
that person. Just like other property the intellectual
property can be stolen. Intellectual property is
protected with the help of copyrights, patents, and
trademarks.

Patent
A patent is a grant of exclusive rights for an invention to make, use
and sell the invention for a limited period of time. Owning a patent
gives the patent holder the right to stop someone else from
making, using or selling his or her invention without permission.

Copyright
Copyright is a legal instrument that provides legal rights to the
creator of artwork, literature, or a work that conveys
information or ideas. In simple words, copyright is the right of
copying. Copyright gives control over how the work is used.

Trademark
Trademarks are protected by intellectual property rights
which identifies that the product or service belongs to a
specific organization. It can be an easily recognizable
word, theme or logo. Trademark helps organizations to
market their products locally and globally.

ACCURACY OF INFORMATION
Information accuracy assures that the information is correct and true. It is also necessary
that the information should not be generated from the malicious data. For information
accuracy, the data must be from reputable sources. In the era of information, we need to
be more careful while using information. The accuracy of information shared on social
media is often questionable.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 8

AUTHENTICATION MECHANISM
Authentication mechanism is the hardware or software based mechanism that forces users
to prove their identity before accessing data on a device. The process makes sure the only
authenticated user gets access to data or devices.

TYPES OF SECURITY MECHANISM


There are many ways a computer security system authenticates a user. Some of them are…
 Username and Password  Personal Identification Number  Biometric Verification

Username and Password


A username and password is the pair of keywords
known by the user. They are presented to the computer
to authenticate the user. Usernames and passwords are
the default authentication mechanism on the web
today.

Personal Identification Number


PIN stands for Personal Identification Number. It is a security
code for verifying your identity. Similar to a password, your PIN
should be kept secret because it allows access to important
services such as financial transactions and confidential emails.

Biometric Verification
Biometric verification makes sure that only real person gets access to the data or device. It
relies on the unique biological characteristics of a person. Scanning fingerprints are the
most common way of biometric. However, some other advance ways include retinal scans,
facial and voice recognitions.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 9

MALWARE
The term malware is derived from malicious software. Malware is a broad term that
includes computer viruses, worms, spyware, adware etc. Malware is a program that is
written generally to cause a problem.

TYPES OF MALWARE
Types of malware include…  Viruses  Worms  Adware  Spyware  Ransom ware

Virus
Computer virus is a program that infects other programs and files upon contact. A virus
attaches itself to other files and programs residing in the system. It also infects computer
networks. Some famous computer viruses are Melissa, Klez, Code Red, Sasser, Stuxnet etc.

Worm
A computer worm spreads copies of itself from computer to computer. A worm can
replicate itself without any human interaction. It does not need to attach itself to a file or
program to cause damage. It can do several malicious tasks, such as copying itself onto
devices, deleting files, and consuming internal storage and memory resources.

Adware
Adware present endless ads and pop-up windows that could potentially consume memory
and processing resources. Adware can also change the different settings of internet
browsers like homepage and default search engine. Normally, these are not as dangerous
as other malware. However, adware annoys the user and slows down the processing.

Spyware
Spyware monitors a device and steals important information without user consent and
sends such information to someone else. Spyware takes control over a mobile phone or
computer without the user’s knowledge. They capture information like web browsing
history, e-mail messages, usernames and passwords and online payment information.

Ransom ware
Ransom ware encrypts victim’s data, without damaging it, making them inaccessible, and
demands a ransom payment to decrypt them. Ransom ware uses an advance technology
called ‘crypto-viral extortion’. Ransom ware attacks are typically carried out using a Trojan
disguised as a legitimate file that the user is tricked into downloading or opening.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 10

SAFEGUARD AGAINST MALWARE


Keeping ourselves safe from malware and viruses is mostly in our hands. More than 90%
of computers are infected due to the user’s mistake. Some simple measures can prevent
our system from malware and viruses.

 Install anti-virus software and keep it updated.


 Run scheduled scans regularly with your anti-virus software.
 Keep your operating system updated.
 Do not click on internet links which have unusual labels, images or captions.
 Do not open email attachments or click on hyperlinks from unknown senders.
 Scan USB flash drive, DVD and SD cards before opening.
 Only download files and programs from trusted sources on the internet.
 Never use a public/open Wi-Fi.

KEEPING THE BACKUP OF DATA


We should also take periodical back up of data. Some steps in this regard are…
 Create a system restore point regularly and check if it is not disabled.
 Save important data on DVD since they are write-protected, they cannot catch viruses.
 Have the back-up of important files.
 You can also save documents on cloud storage services like Google Drive.

COMPUTER VIRUS
Computer virus is a program that infects other programs and files upon contact. A virus
attaches itself to other files and programs residing in the system. It also infects computer
networks. Some famous computer viruses are Melissa, Klez, Code Red, Sasser, Stuxnet etc.

Unlike the biological viruses that causes cold and diseases in humans, computer viruses do
not occur naturally. A virus program may look harmless, simply producing a silly message
on the screen but sometimes it may be very destructive and harmful.

Some common types of viruses are…


 Boot Record Virus  Macro Virus  Trojan Horse  Program Virus
 File Infector Virus  Worm
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 11

Boot Record Virus


It is a type of virus that infects the boot sector of hard disks. The boot sector comprises all
the files (Master Boot Record) which are required to start the OS. The virus overwrites the
existing record with garbage values leaving the computer unable to load the OS.

Macro Virus
A virus written using the macro language to infect the computer when opened is called
macro virus. Typically, macro virus is transmitted through phishing emails containing
malicious attachments.

Trojan Horse
A Trojan horse is a malware that downloads onto a computer disguised as a freeware or
hidden in an email attachment. It is designed to damage, disrupt, steal, or inflict some
other harmful action on data or network.

Program Virus
The program virus infects the executable programs. It attacks the system and infects other
files within it. Program virus looks for system’s vulnerabilities and targets them.

File Infector Virus


These viruses are often memory resident, means once executed they remain active in the
computer’s memory and can infect more files and programs. The main source of this virus
is games and free applications.

Worm
Worm is a malware that replicates itself exponentially in order to spread to other
computers. It often uses a computer network to spread itself, relying on security failures of
the target computer.

VIRUS ACTIVITIES

There are many types of viruses with different motives and purposes. Some of the most
common damages, a virus is programmed to do are…
 Copy themselves to other programs, making the system slow and unresponsive
 Display unwanted garbage or message on the screen
 Destroy data files by corrupting programs
 Erase an entire hard disk
 Remain dormant for a specified date and time or until a given condition is met
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 12

HOW A VIRUS SPREADS…?


Following are some ways of virus spread…

USB Flash Disk / CD


USB Flash Disks are the most common media to transfer files. An infected computer can
spread a virus to a clean USB flash disk that is inserted and likewise, an infected USB can
transmit the virus onto a clean computer. Copying infected files from the USB or CD can
infect the computer.

Internet Downloads
Computer viruses also spread through files or software downloaded from Internet. The
viruses come from the internet can also make our computer accessible to hackers. It is
highly recommended that the software and files must be downloaded from trusted
sources.

Computer Network
Computer network is another big source of spreading viruses. Users must be careful
because files picked from a Local Area Network (LAN) may be infected and cause damage
to the computer or operating system.

Email Attachments
Email attachments have been a popular medium to spread viruses. Viruses can easily be
transferred from one computer to another through email attachments. The infected emails
may come from an unknown or fake email address.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 13

THE FIRST COMPUTER VIRUS

The first computer virus, Brain, was discovered in 1986 and was created by two brothers,
Basit and Amjad Farooq Alvi, who ran a computer store in Lahore, Pakistan. Brain was a
boot sector virus, which means it infected the boot sector of floppy disks.
The primary purpose of the virus was not to cause harm, but rather to protect software
from being copied without their permission.

ANTIVIRUS
Computer users need to protect their computers from viruses to safeguard their system
files, valuable data and personal information. Antivirus are programs that offer such
protection to computers against viruses. However no antivirus program can guarantee
100% protection as hundreds of new viruses emerge daily. The only solution is to keep the
antivirus software up to date.
A good anti-virus program checks for infected files automatically every time you insert
removable media or download files from internet. Some of the common and trustworthy
antivirus programs are…
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 14

EXERCISE
1 Why is computer security important? Write few reasons.
2 Explain cyber bullying with few examples.
3 What is cybercrime? Explain cybercrimes in real life.
4 Who are hackers and crackers?
5 Give two examples of phishing.
6 What is ethical hacking?
7 What we should do in case of becoming a cybercrime victim?
8 Write few measures to avoid email account hacking.
9 Explain importance of ethics in computer field. Mention some general professional ethics.
10 What is software piracy? How is software piracy harmful for software developers?
11 What is intellectual property right? How we can protect our intellectual property?
12 What is plagiarism?
13 Why is information accuracy important?
14 What is authentication mechanism? Explain in detail.
15 What is a malware? What are its different types?
16 What are some safety measures against malware?
17 What is a computer virus?
18 What are some ways of virus spread?
19 What is an antivirus?

Multiple Choice Questions


1 malware 5 offer only limited service 9 all of them
2 biometric 6 plagiarism 10 click jacking
3 copyrights 7 adware
4 option d 8 worm

You might also like