Chapter 5 - Computer Security & Ethics
Chapter 5 - Computer Security & Ethics
CHAPTER 5
Computer Security and
Ethics
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 2
COMPUTER SECURITY
We store important data on our computers in the shape of documents, pictures, programs,
etc. Therefore, we expect that all our information must remain safe and our computer runs
properly without any problem. To prevent our computer from various threats, we need to
abide by computer security.
CYBERCRIMES
Cybercrime is committed through a computer. Cybercriminal uses devices to gain
unauthorized access to important information. Stealing passwords and important
information, hacking social media accounts, committing online frauds are some of the
examples of cybercrime. Cybercrimes are illegal and also punishable. Computer crime can
range from an international data security threat to a personal offense.
There are many genres of computer crimes. Some examples of such crimes in real life are
discussed here.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 3
Hacking
Hacking is the most common crime in the computer world. Hackers can steal our Wi-Fi,
email or social media account passwords. Hackers also attack website and take it down.
Hackers can also steal sensitive information from government and business organizations,
make fraudulent transactions and erase data on the cloud or network computers.
Phishing
Phishing is a method of gathering personal information using false e-mails and websites. In
phishing, perpetrators contact the target person through email, telephone or text message
and pose as a legitimate and trusted individual. He or she asks the target to provide
sensitive data such as banking and credit card details which is then misused.
Examples of Phishing
A fraudulent SMS, social media message or other in-app message asks the recipient to
update their account details, change their password, or tell them their account has been
violated.
E-mails informing users of suspicious activity on their accounts and ask them to change
their password. These phishing attacks aim to steal credentials or other sensitive
information.
Cyber criminals send phishing emails that include links to fake websites, such as the
Facebook account login page asking the victim to enter credentials into fake interface.
A Facebook friend request arrives from someone and you don’t immediately recognize
the person. This new friend then sends you a message with a link that, when clicked,
installs malware on your computer.
Click Jacking
This is a kind of fraud in which culprits target children or novice internet users. It is a
malicious technique of tricking a user into clicking on something different from what the
user perceives, thus potentially revealing confidential information or allowing others to
take control of their computer
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 4
Cyber Bullying
Cyber bullying is a form of harassment using electronic
means. It has become increasingly common, especially
among teenagers, as the digital space has expanded and
technology has advanced. Cyber bullying is when someone
bullies or harasses others on the internet particularly on social
media sites. Harmful bullying behavior can include posting
rumors, threats, inappropriate remarks, blackmailing etc.
Cracker
The sole aim of crackers is to make the software available for free for their personal use or
unlicensed copying and distribution. They also try to gain access to a software premium
version without any payments to its creators. They commit these activities generally for
money but they may do it for fame or just for challenge or fun.
ETHICAL HACKING
Ethical Hacking is an authorized practice of bypassing system security to identify potential
data breaches and threats in a network. The company that owns the network allows cyber
security engineers (ethical hackers) to perform such activities in order to test the system’s
defense. Thus, unlike malicious hacking, this process is planned, approved, and legal.
Ethical hackers, also known as white hat hackers are security experts that perform these
security assessments.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 5
SOFTWARE PIRACY
Software piracy is referred to the illegal use, copying
or distribution of copyright protected software.
Software piracy is a huge threat to the software
industry. It causes a significant loss of revenue for
developers and vendors. Software companies have
tried various techniques to stop software piracy but
most of them have remained unsuccessful. It causes
following harmful effects to the software
developers…
Because of piracy, vendors have fewer resources for research and development.
Piracy eats profit so vendors are forced to pass extra cost to their customers.
Piracy brings losses to software companies and directly affects the people working for it.
PLAGIARISM
Plagiarism is presenting someone else’s work or ideas as your own without
acknowledgment to the author. It is unethical and can have serious consequences. Colleges
and universities encourage students to submit their original work. There are various online
services to check the plagiarism issues some of which are…
Turnitin Grammarly WriterZen QueText
Report such incidents immediately to people you trust such as your parents and teachers.
Keep record of evidence such as call recording, screenshot, date and time it occurred etc.
Government of Pakistan has setup National Response Centre to curb such crimes.
Patent
A patent is a grant of exclusive rights for an invention to make, use
and sell the invention for a limited period of time. Owning a patent
gives the patent holder the right to stop someone else from
making, using or selling his or her invention without permission.
Copyright
Copyright is a legal instrument that provides legal rights to the
creator of artwork, literature, or a work that conveys
information or ideas. In simple words, copyright is the right of
copying. Copyright gives control over how the work is used.
Trademark
Trademarks are protected by intellectual property rights
which identifies that the product or service belongs to a
specific organization. It can be an easily recognizable
word, theme or logo. Trademark helps organizations to
market their products locally and globally.
ACCURACY OF INFORMATION
Information accuracy assures that the information is correct and true. It is also necessary
that the information should not be generated from the malicious data. For information
accuracy, the data must be from reputable sources. In the era of information, we need to
be more careful while using information. The accuracy of information shared on social
media is often questionable.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 8
AUTHENTICATION MECHANISM
Authentication mechanism is the hardware or software based mechanism that forces users
to prove their identity before accessing data on a device. The process makes sure the only
authenticated user gets access to data or devices.
Biometric Verification
Biometric verification makes sure that only real person gets access to the data or device. It
relies on the unique biological characteristics of a person. Scanning fingerprints are the
most common way of biometric. However, some other advance ways include retinal scans,
facial and voice recognitions.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 9
MALWARE
The term malware is derived from malicious software. Malware is a broad term that
includes computer viruses, worms, spyware, adware etc. Malware is a program that is
written generally to cause a problem.
TYPES OF MALWARE
Types of malware include… Viruses Worms Adware Spyware Ransom ware
Virus
Computer virus is a program that infects other programs and files upon contact. A virus
attaches itself to other files and programs residing in the system. It also infects computer
networks. Some famous computer viruses are Melissa, Klez, Code Red, Sasser, Stuxnet etc.
Worm
A computer worm spreads copies of itself from computer to computer. A worm can
replicate itself without any human interaction. It does not need to attach itself to a file or
program to cause damage. It can do several malicious tasks, such as copying itself onto
devices, deleting files, and consuming internal storage and memory resources.
Adware
Adware present endless ads and pop-up windows that could potentially consume memory
and processing resources. Adware can also change the different settings of internet
browsers like homepage and default search engine. Normally, these are not as dangerous
as other malware. However, adware annoys the user and slows down the processing.
Spyware
Spyware monitors a device and steals important information without user consent and
sends such information to someone else. Spyware takes control over a mobile phone or
computer without the user’s knowledge. They capture information like web browsing
history, e-mail messages, usernames and passwords and online payment information.
Ransom ware
Ransom ware encrypts victim’s data, without damaging it, making them inaccessible, and
demands a ransom payment to decrypt them. Ransom ware uses an advance technology
called ‘crypto-viral extortion’. Ransom ware attacks are typically carried out using a Trojan
disguised as a legitimate file that the user is tricked into downloading or opening.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 10
COMPUTER VIRUS
Computer virus is a program that infects other programs and files upon contact. A virus
attaches itself to other files and programs residing in the system. It also infects computer
networks. Some famous computer viruses are Melissa, Klez, Code Red, Sasser, Stuxnet etc.
Unlike the biological viruses that causes cold and diseases in humans, computer viruses do
not occur naturally. A virus program may look harmless, simply producing a silly message
on the screen but sometimes it may be very destructive and harmful.
Macro Virus
A virus written using the macro language to infect the computer when opened is called
macro virus. Typically, macro virus is transmitted through phishing emails containing
malicious attachments.
Trojan Horse
A Trojan horse is a malware that downloads onto a computer disguised as a freeware or
hidden in an email attachment. It is designed to damage, disrupt, steal, or inflict some
other harmful action on data or network.
Program Virus
The program virus infects the executable programs. It attacks the system and infects other
files within it. Program virus looks for system’s vulnerabilities and targets them.
Worm
Worm is a malware that replicates itself exponentially in order to spread to other
computers. It often uses a computer network to spread itself, relying on security failures of
the target computer.
VIRUS ACTIVITIES
There are many types of viruses with different motives and purposes. Some of the most
common damages, a virus is programmed to do are…
Copy themselves to other programs, making the system slow and unresponsive
Display unwanted garbage or message on the screen
Destroy data files by corrupting programs
Erase an entire hard disk
Remain dormant for a specified date and time or until a given condition is met
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 12
Internet Downloads
Computer viruses also spread through files or software downloaded from Internet. The
viruses come from the internet can also make our computer accessible to hackers. It is
highly recommended that the software and files must be downloaded from trusted
sources.
Computer Network
Computer network is another big source of spreading viruses. Users must be careful
because files picked from a Local Area Network (LAN) may be infected and cause damage
to the computer or operating system.
Email Attachments
Email attachments have been a popular medium to spread viruses. Viruses can easily be
transferred from one computer to another through email attachments. The infected emails
may come from an unknown or fake email address.
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 13
The first computer virus, Brain, was discovered in 1986 and was created by two brothers,
Basit and Amjad Farooq Alvi, who ran a computer store in Lahore, Pakistan. Brain was a
boot sector virus, which means it infected the boot sector of floppy disks.
The primary purpose of the virus was not to cause harm, but rather to protect software
from being copied without their permission.
ANTIVIRUS
Computer users need to protect their computers from viruses to safeguard their system
files, valuable data and personal information. Antivirus are programs that offer such
protection to computers against viruses. However no antivirus program can guarantee
100% protection as hundreds of new viruses emerge daily. The only solution is to keep the
antivirus software up to date.
A good anti-virus program checks for infected files automatically every time you insert
removable media or download files from internet. Some of the common and trustworthy
antivirus programs are…
Computer Science - For Grade IX Written and Composed by SYED ATIF FEROZ 14
EXERCISE
1 Why is computer security important? Write few reasons.
2 Explain cyber bullying with few examples.
3 What is cybercrime? Explain cybercrimes in real life.
4 Who are hackers and crackers?
5 Give two examples of phishing.
6 What is ethical hacking?
7 What we should do in case of becoming a cybercrime victim?
8 Write few measures to avoid email account hacking.
9 Explain importance of ethics in computer field. Mention some general professional ethics.
10 What is software piracy? How is software piracy harmful for software developers?
11 What is intellectual property right? How we can protect our intellectual property?
12 What is plagiarism?
13 Why is information accuracy important?
14 What is authentication mechanism? Explain in detail.
15 What is a malware? What are its different types?
16 What are some safety measures against malware?
17 What is a computer virus?
18 What are some ways of virus spread?
19 What is an antivirus?