Professional Documents
Culture Documents
Presentation on
Security & Ethical Challenges
Presented By:-
Submitted To:-
Name:- Pratiksha Singh
Roll No.:- 201810101110098 Mrs. Kanchan Lata
Group:- 54
Security challenges
Computer crimes that exist in the present society
are:-
1. Hacking
2. Cyber Theft
3. Unauthorized use at work
4. Software Piracy
5. Piracy of intellectual property
6. Computer viruses and worms
HACKING
Hacking is the obsessive use of computers, or the
unauthorized access and use of networked
computer systems. Hackers usually:-
● Steal or damage data.
● Get unauthorized access to computer files.
● Monitor, emails or web server access.
● May use remote services that allow one computer
to execute the program of another.
Cyber Theft
Cyber theft involves theft of money by
unauthorized network entry and
fraudulent alteration of
computer databases.
Unauthorized use at Work
Unauthorised use of computer resources especially
by employees:-
❏ Playing video games
❏ Unauthorized use of internet
❏ Non-work related upload/download
❏ Transmission of confidential data
❏ Moonlighting
Software Piracy
Unauthorized copying of data
is called software piracy or
software theft.
Software is protected by
copyright law and user license
agreement that allows only
limited copies to be made.
Piracy of Intellectual Property
Materials other than software are also
pirated by making multiple copies.
● Piracy of music, video, images, articles,
books etc.
● Dissemination of these material through
internet websites.
Computer viruses and worms
● A virus is a program code that cannot work without being inserted into
another program.
❏ Encrypt email.
❏ Send newsgroup postings through anonymous
remailers.
❏ Ask your ISP not to sell your name and
information to mailing list providers and other
marketers.
❏ Don’t reveal personal data and interests on
online service and website user profiles.
Security Management
❏ Encryption
❖ The goal of ❏ Firewalls
security management ❏ Denial of service attacks
❏ E-mail monitoring
is the accuracy, ❏ Virus defense
integrity, and ❏ Security codes
❏ Backup Files
safety of all ❏ Security monitors
information system ❏ Biometric security
❏ Computer failure controls
processes and ❏ Fault tolerant systems
resources ❏ Disaster recovery
❏ System controls and audits