You are on page 1of 18

Chapter 11

SOCIETAL IMPACT

computer science
INTRODUCTION
In recent years, the world around us has seen a lot
of changes due to use of ‘Digital Technologies’. These
changes have made a dramatic impact on our lives,
making things more convenient, faster, and easier to
handle. In the past, a letter would take days to reach,
and every recipient would get his or her own copy
and respond separately. Today, one can send and
receive emails to more than one person at a time. Electronic
communications has made us more efficient and productive.

Today more and more people are using digital technologies


through smartphones, computers, etc., with the help of high
speed Internet.

Why did the digital technologies become so


widespread? The introduction of personal computers
(PCs) and Internet followed by smartphones has brought
these technologies to the common man.
Digital Footprints THERE ARE TWO KINDS OF DIGITAL FOOTPRINTS WE
LEAVE BEHIND:

Active digital footprints


HAVE YOU EVER PURCHASED AN ONLINE TICKET, OR passive digital footprints.
RESPONDED TO YOUR FRIEND’S EMAIL, OR CHECKED
THE SCORE OF A GAME ONLINE?

Whenever we surf the Internet using smartphones,


tablets, computers, etc., we leave a trail of data Active digital footprints which includes data that
reflecting the activities performed by us online, which
ACTIVE we intentionally submit online.
is our digital footprint.
DIGITAL
FOOTPRINTS This would include emails we write, or
responses or posts we make on different
Our digital footprint can be created and used with websites or mobile Apps, etc.
or without our knowledge. It includes websites
we visit,emails we send, and any information we
submit online, etc., along with the computer’s IP
address, location, and other device specific The digital data trail we leave online
details. Such data could be used for targeted unintentionally is called passive digital
advertisement or could also be misused or PASSIVE footprints.
exploited. Thus, it is good to be aware of the data
trail we might be leaving behind. DIGITAL
FOOTPRINTS This includes the data generated when we
visit a website, use a mobile App, browse
Internet, etc.,

17
MORE ABOUT DIGITAL FOOTPRINTS
Everyone who is connected to the Internet may
have a digital footprint. With more usage, the trail
grows. On examining the browser settings, we
can find out how it stores our browsing history,
cookies, passwords, auto fills, and many other types of data.
Besides browser, most of our digital footprints
are stored in servers where the applications are
hosted. We may not have access to remove or
erase that data, neither do we have any control
on how that data will be used. Therefore, once
a data trail is generated, even if we later try to
erase data about our online activities, the digital
footprints still remain. There is no guarantee that
digital footprints will be fully eliminated from the
Internet. Therefore, we need to be more cautious
while being online! All our online activities leave a data
trace on the Internet as well as on the computing device
that we use. This can be used to trace the user, his/her
location, device and other usage details.

DIGITAL SOCIETY
AND NETIZEN
As our society is inclined towards using more and
more digital technologies, we end up managing most
of our tasks digitally. In this era of digital society, our
daily activities like communication, social networking,
banking, shopping, entertainment, education,
transportation, etc., are increasingly being driven by online
transactions.
Digital society thus reflects the growing trend of
using digital technologies.But while online, all of us need to
be aware of how to conduct ourselves, how best to relate
with others and what ethics, morals and values to maintain.
Being a good netizen means practicing safe, ethical and
legal use of digital technology. A responsible netizen must
abide by net etiquettes, communication etiquettes and
social media etiquettes.
Net
We follow certain etiquettes during our social interactions.Similarly, we need to exhibit

ETIQUETTES proper manners and etiquettes while being online. One should be ethical, respectful and responsible while
surfing the Internet.

BE ETHICAL BE RESPECTFUL BE RESPONSIBLE


NO COPYRIGHT VIOLATION: RESPECT PRIVACY: AVOID CYBER BULLYING:

we should not use copyrighted as good digital citizens we any insulting, online behaviour like
have the right to privacy and the freedom of repeated posting of rumours, giving
materials without the permission of the personal expression.Our personal
creator or owner. As an ethical digital communication with a digital citizen may include threats online, posting the victim’s
citizen, we need to be careful while images, documents, files, etc., that are private personal information, is termed as
to both. We should respect this privacy and cyber bullying.Also, remember our
streaming audio or video or should not share those images, documents, files,
etc., with any other digital citizen without each actions can be traced back using our
downloading images and files from the
others’ consent. digital footprints.
Internet.

SHARE THE EXPERTISE: RESPECT DIVERSITY: DON’T FEED THE TROLL:

it is good to share information and knowledge in a group or public forum, we should respect an Internet troll is a person
on Internet so that others can access it. the diversity of the people in terms of who deliberately start quarrels or
However, prior to sharing information, we knowledge, experience, culture and upset people, by posting off topic
need to be sure that we have sufficient other aspects. messages in an online community,
knowledge on that topic.we should also verify just for amusement.
that the information is not available already
on Internet.
9
Communication
ETIQUETTES
Digital communication includes email, instant messaging, audio or video conferencing, social meedia etc. All these are
great ways to connect with people in order to exchange ideas, share data and knowledge. Good communication over
email, chat room and other such forums require a digital citizen to abide by the communication etiquettes:

BE PRECISE BE POLITE BE CREDIBLE AVOID SPAM AND


PERMANENT DELETION!!!
Respect time: we should not waste Whether the communication is We should be cautious while
precious time in responding to synchronous (happening making a comment,
unnecessary emails or comments unless in real time like chat, audio/video calls) replying or writing an email or
they have some relevance for us. Also, we or asynchronous (like email, forum post forum post as such acts
should not always expect an instant or comments), we should bepolite and decide our credibility over a
response as the recipient may have other non-aggressive in our communication. period of time. That is how
priorities. Weshould avoid being abusive even if we decide to follow some
Respect data limits: For concerns related to we don’t agree with others’ point of particular person’s forum posts
data , very large attachments may be view. while ignoring posts of other
avoided. Rather send compressed files or members of the forum.
link of the files through cloud shared
storage like Google Drive, Microsoft
OneDrive, Yahoo Dropbox, etc.

5
Social Media
ETIQUETTES In the current digital era, we are familiar with different kinds social media and we may have an account on Google+, Instagram, Pinterest,
or YouTube channel.Social media are websites or applications that enable their users to participate in social networking by creating and
sharing content with others in the community.In this way users can interact with other online users of those social media apps or
channels.It has begun to shape the outcome of politics, business, culture, education and more. In social media too, there are certain
etiquettes we need to follow:

LEAKAGE OF USER DATA FROM SOCIAL NETWORK OFTEN ATTRACTS


Choose HEADLINES. USERS SHOULD BE WARY OF SUCH POSSIBILITIES AND
MUST KNOW HOW TO SAFEGUARD THEMSELVES AND THEIR
password ACCOUNTS. THE MINIMUM ONE CAN DO IS TO HAVE STRONG AND
wisely: FREQUENTLY CHANGED PASSWORD. NEVER SHARE PERSONAL
CREDENTIALS LIKE USERNAME AND PASSWORD WITH OTHERS.
BE SECURE
Know who
WE NEED TO BE CAREFUL WHILE
you BEFRIENDING UNKNOWN PEOPLE AS THEIR INTENTIONS
befriend: POSSIBLY COULD BE MALICIOUS AND UNSAFE.

FAKE NEWS, MESSAGES AND POSTS ARE COMMON IN SOCIAL


Beware of NETWORKS. AS A USER, WE SHOULD BE AWARE OF THEM. WITH
fake EXPERIENCE, WE SHOULD BE ABLE TO FIGURE OUT WHETHER A
information: NEWS, MESSAGE OR POST IS GENUINE OR FAKE. THUS, WE
SHOULD NOT BLINDLY BELIEVE IN EVERYTHING THAT WE
COME ACROSS ON SUCH PLATFORMS,
Social Media
ETIQUETTES

WE CAN UPLOAD ALMOST ANYTHING ON SOCIAL NETWORK. HOWEVER, REMEMBER


Think THAT ONCE UPLOADED, IT IS ALWAYS THERE IN THE REMOTE SERVER EVEN IF WE
before DELETE THE FILES. HENCE WE NEED TO BE CAUTIOUS WHILE UPLOADING OR
uploading: SENDING SENSITIVE OR CONFIDENTIAL FILES WHICH HAVE A BEARING ON OUR
PRIVACY.

BE RELIABLE

11
Threats to Computer Security
A threat is a potential violation of security. When a threat is executed,it becomes attack. Those who
execute such actions are called Attackers.

VIRUSES: SPYWARE: PC INTRUSION: PHISHING

WORMS ADWARE DENIAL OF SERVICE


TROJANS SPAMMING SWEEPING
MALWARE IS A GENERAL PASSWORD GUESSING
TERM USED FOR
VIRUSES,WORMS,SPYWA
RE,ADWARE ETC.
MALWARE INFECTS YOUR
COMPUTER.

5
1)COMPUTER VIRUSES,WORMS AND TROJAN HORSES.
COMPUTER VIRUSES ARE MALICIOUS CODES/PROGRAMS THAT CAUSE
DAMAGE TO DATA AND FILES ON A SYSTEM.
ALL COMPUTER VIRUSES ARE MANMADE
VIRUSES CAN ATTACK ANY PART OF THE COMPUTERS SOFTWARE
THE COMPUTER VIRUS REPLICATE THEMSELVES BY COPYING
THEMSELVES TO OTHER DISKS.
EXAMPLES:MACRO VIRUS,BOOT VIRUS,LOGIC BOMB VIRUS ETC

TWO OTHER SIMILAR PROGRAMS ALSO CAUSE VIRUS LIKE EFFECTS:


WORMS: A WORM IS A SELF REPLICATING PROGRAM WHICH
EATS UP THE ENTIRE DISK SPACE OR MEMORY. A WORM KEEPS
ON CREATING ITS COPIES UNTIL ALL THE DISK SPACE OR
MEMORY IS FILLED.

TROJANS OR TROJAN HORSES: A TROJAN IS A PROGRAM THAT


APPEARS HARMLESS BUT ACTUALLY PERFORM MALICIOUS
FUMCTIONS SUCH AS DELETING OR DAMAGING FILES.
TROJANS ARE MOSTLY USED TO CAPTURE YOUR LOGINS AND
PASSWORDS. EX:REMOTE ACCESS TROJANS,BACKDOOR
TROJANS ETC..
DAMAGE CAUSEDBY VIRUSES ,WORMS AND TROJANS.
DAMAGE OR DELETE FILES
SLOW DOWN YOUR COMPUTER: VIRUSES CAN RUN IN
THE BACKGROUND,WITHOUT BEING SEEN, AND MAY
CAUSE UR COMPUTER TO SLOW DOWN.
INVADE YOUR EMAIL PROGRAM: SOME FORMS OF
VIRUSES MAY WRECK EVEN MORE HAVOC BY
SPREADING THEMSELVES TO THE CONTACTS IN YOUR
ADDRESS BOOK
EATING UP ALL THE DISK SPACE: MAKES UR
COMPUTER UNSTABLE
2)SPYWARE:
SPYWARE IS A SOFTWARE INSTALLED ON YOUR COMPUTER
TO SPY ON YOUR ACTIVITIES AND REPORT THIS DATE WHO
ARE WILLING TO PAY FOR IT. IT TRACKS USERS BEHAVIOUR
AND REPORTS INFO BACK TO THE CENTRAL SOURCE. THESE
ARE USED TO SPY ON SOMEONE EITHER FOR LEGAL OR
ILLEGAL PURPOSE.

DAMAGE CAUSED BY SPYWARE:


1)COMPROMISES YOUR DATA,COMPUTING HABITS, AND IDENTITY:
CAN MONITOR INFO ABOUT YOUR COMPUTING HABITS SUCH AS WHAT WEBSITES U VISIT OR
RECORDS YOUR KEYSTROKES WHICH CAN LEAD TO IDENTITY THEFT. SPYWARE CAN RECORD
KEYSTROKES THAT YOU USE WHILE KEYING CREDITCARD NUMBER AND SEND IT TO A
CYBERTHIEF
2)ALTERS PC SETTINGS:
LIKE YOUR WEB BROWSWER PAGE OR THE PLACEMENT OF YOUR DESKTOP ICONS.
3)SLOWS DOWN YOUR PC:
CAN ROB YOUR PC OR SYSTEM SPEED AND INTERNET ACCESS EFFICIENCY
3)ADWARE:
THERE ARE THESE PROGRAMS THAT DELIVER UNWANTED ADS TO YOUR COMPUTER.THEY
CONSUME YOUR NETWORK BANDWIDTH.ADWARE IS SIMILAR TO SPYWARE- HOWEVER, IT MAY
BE INSTALLED WITH YOUR CONSENT. SO IT IS ADVISED THAT YOU THOROUGHLY READ
INSTALLATION AGREEMENTS BEFORE YOU ALLOW INSTALLATION OF A SOFTWARE.

DAMAGE CAUSED

BY ADWARE:
• Adware tracks information just like spyware: Adware tracks information
about your data and computing habits to produce targeted advertising,such
as pop-up ads, on your computer screen.
Displays arrays of annoying advertising: When infected with adware, you
will likely see frequent pop-up ads appear out of nowhere. This may even
happen every time you open your web browser.
• Slows down your PC: The adware software working in the background and
the bombardment of ads can slow your PC to a crawl.
4) SPAMMING:
Spamming refers to the sending of bulk-mail by an identified
or unidentified source. In non-malicious form, bulk- advertising
mail is sent to many accounts.

DAMAGE CAUSED BY SPAMMING:


Spam reduces productivity: The billions of spam messages circulating across
the internet can disrupt email delivery, degrade system pertormance,and reduce
overall productivity.
Spam eats up your time.: Deleting spam emails seems like the simple solution,
but it eats up a significant amount of productivity.
Spam can lead to worse things: Spam messages may contain offensive or
fraudulent material and can even be used to spread viruses.
5) PC INTRUSION
Every PC is connected to the Internet is a potential
target for hackers. PC Intrusion can occur in any of
the following form.

Sweeper Attack: This is another malicious


program used by hackers. It sweeps l.e., deletes
all the data from the system.

Denial of Services: This type of attack eats up all


the resources of a system and the system or
applications come to a halt.

Password Guessing: Most hackers crack or guess


passwords of system accounts and gain entry
into remote computer systems.
6) EAVESDROPPING
Eavesdropping is a passive attack in which an attacker
gains access to the communication-medium through
which some communication is taking place and then
listens to the communication and gets information about
the content of the message.

Eavesdropping can be carried out through all communication


devices and media of today-telephone systems, emails,
instant messaging, other Internet services ,mobile devices etc.

Eavesdropping activities do not affect normal operation of


transmission and communication; thus both the sender and
the recipient can hardly notice that the data has been
stolen, intercepted or defaced.

FOR EXAMPLE: a small microphone bug secretly planted


within a room or phone that records conversations
undetected.
7) PHISHING AND
PHARMING
In Phishing, an imposter uses an authentic looking email or website
to trick recipients into giving out sensitive personal information. For
instance, you may receive an email from your bank asking to update
your information online by clicking at a specified link. Though it
appears genuine, you may be taken to a fraudulent site where all your
sensitive information is obtained and later used for cyber-crimes and
frauds.

Through pharming attack, the attacker points you to malicious and


illegitimate website by redirecting the legitimate URL. Even if the
URL is entered correctly, it can still be redirected to a take website.
In this the attacker convinces you that the site is real and legitimate
by spoofing or looking almost identical to the actual site down to the
smallest details. You may enter your personal information and
unknowingly give it to someone with malicious intent.

You might also like