SOCIETY LAW & ETHICS
Computer ethics is a moral principle that defines the right and wrong activity which can be conducted by the use of computers. Positives impacts of Computer in the Society are the huge amount of work that can be stored in the computer.
Social Effects(ATM,Visa Card, Master Card): people can use automated teller machine cards for withdrawing money deposited with the help of ATM card, Visa Card or Master Card. Information and data can be kept secret with the special login name and password protection in the computers.
Negative impacts of Computer in the Society are:
• Computers are very expensive and cannot be affordable for general people
• Due to the malfunction of the electronic devices and computers, huge amount of data can belost
Cybercrime or computer- oriented crime is a crime that includes a computer and a network. The computer may have been used in the execution of a crime or it may be the target. Itis the use of a computer as a weapon for committing crimes such as committing fraud, identity theft or breaching privacy. It especially through the Internet, has grown in importance as the computer has become central to every field like commerce,
entertainment and government. It may endanger a person or a nation’s security and financial health.
Cyber crime encloses a wide range of activities but these can generally be divided in to two categories:
• Crimes that aim at computer networks or devices. These types of crimes involves different threats (like virus, bugs etc.) and denial-of-service (DoS)attacks.
• Crimes that use computer networks to commit other criminal activities. These types of crimes include cyber stalking, financial fraud or identity theft.
Classification of Cyber Crime:
1. Cyber Terrorism:
Cyber terrorism is the use of the computer and internet to perform violent acts that result in loss of life. This may include different type of activities either by software or hardware for threatening life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed through the use of cyberspace or computer resources.
2. Cyber Extortion:
Cyber extortion occurs when a website, e-mail server or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand huge money in return for assurance to stop the attacks and to offer protection.
3. Cyber Warfare:
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations, threat of cyber-attacks, espionage and sabotage.
4. Internet Fraud:
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include hiding of information or providing incorrect information for the purpose of deceiving victims for money or property. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace.
5. Cyber Stalking:
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. In this case, these stalkers know their victims and instead of offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
Prevention of Cyber Crime:
Below are some points by means of which we can prevent cybercrime:
1. Use strong password:
Maintain different password and username combinations for each account and resist the temptation to write them down. Weak passwords can be easily cracked using certain attacking methods like Brute force attack, Rainbow table attack etc
.
2. Use trusted antivirus indevices:
Always use trustworthy and highly advanced antivirus software in mobile and personal computers. This leads to the prevention of different virus attack on devices.
3. Keep social media private:
Always keep your social media accounts data privacy only to your friends. Also make sure only to make friend who are known to you.
4. Keep your device software updated:
Whenever you get the updates of the system software, update it at the same time because sometimes the previous version can be easily attacked.Phishing is a cyber attack that uses disguised email as a weapon.Cyber forensics is a way or an electronic discovery technique which is used to determine and reveal technical criminal evidence.
Various capabilities of cyber forensics are.
• Computer forensics
• Computer exams.
• Data analysis.
• Data base study.
• Malware analysis.
• Mobile devices.
• Network analysis.
• Photography.
• Video analysis.
Intellectual property (IP) is a term referring to creation of the intellect (the term used in studies of the human mind) for which a mono poly is assigned to design ate downers by law. In some foreign countries intellectual property rights is referred to as industrial property, copyright, patent and trademarks, trade secrets all these cover music, literature and other artistic works, discoveries and inventions and words, phrases, symbols and designs. Intellectual Property Rights are themselves a form of property called intangible property. Al though many of the legal principles governing IP and IP R have evolved over centuries, it was not until the 19 th century that the term intellectual property began to be used and not until the late 20 th century that it became commonplace in the majority of the world. IP is divided into two categories for ease of understanding:
1. Industrial Property
2. Copyright
Please click on below link to download CBSE Class 11 Information Practice Society Law And Ethics Notes