Professional Documents
Culture Documents
Society Law and Ethics
Society Law and Ethics
Day plan
2
Digital Footprints
What is Digital Footprint?
Trolling has become a more common term for any kind of purposeful online abuse on social media sites like Twitter or
Facebook.
How to report a cyber crime?
How can cyber crime can be reported
1. Be Authentic - while sharing personal information about oneself is not ideal, sharing misinformation is even worse.
Spreading misinformation (rumours) online is a punishable offence in India. As per IT Act India, spreading rumours
may result in a fine or a jail term up to 3 years.
2. Use a disclaimer while sharing personal views.
3. Be politically correct / do not pick fights online
4. Protect your identity
5. Does the post pass the PUBLICITY test? That means that your post should be acceptable if you were to say the
same thing in a face to face conversation.
6. Respect others’ opinions.
7. Check the comments that you receive for a post.
LinkedIn
Pre-work for the next class
Virus
A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It
spreads from one computer to another, leaving infections as it travels. Almost all viruses are attached to an executable file, which
means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host
file or program. When the host code is executed, the viral code is executed as well. Viruses spread when the software or document
they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected email attachments.
Worm
A worm is a malicious program that spreads from one computer to another without human assistance, by using the data transmission
media / network available. In contrast to viruses, which require the spreading of an infected host file, worms are standalone
software and do not require a host program or human help to propagate. A worm can replicate itself on a system, making
hundreds or thousands of copies of itself. Each of these copies will reach a new device, creating a huge devastating effect.
Trojan
A Trojan horse is a malicious program that looks like a genuine application.Unlike worms, Trojan horses do not reproduce by
infecting other files nor do they replicate themselves but they can be just as destructive. Trojans spread through user
interaction such as opening an email attachment or downloading and running a file from the Internet.Trojans also open a
backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal
information to be stolen
Difference between the terms: Virus, worms, Trojan, Spyware.
Spyware
● Gets installed on the computer to spy on the activities,user’s behaviour
● Reports this data to a central source/people willing to pay for it.
● This data can be used for legal/illegal purposes.
● Get installed on your PC without your consent.
● Usually piggybacked onto a file or gets downloaded from the internet from particular websites.
● Can sit silently until found
Damage caused by viruses trojans and spyware:
Malware
● It is a general term used to refer to viruses,worms,spyware,adware,etc.
● It is unwanted software that someone else wants to run on your computer which infects it and makes your computer
behave in a way which you don’t approve of.
Spamming
● Sending of bulk mail by identified or unidentified sources
Active protection:
● Installation of antivirus and antispyware softwares
● Download updates of antiviruses regularly
● Run frequent full system scans
Preventive measures:
● Keep the operating system up-to date
● Use caution while downloading files from the internet
● Be careful with Emails
● Disable cookies ,if possible
Refer page 535-Solutions to Computer Security Threats and Solutions to Viruses, Adware and Spyware
Do now
https://economictimes.indiatimes.com/tech/internet/e-fraud-online-shopper-conned-in-noida/videoshow/63150506.cms
Plan
● Cyber Crime - hacking, eavesdropping, phishing and fraud emails, ransomware, preventing
cyber crime
Cyber crime
● Criminal activities or offences carried out in a digital environment can be considered as cyber
crime. In such crimes, either the computer itself is the target or the computer is used as a tool to
commit a crime.
● Cyber crimes are carried out against either an individual, or a group, or an organisation or even
against a country, with the intent to directly or indirectly cause physical harm, financial loss or
mental harassment.
● A cyber criminal attacks a computer or a network to reach other computers in order to disable or
damage data or services.
● Apart from this, a cyber criminal may spread viruses and other malwares in order to steal private
and confidential data for blackmailing and extortion.
● Some examples of cyber crime include:
○ Undelivered goods or cheaper / wrong goods delivered in online shopping / denial of a
service after taking money
○ Hacking
○ Ransomware
○ Phishing
○ Scams
○ Financial fraud
○ Eavesdropping
○ Cyber stalking / bullying / trolling
○ Identity theft
○ Illegal downloads (Media piracy) (not in syllabus, but students can learn about this)
○ Child pornography (not in syllabus, but students can learn about this)
○ Nigerian prince (not in syllabus, but you can learn about this)
Hacking
The act of compromising digital devices and networks through unauthorized access to an account or
computer system.
Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data
theft by cyber criminals.
Hacking is the misuse of devices like computers, smartphones, tablets, and networks to cause damage to
or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity.
Ransomware
Ransomware is a type of malicious software that infects a computer and restricts users' access to
it until a ransom is paid to unlock it.
Eavesdropping
this video
What is phishing?
How scammers normally phish ?
What can be done from our end to be careful?
Identity theft-pg 512 new edition TB
It is a fraud that involves using someone else’s identity to steal money or gain other benefits.
Online identity theft refers to stealing someone’s personal information like name,login details ,etc and then posing as that
person online.
Imposter uses authentic looking email or website to trick recipients into giving out information.
Phishing
Scam
A scam is a deceptive scheme or trick used to cheat someone out of something, especially money.
A scam can be any fraudulent business or scheme that takes money or other goods from an unsuspecting
person.
● Protecting IP encourages individuals and businesses to create new software and software
applications as well as improve existing applications.
● IP rights ensure new ideas are widely distributed.
● Promotes investment in the national economy. (Make in India initiative)
● Intellectual property is a genuine asset of a business or an individual and plays a part in the
business's economy and long term viability(ability to work successfully).
Refer page 546 sumita arora book for difference
between copyright ,patent and trademark.
Do-Now
Read this case study and answer the questions :
Always remember:
As a content creator, you want your content to be used, but also for all the users to know that you have created it and not
someone else.
Content creators are people like social media influencers, bloggers, podcasters etc.
As a content user, you need to ensure that you cite the resource whenever you are using someone else’s work.
Copyright infringement-pg 548
Refers to using copyrighted work without the consent or permission of the copyright holder.
Examples:
● Selling pirated books
● Selling copied/duplicated artwork
● Selling pirated softwares
● Performing a play in public without obtaining permission from the playright
● Online piracy,etc
Plan
● Open source software and licensing (Creative Commons, GPL and Apache)
Do-Now: 2 min
Open this website: https://freemusicarchive.org/
Open source software can be freely used in terms of making modifications,constructing business models
around the software,etc but it does not have to be free of charge.
In the case of CC, the content attribution needs to be given to the creator, in the case of open source, the
software can be modified into a different version and distributed by the modifier without the intervention /
attribution to the original creator.
Apache license
Apache License grants a number of rights to the users.These can be applied to both copyrights and
patents.It offers the following:
Redistributing requires giving proper credits to the contributors of the code and same apache license
would remain with the software extension.
GNU General Public License(GPL)
Most commonly used for open-source projects.It guarantees wide range of rights to developers.It allows
the users to legally copy,distribute and modify the software.WordPress is also released under the GPL
license, which means that WordPress is an open source software that can be used, modified, and
extended by anyone.
1. Copy the software-As many times as needed,no limit to the no of copies made.
2. Distribute the software however you want-Can be distributed in copied form/ printed/web-link
form.
3. Charge a fee to distribute the software-After modification,charges can be asked,explaining why
you need to charge but the software should still be under GNU GPL.
4. Make modifications as you want-Modified projects must also be released under GNU GPL.
Apache vs GNU GPL
Apache license - You can do what you like with the software, as long as you include the required notices. This
permissive license contains a patent license from the contributors of the code.
GPL - https://www.wpbeginner.com/glossary/gpl/
● The Apache License 2.0 doesn’t impose any such terms. You’re not forced to release your modified
version. Besides, you can choose to release your modified version under a different license
(however, you’re required to retain the Apache License for the unmodified parts of the code).
Plan
● Cyber law and Forensics
● E-waste management: proper disposal of used electronic gadgets
● Identity theft, unique ids and biometrics
● Gender and disability issues while teaching and using computers
Are you aware of laws in India to help citizens against cyber crime?
IT ACT 2000-Important
This Act was notified on 17th October 2000 and has been amended in 2006 and then again in 2008.
This law deals with cyber crime and electronic commerce in India.
The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital
signatures. It also defines cyber crimes and prescribes penalties for them.
The Information Technology (Amendment) 2008 Act was passed by the Indian Parliament in December 2008, about a
month after the terrorist attacks in Mumbai. The amended Act provides the Indian government with the power of
surveillance, monitoring and blocking data traffic.
Information Technology Act, 2000, Indian Penal Code 1860, Information Technology Bill, Section 67, browsing child
pornography is also punishable offence
The Ministry of Electronics and Information Technology had issued an order dated in 2017 to Internet Service
Providers(ISPs) to adopt and implement Internet Watch Foundation(IWF) resources by July 2017 to prevent the distribution
and transmission of Online CSAM (Child Sexual Abuse Materials) into India.
Cyber Forensics
● It refers to the methods used for interpretation of computer media for digital evidence.
● It provides our legal system with a way to recover data from electronic or digital devices.
● The goal is to preserve any evidence in its most original form while performing a structured investigation by
collecting,identifying and validating the digital information for the purpose of reconstructing past events.
Disadvantages:
● Excessive dependency on technology for entertainment
● Inability to form real social groups as opposed to online social groups
● Addiction to online games
● Reduced employment.
● Loss of privacy, etc.
Plan
● E-waste management: proper disposal of used electronic gadgets
● Gender and disability issues while teaching and using computers
E-Waste management
Assignment 8-E-Waste Management and Processing Techniques
What is E-Waste?
● Electronic waste,E-scrap,Waste Electrical and Electronic Equipment are few names for E-Waste.
● It refers to discarded electrical or electronic devices.
● It includes used electronics which are destined for reuse,resale,recycle or disposal.
Care must be taken while disposing off the e-waste,data should be cleared carefully so that it cannot be
recovered.
Disposal process and benefits
Composition-Copper,Aluminium,Gold,Silver,Palladium,Platinum,Nickel,Tin,Lead,Iron,Sulphur,Phosphorus,Arsenic,etc.
Process:
1. Dismantling-Removal of parts.
2. Segregation of ferrous metal,non-ferrous metal and plastic.
3. Refurbishment and reuse.
4. Recycling/recovery of valuable materials.Ferrous material go to furnaces,non ferrous go to smelting plants,precious
metals in separating works.
5. Treatment/disposal of dangerous materials and waste
Benefits:
1. Allows recovery of precious metals
2. Protects health and water quality
3. Creates jobs
4. Saves landfill space
Think
EQ-What implications do traditional gender roles have in women participation in the field of technology?
encouragement in class
STEM-Science, Technology, Engineering and Mathematics is a broad term used to group together
these academic disciplines.
1. Locomotor-Polio,leprosy,cerebral palsy
2. Speech and hearing-Hearing impairment,speech problems
3. Cognitive-Dyslexia,Autism,etc
4. Vision impairments-low vision,blindness
Disability issues
In what ways can special needs individuals be encouraged in learning about technology?
Disability issues
Different shortcomings present for people with disabilities in using / learning about technology:
Possible solutions:
● Required teaching material should be made available like virtual keyboard software,need specific
joysticks,programming editor with virtual keyboard.
● Special needs teachers should be employed,budget should be allocated for teacher’s training.
● Schools must support inclusive curriculum.