Professional Documents
Culture Documents
Chapter 11 - Security and Ethics
Chapter 11 - Security and Ethics
STID1103
Chapter 11
Security and Ethics
Learning Objectives
After completing this chapter you will be able to:-
• A responsible professional
– Acts with integrity
– Increases personal competence
– Sets high standards of personal performance
– Accepts responsibility for his/her work
– Advances the health, privacy, and general
welfare of the public
• Responsible professional should demonstrate
ethical conduct, avoid computer crime and
increase security of any information system
he/she develops.
Computer Crime/Cyber Crime
• Computer crime is the commission of illegal acts by using a
computer or against a computer system. Simply accessing a
computer system without authorization or with intent to do harm,
even by accident, is now a federal crime.
• Computer crime defined by Association of Information
Technology Professionals (AITP) includes
– The unauthorized use, access, modification, or destruction of
hardware, software, data, or network resources
– The unauthorized release of information.
– The unauthorized copying of software.
– Denying an end user access to his/her own hardware, software,
data, or network resources.
– Using or conspiring to use computer or network resources
illegally to obtain information or tangible property.
• The most frequent types of incidents comprise a greatest hits list of
cybercrime: Hacking, Cyber-Theft, Cyberterrorism, Unauthorized
Use at Work, Software Piracy, Theft of Intellectual Property,
Computer Viruses and Worms and Adware and Spyware.
Hacking
• Hacking is the obsessive use of computers or the
unauthorized access and use of networked computer
systems.
• Hacker is a person who hacks the computer system
• Hackers can hack into a computer system and reading
files, but neither stealing nor damaging anything or
monitor e-mail, access web server, transfer file or steal
network files, extract passwords, plant data that will
cause a system to welcome intruders.
• A cracker is a malicious or criminal hacker who
maintains knowledge of the vulnerabilities found and
exploit for private advantage, not revealing them to the
general public.
Cyber-Theft