Merged Presentation Choladeck

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

DIGITAL SOCIETY

• A digital society is a society where digital technologies and the internet are integrated
into everyday life.
• Many sectors will produce more opportunities and works will be efficient
• Includes ICT
• Key Characteristics:
• Digital Infrastructure: Reliable and accessible internet connectivity, digital devices, and
digital literacy.
• Digital Economy: Economic activities facilitated by digital technologies, including e-
commerce, digital services, and online marketplaces.
• Digital Governance: Use of digital tools for public administration, e-government, and
citizen engagement.
• Digital Culture: The emergence of digital culture, including social media, online
communities, and digital content creation.
Advantages
• Connectivity increases
• Smarter machines so less error.
• Compact faster and versatile
• Remote working culture
Computer ethics
Computer ethics refers to the moral principles that govern the use of computers. It deals with the
ethical issues and constraints that arise from the use of computers, and how they can be
mitigated or prevented.
Key areas of computer ethics include:
•Privacy: Protecting personal data and ensuring individuals have control over their information.
•Intellectual Property: Respecting copyrights, patents, and trademarks related to digital content.
•Cybercrime: Preventing and combating cybercrime, such as hacking, identity theft, and data
breaches.
•Digital Divide: Promoting equal access to technology and bridging the gap between those who
have access and those who don't.
•Ethical Hacking: Using hacking techniques for ethical purposes, such as identifying
vulnerabilities in systems.
•Artificial Intelligence: Developing AI systems that are fair, unbiased, and transparent.
10 commandments of computer
ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid (without
permission).
7. Thou shalt not use other people's computer resources without authorization or proper
compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the system
you are designing.
10.Thou shalt always use a computer in ways that ensure consideration and respect for other
humans
CYBER ETHICS
• Rules that should be followed while using the internet
• Some does and donts as a student

DO’S DONT’S
1)Do use internet to research for school materials. 1)Don’t use internet to harm other’s privacy.

2)Do use internet to connect with family and friends. 2)Don’t use internet to copy materials.

3)Do use or open correct websites. 3)Don’t use pirated softwares or apps.

4)Do consult with your parents while using internet. 4)Don’t use intenet to communicate with strangers
INTERNET PROS
• Easy communication
• E-commerce
• E-governance
• Entertainment
• Globalisation
• Healthcare
• Financial services
INTERNET CONS
• Cyber security issue
• Privacy issue
• Misinformation
• Dependecy and addiction
• Health is affected
• Unsocial
Information
Security And
Cyber Law
Concept of Information
Security

Information security is all about


protecting your data from being stolen,
changed or destroyed.

It is basically the practice of preventing


data and information from unauthorized
users.

As we rely more on digital information,


having strong information security is
more important than
In 2020, a rapid growth in online activity
was witnessed. For example, with a huge
number of 197.6 million engaging on email.
It was same in all other social medias.

However, this surge in online activity also


led to problems, such as increased
cyberbullying, the spread of misinformation,
and a rise in online scams and fraud.

Additionally, the heightened screen time


contributed to mental health issues for
many individuals, highlighting the darker
side of our digital lives.
Basic Information
Security Concept

1.Confidentiality

2.Integrity

3.Availability
Confidentiality
Confidentiality means keeping
information private and making sure
that only people who are supposed
to see can access it. It's about
protecting sensitive data from being
seen or used by unauthorized
people.

Some measures to keep your information


confidential are:

 Encryption
 Password
 Two-factor authentication
 Bio-metric
Integrity

Integrity in information security refers to


the protection of information from being
altered or tampered with by
unauthorized parties. It ensures that
data remains accurate, consistent, and
trustworthy throughout its lifecycle.

Some security controls designed to maintain


the integrity of information include:

 User excess control


 Version control
 Back up and recovery procedure
 Error detection software
Availability
Availability in information
security means ensuring that
information and resources are
accessible to authorized users
whenever they need it. It
focuses on keeping systems
running and data accessible
without interruptions, so users
can rely on them for their tasks.
Information security measures for threats to data
availability include:

 Off site backups


 Disaster recovery
 Redundancy
 Failover
 Proper monitoring
 Environmental control
 Server clustering
Concept of cyber crime
Cyber crime is the criminal activities carried out by means of computers or the internet.
Cybercrime especially occurs through the internet which has grown in importance as the
computer has become central, entertainment, social network and government. The
computer crime has different meanings depending on the situation, the person, and their
individual frame of reference. Criminals committing cybercrime use a number of methods,
depending on their skill-set and their goal.
Common forms of cybercrime include
• Phishing is using fake email messages to get personal information from internet
users;
• Cyberbullying is the use of information technology to harm or harass other
people in a deliberate, repeated, and aggressive manner by the use of internet
service misusing personal information.
• Hacking is shutting down or misusing websites or computer networks.
• Spreading hate and inciting terrorism.
• Distributing child pornography
• Grooming refers to making sexual advances to minors.
• Cyberstalking is the use of the internet or other electronic means to follow or
harass an indivisual, a group, or an organization.

You might also like