Ethical Issues Related to Security | Confidentiality & Privacy | Piracy | 9th Computer Chapter 4 P-1

preview_player
Показать описание
Social Media Links:
______/❤ All Students are requested to Follow Me on Social Media!! ❤\________

9th Class Computer Science:
9th Computer Science Chapter 1:
9th Computer Science Chapter 2:
9th Computer Science Chapter 3:
9th Computer Science Chapter 4:
9th Computer Science Chapter 5:
9th Computer Science All Exercise:
9th Computer Science All Activates:
9th Computer Science Complete Lectures:

10th Class Computer Science:
How to install and Download Code::Blocks:
10th Computer Science All Lectures Playlist:
10th Computer Science All Exercise Playlist:
10th Computer Science All Example Code Playlist:
10th Computer Science All Programming Time:
10th Computer Science All Activities Playlist:
10th Computer Science All Programming Exercise Playlist:

Introduction
Computers are ubiquitous and are widely used by people of almost all ages. Often we need to give our personal information to a computer e.g. while creating an email account, shopping online, visiting a hospital or taking admission in a school. We expect that provided information will not be shared with others. Protecting data from malicious users is called data privacy or information privacy.

4.1 Ethical Issues Related to Security
4.1.1 Understanding Ethical Issues Related to Data Security
The foundation of all security systems is formed on ethical principles. If have data of others, it is our own ethical responsibility to keep it secure. Some of the data security issues are:
• Confidentiality & Privacy
• Fraud & Misuse
• Patent
• Copyright
• Trade secrets
• Sabotage

Confidentiality & Privacy
To keep the data of others as confidential is indeed taking care of others. For example, if a bank shares the information about my banking transactions with my business competitors then it can harm my business. Similarly, phone companies are supposed to keep the invoices and bills as confidential. Keeping privacy and confidentiality has become difficult in this era of computers and Internet. Due to more usage of computers, a wide range of data is collected and stored. This data may be related to credit cards, organizational fund raising campaigns, opinion polls, shop at home services, driving licenses, arrest
Confidentiality & Privacy
To keep the data of others as confidential is indeed taking care of others. For example, if a bank shares the information about my banking transactions with my business competitors then it can harm my business. Similarly, phone companies are supposed to keep the invoices and bills as confidential. Keeping privacy and confidentiality has become difficult in this era of computers and Internet. Due to more usage of computers, a wide range of data is collected and stored. This data may be related to credit cards, organizational fund raising campaigns, opinion polls, shop at home services, driving licenses, arrest

Software piracy is the illegal copying, distribution, or usage of software.

Do you know?
Open source software have no copyrights reservation. So, we can copy source code, modify it and can even sell it.

Types of software piracy include:
• Soft lifting: Borrowing and installing a copy of a software application from a colleague.
• Client-server overuse: Installing more copies of the software than you have licenses for.
• Hard-disk loading: Installing and selling unauthorized copies of software on refurbished or new computers.
• Counterfeiting: Duplicating and selling software having copyright.
• Online piracy: Typically involves downloading illegal software. The software industry is prepared to battle against software piracy. The courts are dealing with an increasing number of lawsuits concerning the protection of software.

#DigitalEducation,
#DigitalEducationLatestNews,
#DigitalEducationShahbazAli,
#EthicalIssuesRelatedToDataSecurity,
#DataPrivacy,
#InformationPiracy,
#UnderstandingEthicalIssuesRelatedToDataSecurity,
#DataAndPrivacy,
#ConfidentialityAndPrivacy,
#Piracy,
#OpenSourceSoftware,
#Key,
#Crack,
#TypesOfSoftwarePiracy,
#SoftLifting,
#ClientServerOveruse,
#HardDiskLoading,
#Counterfeiting,
#OnlinePiracy,
#9thComputerChapter4
#9ClassComputerChapter4
#Class9ComputerChapter4
#ComputerClass9SolvedUnit4,
#Unit4SolvedComputer9Class,
#9ComputerNewCourse,
#9ClassComputerInUrdu,
#DigitalEducation,
#DigitalEducationShahbazAli,
Рекомендации по теме
Комментарии
Автор

Ma Sha Allah, well explained
May Allah Pak increased your knowledge Ameen

ashi