SlideShare uma empresa Scribd logo
1 de 27
Ethics 
• Derived from the Greek word “ethos”, which 
means “custom”, “habit”, and “way of living” 
• Definition: "the discipline and practice of 
applying value to human behavior, 
resulting in meaningful conduct.“
Cont………. 
• Professional Ethics: concerns one's conduct of 
behavior and practice when carrying out professional 
work, e.g., consulting, researching, teaching and 
writing. 
• A computing professional must understand 
– Cultural, social, legal, and ethical issues in computing. 
– Responsibility and possible consequences of failure.
Computer Ethics 
• Computer ethics defined as the application of classical 
ethical principles to the use of computer technology. 
• Ethical problems related to computers: 
– Privacy 
• Computers create a false sense of security 
• People do not realize how vulnerable information 
stored on computers are 
– Property 
• Physical property 
• Intellectual property (in both copyright and patent) 
• Data as property
• Access 
– Access to computing technology 
– Access to data 
• Accuracy 
– Accuracy of information stored 
• Hacking, cracking and virus creation 
• Software piracy
Ethical 
dilemmas 
in IT 
Ethical 
dilemmas 
in IT 
PPrrivivaaccyy 
Degree of privacy and 
dissemination of 
information about 
individual. 
AAcccceessssibibiliiltityy 
AAccccuurraaccyy 
PPrrooppeerrttyy 
Involves right of 
accessing the required 
info. As well as true 
payment of charges to 
access the information 
The information which 
is viable and being 
accessed is now much 
more accurate 
&authenticate. 
Talks about 
ownership & 
value of 
information.
The Ten Commandments of computer ethics 
have been defined by the Computer Ethics 
Institute. 
• 1) One should not use a computer to harm 
other people. 
• 2) One should not interfere with other 
people's computer work. 
• 3) One should not snoop around in other 
people's files. 
• 4) One should not use a computer to steal. 
• 5) One should not use a computer to bear 
false witness.
• 6) One should not use or copy software for 
which you have not paid. 
• 7) One should not use other people's 
computer resources without authorization. 
• 8) One should not distribute other people's 
intellectual output; without permit. 
• 9) One should think about the social 
consequences of the program you write. 
• 10) One should use a computer in ways that 
show consideration and respect.
Some threats to information system are:- 
• Computer Abuses:- hacking Id & sending mail 
through hacked id. 
• Computer crime:-Hacking &theft 
• Theft of equipment 
• Theft of data 
• Equipment malfunctions:- virus in excel sheet 
• Environmental hazards 
• Destruction from viruses 
• Errors in handling & usage of data.
Computer Virus
What is Computer Virus? 
• Computer viruses are small software programs that 
are designed to spread from one computer to another 
and to interfere with computer operation.
Spreading of Virus 
• Virus are most easily spread, 
• Spread through E-mail Attachments, 
– Instant Messaging messages, 
– Funny Images, 
– Audio and Videos files, 
– Downloading files from Internet, 
– Greeting cards and many more.
Steps to help avoid Viruses 
• Use an Internet firewall, 
• Subscribe to 
industry standard antivirus software, 
• Never open an e-mail attachment from 
someone you don't know, 
• Scan each and every attachment, 
• Rules to be followed, while surfing net
Software piracy and Hacking
What is PIRACY??????? 
Reselling Media 
 Downloading from a website 
 Taping songs 
Buying a used book or CD 
Watching broadcast television but skipping 
commercials
Types of PIRACY 
End User Piracy 
Client – Server Piracy 
Internet Piracy 
Hard-Disk Piracy 
Software Counterfeiting
End-User Piracy 
• This occurs when a company employee 
reproduces copies of software without 
authorization 
 Copying disk for installation and 
distribution 
Swapping disks in or outside the 
workplace
Client-Server Piracy 
• This type of piracy occurs when too many 
employees on a network are using a central 
copy of a program at the same time. 
 System Overuse
Internet Piracy 
• This occurs when software is downloaded 
from the Internet The same purchasing 
rules should apply to online software 
purchase as for those bought in traditional 
ways. 
Pirate website 
Unauthorized transfer of 
copyrighted program
Hard-Disk Loading 
• This occurs when a business who sells new 
computers loads illegal copies of software 
onto the hard disks to make the purchase of 
the machines more attractive. 
Value Added Resellers (VAR)
Software Counterfeiting 
• This type of piracy is the illegal 
duplication and sale of copyrighted 
material with the intent of directly 
imitating the copyrighted product .
HACKER 
• Some one who bypasses the system’s access 
controls by taking advantage of security 
weaknesses left in the system by 
developers .
What HACKER do??????? 
• SYSTEM 
Access confidential information 
Threaten someone from YOUR computer 
Broadcast your confidential letters or materials . 
Store illegal material
Evils of Hacking 
• Compromise the security of system without permission 
from an authorized party, usually with the intent of 
accessing computers connected to the network.
Advantage of Ethical Hacking 
• To determine problem and weakness for program 
• Creation of firewall 
• Useful for military purpose 
• Better computer security
BY-TUSHAR 
SINGH 
JATIN UPPAL 
BEVAN GIDEON 
NIKHIL SHARMA

Mais conteúdo relacionado

Mais procurados

9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Cybercrime
CybercrimeCybercrime
CybercrimeAvinash
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 

Mais procurados (20)

9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 

Semelhante a Ethics in IT and System Usage

Semelhante a Ethics in IT and System Usage (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 

Último

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Ethics in IT and System Usage

  • 1.
  • 2. Ethics • Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” • Definition: "the discipline and practice of applying value to human behavior, resulting in meaningful conduct.“
  • 3. Cont………. • Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing. • A computing professional must understand – Cultural, social, legal, and ethical issues in computing. – Responsibility and possible consequences of failure.
  • 4. Computer Ethics • Computer ethics defined as the application of classical ethical principles to the use of computer technology. • Ethical problems related to computers: – Privacy • Computers create a false sense of security • People do not realize how vulnerable information stored on computers are – Property • Physical property • Intellectual property (in both copyright and patent) • Data as property
  • 5. • Access – Access to computing technology – Access to data • Accuracy – Accuracy of information stored • Hacking, cracking and virus creation • Software piracy
  • 6. Ethical dilemmas in IT Ethical dilemmas in IT PPrrivivaaccyy Degree of privacy and dissemination of information about individual. AAcccceessssibibiliiltityy AAccccuurraaccyy PPrrooppeerrttyy Involves right of accessing the required info. As well as true payment of charges to access the information The information which is viable and being accessed is now much more accurate &authenticate. Talks about ownership & value of information.
  • 7. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. • 1) One should not use a computer to harm other people. • 2) One should not interfere with other people's computer work. • 3) One should not snoop around in other people's files. • 4) One should not use a computer to steal. • 5) One should not use a computer to bear false witness.
  • 8. • 6) One should not use or copy software for which you have not paid. • 7) One should not use other people's computer resources without authorization. • 8) One should not distribute other people's intellectual output; without permit. • 9) One should think about the social consequences of the program you write. • 10) One should use a computer in ways that show consideration and respect.
  • 9. Some threats to information system are:- • Computer Abuses:- hacking Id & sending mail through hacked id. • Computer crime:-Hacking &theft • Theft of equipment • Theft of data • Equipment malfunctions:- virus in excel sheet • Environmental hazards • Destruction from viruses • Errors in handling & usage of data.
  • 11. What is Computer Virus? • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 12. Spreading of Virus • Virus are most easily spread, • Spread through E-mail Attachments, – Instant Messaging messages, – Funny Images, – Audio and Videos files, – Downloading files from Internet, – Greeting cards and many more.
  • 13. Steps to help avoid Viruses • Use an Internet firewall, • Subscribe to industry standard antivirus software, • Never open an e-mail attachment from someone you don't know, • Scan each and every attachment, • Rules to be followed, while surfing net
  • 15. What is PIRACY??????? Reselling Media  Downloading from a website  Taping songs Buying a used book or CD Watching broadcast television but skipping commercials
  • 16. Types of PIRACY End User Piracy Client – Server Piracy Internet Piracy Hard-Disk Piracy Software Counterfeiting
  • 17. End-User Piracy • This occurs when a company employee reproduces copies of software without authorization  Copying disk for installation and distribution Swapping disks in or outside the workplace
  • 18. Client-Server Piracy • This type of piracy occurs when too many employees on a network are using a central copy of a program at the same time.  System Overuse
  • 19. Internet Piracy • This occurs when software is downloaded from the Internet The same purchasing rules should apply to online software purchase as for those bought in traditional ways. Pirate website Unauthorized transfer of copyrighted program
  • 20. Hard-Disk Loading • This occurs when a business who sells new computers loads illegal copies of software onto the hard disks to make the purchase of the machines more attractive. Value Added Resellers (VAR)
  • 21. Software Counterfeiting • This type of piracy is the illegal duplication and sale of copyrighted material with the intent of directly imitating the copyrighted product .
  • 22. HACKER • Some one who bypasses the system’s access controls by taking advantage of security weaknesses left in the system by developers .
  • 23. What HACKER do??????? • SYSTEM Access confidential information Threaten someone from YOUR computer Broadcast your confidential letters or materials . Store illegal material
  • 24. Evils of Hacking • Compromise the security of system without permission from an authorized party, usually with the intent of accessing computers connected to the network.
  • 25. Advantage of Ethical Hacking • To determine problem and weakness for program • Creation of firewall • Useful for military purpose • Better computer security
  • 26.
  • 27. BY-TUSHAR SINGH JATIN UPPAL BEVAN GIDEON NIKHIL SHARMA

Notas do Editor

  1. The secut