8.1 Digital Society and Computer ethics

Digital Society: Digital Society is an interdisciplinary research area and a kind of progressive society that has been formed as a result of adaptation as well as integration of advanced technologies into the society and culture. Digital Society deals with the highly advanced telecommunications and wireless connectivity systems and solutions. The latest Digital Society includes Internet of Things (IoT), 5G, Cloud Computing, Big Data, Human Computer Interaction and so on. Some of the benefits of Digital Society are: a. Social connectivity b. Communication Speed c. versatile working d. Learning Opportunities e. Entertainment. ICT (Information Communication Technology) Information System is, which is used to communicate through any medium or by using technology, is called information communication technology. Information Communication Technology (ICT) literally used to clarify its meaning, which refers to the merging of telephone networks with computer networks. Information Technology (IT) is the study, design, development, implementation, support or management of information systems. Social Impact of the ICT POSITIVE Impact of ICT:  Create opportunity for technical employment:  E-Commerce  Fast and Cheap Communication  Education  Health Care  Multimedia Presentation NEGATIVE Impact of ICT:  Number of Employment Opportunity will Reduced  Health Problem  Money Theft  Digital Divide  Possibility of Leakage, hacked and Disclosure of Personal Information  Pornography Digital Divide: Digital Divide refers to the gap between individuals, households, business and geographic areas at different socio- economic levels with regard with the opportunity to access Information and Communication Technology (ICT) in the Internet using computers and many other mobile computing devices such as tablet PC, PDA, mobile etc.

Computer Ethics: The word 'ethics' means 'moral' beliefs and rules about right and wrong. Thus, computer ethics also refers to the responsible use of computers and computer networks. It is a branch of practical. Ethics deals with placing a value on acts according to whether they are good or bad. Commandments:

  1. Do not use a computer to harm other people
  2. Do not interfere with other people's computer work
  3. Do not snoop or view around in other people's files
  4. Do not use a computer to steal
  5. Do not use or copy software for which you have not paid
  6. Do not use other people's computer resources without authorization
  7. Think about the social consequences of the program you write Use a computer in ways that show consideration and respect Objectives of Computer Ethics
  8. To ensure the privacy and safety of computer users.
  9. To help people use the computer in the right ways.
  10. To guarantee that works done by someone did not declare by other people.

8.2 Concept of Information Security

Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information is anything that holds value for its receiver. Information Security programs are built around 3 objectives, commonly known as CIA (Confidentiality, Integrity, Availability). Confidentiality: Confidentiality refers to protecting information from disclosure. Information should not be revealed to unauthorized users. Integrity: Integrity refers to ensuring that the data or information is not corrupted or modified by unauthorized users. Availability: Availability of data or information means that the data or information is available for use whenever required. This essentially means placing security system in order to prevent the destruction or theft of information.  Network Security: Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure.  Security Threat: Security threat is a possible danger that might exploit vulnerabilities in a computer system to breach security and thus cause possible harms. Vulnerability is a weakness of flaw in a computer system that can be exploited by a threat. Types of security threats 1.Interception: It refers to the situation that an unauthorized party has gained access to a service or data. 2.Interruption: It refers to the situation in which services or data become unavailable, unusable, destroyed, and so on. 3.Modification: It involve unauthorized changing of data or tampering with a service so that it no longer adheres to its original specifications.

4.Fabrication: It refers to the situation in which additional data or activities are generated that would normally not exist.  Security Threat: An attack is an attempt to destroy, expose, alter, disable, steal, or gain unauthorized access to or make unauthorized use of an asset. i. Passive attack: An attack that attempts to learn or make use of information from the system but does not affect system resources. ii. Active attack: An attack that attempts to alter system resources or affect their operation.  Security Services: Security services is a services provided by a layer of communicating open systems, Which ensures adequate security of the systems or of data transfers. Types of Security Services. i. Authentication: ii. Authorization: iii. Data confidentiality: iv. Data integrity: v. Non- repudiation:  Cryptography: Cryptography is the science of providing security for information. Cryptography means secret writing and is the art and science of information hiding. Cryptography was mostly referred to as encryption and decryption. Encryption is the mechanism to convert the readable plaintext into unreadable text by using some algorithm and key. Decryption is the opposite or reverse process of encryption. It converts cipher text back to the plaintext by using some algorithm or key. Alternatively the term encode and decode or encipher and decipher are used instead of encrypting and decrypting.

8.3 Cyber-Crime:

Cyber-crime refers to the use of computer technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present in the computer. There are many types of cyber-crimes committed. Some of them are discussed below: Types of cyber-crime

  1. Cyber stalking: Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization.
  2. Cyber terrorism: Cyber terrorism is a terrorist activity intended to damage or disrupt vital computer systems. Cyber theft Cyber theft is the act of using an internet to steal someone’s property or to interfere with someone’s use and enjoyment of property.
  3. Hacking: Hacking is the process of exploiting vulnerabilities to gain unauthorized access to systems or resources.
  4. Phishing: Phishing is a fraudulent attempt, usually made through email, to steal your personal information.