 Hello everyone, my name is Mr. Sandesh Pareh. I am currently working as an assistant professor in the department of computer science and engineering at Valchan Institute of Technology, Solapur. In this session, we are going to focus on mainly three things. The first one is information system ethics and computer crime and the security. These three terms play a very important role in the nowadays. Because all your digital India and all the transactions made by the people, they need the security. The digital crime is going to increase in the upcoming days. So for that understanding of these things is very important. So what are the outcomes of this? After the session, you will be able to understand how the computer system ethics affects the information system. You will be able to understand the privacy, accuracy, property, accessibility, which are the different types of computer crimes and the different types of the attacks that is virus, worm, trojanos, logic and term worm. After that you will be able to understand how to provide the security for this world. So we will start learning one by one. First we will focus on the ethics. There is a standard rule. We said that toflas three waves of change. Agriculture, industrial and information age. In every five years it will get doubled. This is the rule of the toflas three waves of change. So as we know the data which is available in the digital format is going to double in every five years. The term computer literacy means that people are actually knowing how to handle the computer and digitally divide the gap between the people who are computer literate and computer non-literate. So computer ethics is the standard of the conduction as they pertain to the use of the information system. Privacy means protecting someone's personal information from all the others. So actually the system needs the personal information but they have to provide the assurity that it will be kept private. And in the case of the identity theft what happens is that the stealing of another's social security number or the credit card number or the personal information is get theft. So this is the identity theft. And ethics is that information accuracy and deals with the authentication and fidelity of information. And information property means it deals with the owns of the information about the individual and how information can be sold or exchanged. So the legal author, otherwise legal owner only have the access and privilege to handle with this. So this is the ethics. This is called accessibility. That means it deals with how the information person the right to obtain about others and how the information can be used. And which are the issues in the information acceptory as the carnivore, ECPA and monitoring emails like the need for a code of ethical conduct. Information system ethics contains the need for a code of ethical conduct, business ethics, plagiarism, cyber scouting. These are the various tools and two using in one of them. Okay, we can find out the particular data is the original content or the they are theft or the modified from getting it by the another source likewise. Okay, so this is need for code of ethical conduct. Next we are going to focus on the computer crime. Okay, so definition of this computer crime is that it is the act of using the computer to commit an illegal act. Okay, so it is authorized and unauthorized computer access means the proper owner should only gain the access to particular things. And if it is not done like that, then it may be get illegal act. Okay, and whatever the action committed like that is called as a crime. Just few examples are the stealing time on company computers, breaking into the government websites and stealing someone's credit card information. These are all the types of the computer crime. Okay, so federal and state laws are the things are gaining unauthorized access, stealing the data, violating data belongs to the bank. Okay, intercepting communication. It means they are listening to the some another ones communication. Okay, threatening or damage computer system. These are the types of the computer hacking and cracking. Okay, so these are the important bits in the computer crime. Okay, so first is a hacker. Hacker means one who gains unauthorized. Computer access but without doing the damage. Okay, and next one is the cracker one who breaks into computer system for the purpose of doing the damage. Okay, so this is the major difference between the hacker and cracker. Okay, once hacker is not deal with the damage. Okay, he is to use only the access but cracker is the intention of doing the damage. Okay, and for that he breaks the computer system. Okay, so this is the major difference between them. Again, some computer crimes are the data diddling. Okay, and a freaking cloning, cloning, spiky banking, social engineering. So these are the various types of the computer crimes. They are committed in the world, all over the world. Okay, so these are the illegal tasks. And yes, the major role is the computer viruses and destructive code. Virus, as we are termed into the biological word virus, these in computer systems also it is the virus it spreads widely. Okay, and it is nothing but one small destructive program, which is programmed and that disrupts the normal functioning of a computer system. And it gets spread all over the networks. Okay, and it gets spread very rapidly and the program is containing the code for that one. Okay, and this whatever the system containing this one is get collapse. Okay, and functioning like that is written into the program of the virus. Okay, and some of the type are the warm, okay, the Trojan horses and logic or time bomb. Okay, so the role of different viruses, okay, different types of viruses are different. Okay, some may be more harmful, some are not that much, but they are playing their role, whereas different. Okay, so one question for you is that which are more secure multiword password and password mode using the combination of latest numbers and symbols. So complex long passwords are better, but they are only useful in certain condition, but we complex password are enough to keep you protected as you need to manage passwords safely using the password manager. Okay, turn on two step authentication. It is important and make sure that sensitive websites that you visit encrypted connection and keep your browser and software updated. Okay, so you have to deal with them. Next one is the computer security, the third term and we have various safeguards. Okay, what you have to do is that you have to be ready with the security plan. Okay, and break into okay backup restoring only allow access to the key employees. Okay, change passwords frequently. Okay, use antivirus software and use biometrics to access to the computer resources and hire trustworthy employees. These are the some terms you have to take care about to implement the security. Okay, and the encryption is the technical word here the process of encoding the messages. Okay, before they enter into the network and it get decoded at the receiving end so that no one can steal the data. And yes, how encryption works that keys are there in playing important role. Symmetric key means both sides are using the same key public key and private key means they are different and it can transfer between them. Okay, and third one is the certificate authority is there. Okay, it means on the particular websites. Okay, the third party trusted middleman various verifies the website. Okay, as the trusted one and only the then SSL by the Netscape popular and public key encryption method. So you can use the firewall. Okay, it deal with the internet and it is this combination of the hardware and software which is kept which kept unauthorized users apart from network system. Okay, so virus prevention for that what you have to do is that again make backups, install antiviruses and all that did it unnecessary emails and all. You have to take care about these terms. Okay, and yes, avoid cookies, visit sites as anonymous user. Okay, so you have to take care about your privacy so that you cannot be gassed. Okay, so getting cons at various places like traveling, vacation spending, okay, we're coming and internet access and options investment healthcare products. Here are the various terms during which using which you maybe get trapped. Okay, so you have to take care about in these situations. So these are some references I used to make this video. Thank you. Thank you.