Page 27 - gyamfi series vol. 2
P. 27

INFORMATION AND COMUNICATION TECHNOLOGY                                                                GYAMFI SERIES
        and he discussed this new field with its related ethical concerns in his 1948 book, Cybernetics. In 1950,
        Wiener's second book, The Human Use of Human Beings, delved deeper into the ethical issues
        surrounding information technology and laid out the basic foundations of computer ethics.


        Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore,
        computer ethics is set of moral principles that regulate the use of computers. Some common issues of
        computer ethics include intellectual property rights (such as copyrighted electronic content), privacy
        concerns, and how computers affect society.


        For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics
        would suggest that it is wrong to do so without the author's approval. And while it may be possible to
        access someone's personal information on a computer system, computer ethics would advise that such
        an action is unethical.

        COMPUTER VIRUS
        Computer virus is a program which prevents or disrupts the normal operation of computer.
        Computer virus can also be defined as illegal program that migrate through the networks and operating
        system which may destroy programs or data on a computer.    OR
        A computer virus is a malicious program that self-replicates by copying itself to another program. In
        other words, the computer virus spreads by itself into other executable code or documents. The purpose
        of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive
        data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.
               One of the ideal methods by which viruses spread is through emails – opening the
        attachment in the email, visiting an infected website, clicking on an executable file, or viewing
        an infected advertisement can cause the virus to spread to your system. Besides that, infections
        also spread while connecting with already infected removable storage devices, such as USB
        drives.
               It is quite easy and simple for the viruses to sneak into a computer by dodging the
        defense systems. A successful breach can cause serious issues for the user such as infecting
        other resources or system software, modifying or deleting key functions or applications and
        copy/delete or encrypt data.

        HOW DOES A COMPUTER VIRUS OPERATE?

        A COMPUTER VIRUS OPERATES IN TWO WAYS. THE FIRST KIND, AS SOON
        AS IT LANDS ON A NEW COMPUTER, BEGINS TO REPLICATE. THE SECOND
        TYPE PLAYS DEAD UNTIL THE TRIGGER KICK STARTS THE MALICIOUS

        CODE. IN OTHER WORDS, THE INFECTED PROGRAM NEEDS TO RUN TO BE
        EXECUTED. THEREFORE, IT IS HIGHLY SIGNIFICANT TO STAY SHIELDED

        BY INSTALLING A ROBUST ANTIVIRUS PROGRAM.
        EXAMPLE OF COMPUTER VIRUS
        1. JERUSALEM ISRAELI
        2. STONE
        3. WORM
        4. I LOVE YOU/LOVE LETTER VIRUS
        5. BOUNCING BALL
        6. COMPUTER OGRE
                                                                                                        Page 27 of 90
        ALL SAINTS SCHOOL. Santasi-Apire                                            HANDOUT
   22   23   24   25   26   27   28   29   30   31   32