Page 27 - gyamfi series vol. 2
P. 27
INFORMATION AND COMUNICATION TECHNOLOGY GYAMFI SERIES
and he discussed this new field with its related ethical concerns in his 1948 book, Cybernetics. In 1950,
Wiener's second book, The Human Use of Human Beings, delved deeper into the ethical issues
surrounding information technology and laid out the basic foundations of computer ethics.
Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore,
computer ethics is set of moral principles that regulate the use of computers. Some common issues of
computer ethics include intellectual property rights (such as copyrighted electronic content), privacy
concerns, and how computers affect society.
For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics
would suggest that it is wrong to do so without the author's approval. And while it may be possible to
access someone's personal information on a computer system, computer ethics would advise that such
an action is unethical.
COMPUTER VIRUS
Computer virus is a program which prevents or disrupts the normal operation of computer.
Computer virus can also be defined as illegal program that migrate through the networks and operating
system which may destroy programs or data on a computer. OR
A computer virus is a malicious program that self-replicates by copying itself to another program. In
other words, the computer virus spreads by itself into other executable code or documents. The purpose
of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive
data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.
One of the ideal methods by which viruses spread is through emails – opening the
attachment in the email, visiting an infected website, clicking on an executable file, or viewing
an infected advertisement can cause the virus to spread to your system. Besides that, infections
also spread while connecting with already infected removable storage devices, such as USB
drives.
It is quite easy and simple for the viruses to sneak into a computer by dodging the
defense systems. A successful breach can cause serious issues for the user such as infecting
other resources or system software, modifying or deleting key functions or applications and
copy/delete or encrypt data.
HOW DOES A COMPUTER VIRUS OPERATE?
A COMPUTER VIRUS OPERATES IN TWO WAYS. THE FIRST KIND, AS SOON
AS IT LANDS ON A NEW COMPUTER, BEGINS TO REPLICATE. THE SECOND
TYPE PLAYS DEAD UNTIL THE TRIGGER KICK STARTS THE MALICIOUS
CODE. IN OTHER WORDS, THE INFECTED PROGRAM NEEDS TO RUN TO BE
EXECUTED. THEREFORE, IT IS HIGHLY SIGNIFICANT TO STAY SHIELDED
BY INSTALLING A ROBUST ANTIVIRUS PROGRAM.
EXAMPLE OF COMPUTER VIRUS
1. JERUSALEM ISRAELI
2. STONE
3. WORM
4. I LOVE YOU/LOVE LETTER VIRUS
5. BOUNCING BALL
6. COMPUTER OGRE
Page 27 of 90
ALL SAINTS SCHOOL. Santasi-Apire HANDOUT