course: introduction to computers lecture: 6. commercial software is covered by copyrights. you...
TRANSCRIPT
![Page 1: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/1.jpg)
Computer Ethics
Course: Introduction to Computers
Lecture: 6
![Page 2: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/2.jpg)
Software Copyright
Commercial software is covered by Copyrights.
You have to pay for it and register to have the license.
You should do the following: Copy the software only for back up. Don’t share the software with other people. Copying the software over the network should be
under the terms of license agreement. Software piracy is a crime.
![Page 3: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/3.jpg)
Licensing When you buy a software you purchase a license to
use it not for copyright.
There is a license agreement that written on the back of the carton or in the software installation start.
There are two type of license: A Single user license : can install the software into only
one computer. A multi-use license : can install the software into a
number of computers, the number that is specified by the license agreement.
![Page 4: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/4.jpg)
Software Commercial software: Any software you buy is a
commercial software. ”Has copy rights”.
Trail Software: Software where you can install it via the internet or CD’s for a period of time, after this period the software will stop working . ”Has copy rights”.
Free Software : Software that is distributed freely on the internet , there is no payment. ”Has copy rights”.
Public Software: It is public , free, without copy rights .
![Page 5: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/5.jpg)
Backups Copy your software, files and information. Use it when your original copies are damaged. Backups can be made by different methods:
Copy onto external HD, CD’s, DVD’s, … etc. Backups must be made on regular basis. Can use automatic back-up programs. Keep it in a secure and safe place. Keep different copies in different places. Label it. Disks should be write-protected.
![Page 6: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/6.jpg)
Information Security
Information Security: is a system of guarantees for protecting information technology against disasters, system failure, unauthorized access that can result in damage or loss.
Security not only involved physical security, but also the security of the data.
Do the following: Computer must be protected from damage (hardware,
software). Data must be backed up and protected from viruses. Password must be used. Use encryption and decryption cods. Use anti-viruses.
![Page 7: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/7.jpg)
Privacy Means maintaining data confidentiality and no
one is authorized to access them. You should follow these points to protect the
privacy of others: Use of data: for one or more people or for specified
purposes. Retention of data: shall not kept for longer than
necessary. Disclosing information: for anything than the purpose. Security. Rights for the person to access his information.
![Page 8: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/8.jpg)
Access Access for only who have a legitimate right to
access to them through the following: User Passwords User Authentication User Authorization
![Page 9: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/9.jpg)
Computer Crimes
Computer Crimes : Are the unlawful uses of any component of a computer system.
Computer crimes issues such as: fraud , espionage, fraud, vandalism and theft
issues.
![Page 10: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/10.jpg)
Theft The theft of a laptop computer will causes the
access to a confidential files, and loss of important contact details.
Never leave your laptops, PDAs in a public places.
![Page 11: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/11.jpg)
Viruses They are software programs, which are
written with the intention of causing inconvenience and disruption of series damages in a computer system.
Viruses Spread ways: Computer networks. Copying and distribution of illegal software
through the internet. Email attachments.
![Page 12: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/12.jpg)
12
Viruses cont. Types of viruses:
Worms. Time bombs. Boot-sector virus. File virus. Multipartite virus. Macro viruses. Trojan horse.
![Page 13: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/13.jpg)
Protecting from Viruses It is important to keep the Anti-virus software
up-to-date.(updated)Example on famous anti viruses: Avira, Norten , Avast..etc Do the following if don’t have the last update:
Do not use CD from unreliable source. Use only registered software. Never open an e-mail attachment unless it is from a
reliable source. Keep regular back-up.
![Page 14: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/14.jpg)
14
Symptoms of Virus Attack Computer runs slower then usual Screen sometimes flicker System crashes for no reason Files/directories sometimes disappear Display a message
![Page 15: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/15.jpg)
Personal Data With computing systems became personal data stored in
all areas (health - banks - telecommunications companies, electricity and water - Internet companies - government entities - insurance companies - social security, etc.)
Your personal data is no longer yours alone (the possibility of counterfeiting and Change)
There is legislation that protects personal data have been enacted in some countries.
Ex: you can check if your ID used in somewhere (work field)without you know by check this out:
http://mol.gov.sa/Services/Inquiry/SaudiEmpInquiry.aspx?m=4
![Page 16: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/16.jpg)
Computer Ethics
Set of rules that’s controls the use and the users of the computer and the result data.
The data processor or the data user must know that: It is personal data shall be processed, fairly and
lawfully. To use the data for the purpose that it was collected. To keep the information accurate and up to date. To keep the data safe and never disclose it to other. To retain the information only as long as required. To provide access to person whom the data refers to,
upon request.
![Page 17: Course: Introduction to Computers Lecture: 6. Commercial software is covered by Copyrights. You have to pay for it and register to have the license](https://reader036.vdocuments.us/reader036/viewer/2022072010/56649dda5503460f94acfa33/html5/thumbnails/17.jpg)
Computer Ethics
The following data types are excluded from the ethics above: Data for national security protection. Data of retirement salaries. Personal data for family purposes.