Unit III: Society, Law, and Ethics
- Social Media Posts: Updates, photos, and comments on platforms like Facebook, Instagram, and Twitter.
- Emails: Sent and received emails.
- Online Forms: Information filled out on online forms, surveys, or registrations.
- Blog Posts and Comments: Content published on blogs or comments left on various websites.
- Online Purchases: Information about items bought online, including reviews and feedback.
- Browsing History: Records of websites visited, even if not actively interacting with them.
- IP Addresses: Data associated with the IP addresses that identify devices on the internet.
- Cookies: Small files stored on devices by websites to track user behavior and preferences.
- Location Data: Information on where a device has been, often collected through apps and services.
- Privacy Concerns: Digital footprints can reveal personal information, leading to privacy breaches if not managed properly.
- Security Risks: Hackers can exploit digital footprints to gain unauthorized access to personal and financial data.
- Personal Branding: Online presence, including professional networks and personal posts, contributes to one's personal brand.
- Data Analytics: Businesses use digital footprints to analyse consumer behaviour and preferences for targeted marketing.
- Privacy Settings: Regularly update privacy settings on social media and other platforms to control what information is shared publicly.
- Clear Browsing Data: Frequently clear cookies and browsing history to minimize passive footprints.
- Use Strong Passwords: Implement strong, unique passwords for different accounts to protect against unauthorized access.
- Be Mindful of Sharing: Think twice before posting personal information online and avoid oversharing.
- Use Encryption: Use encrypted communication methods for sensitive information to enhance security.
- Definition: Protects original works of authorship such as literature, music, and art.
- Duration: Generally lasts for the lifetime of the author plus 70 years.
- Rights Granted: Exclusive rights to reproduce, distribute, perform, display, or license the work.
- Definition: Protects new inventions or discoveries.
- Duration: Typically lasts for 20 years from the filing date.
- Rights Granted: Exclusive rights to make, use, sell, and import the invention.
- Definition: Protects symbols, names, and slogans used to identify goods or services.
- Duration: Can last indefinitely, as long as the trademark is in use and properly renewed.
- Rights Granted: Exclusive rights to use the mark in commerce and to prevent others from using similar marks that could cause confusion.
- Definition: The act of using someone else's work or ideas without proper attribution.
- Implications: Academic and professional consequences, legal penalties, and reputational damage.
- Definition: Unauthorized use of copyrighted material.
- Examples: Copying and distributing music, movies, books, or software without permission.
- Penalties: Legal action, fines, and potential imprisonment.
- Definition: Unauthorized use of a trademark that causes confusion about the origin of goods or services.
- Examples: Using a similar logo or brand name to mislead consumers.
- Penalties: Legal action, financial damages, and injunctions against further use.
- Purpose: Provides a variety of licenses that creators can use to specify permissions for their works.
- Types: Ranges from the most permissive (CC BY) to the most restrictive (CC BY-NC-ND).
- Purpose: Ensures that software remains free and open, requiring any derivative works to also be distributed under the same license.
- Key Feature: Copyleft provision, which mandates that modifications and derived works must be open source under the GPL.
- Purpose: Provides a permissive license allowing users to use the software for any purpose, distribute it, modify it, and distribute modified versions.
- Key Feature: Does not require derivative works to be open source, allowing for incorporation into proprietary projects.
- Definition: Illegal activities conducted using computers, networks, or the internet.
- Impact: Can lead to financial loss, data breaches, identity theft, and emotional distress.
- Definition: Unauthorized access to computer systems or networks.
- Methods: Exploiting vulnerabilities, using malware, or brute force attacks.
- Consequences: Data theft, system damage, and loss of privacy.
- Definition: Intercepting private communications without permission.
- Methods: Man-in-the-middle attacks, network sniffing.
- Consequences: Exposure of sensitive information, loss of confidentiality.
- Definition: Fraudulent attempts to obtain sensitive information by masquerading as a trustworthy entity.
- Methods: Fake emails, websites, or messages that prompt recipients to provide personal information.
- Consequences: Identity theft, financial loss, and unauthorized access to accounts.
- Definition: Malware that encrypts a victim's data and demands payment for the decryption key.
- Methods: Phishing emails, malicious downloads, exploit kits.
- Consequences: Data loss, financial extortion, and operational disruptions.
- Definition: Individuals who deliberately provoke or harass others online to elicit emotional responses.
- Methods: Posting inflammatory, off-topic, or offensive comments.
- Consequences: Disruption of online communities, psychological distress.
- Definition: The use of digital communication tools to bully, harass, or intimidate someone.
- Methods: Social media harassment, threatening messages, spreading rumors.
- Consequences: Emotional trauma, mental health issues, and, in severe cases, suicidal thoughts.
- HTTPS: Always check that websites use HTTPS instead of HTTP. The 'S' stands for secure, meaning that the data sent between your browser and the website is encrypted.
- VPN: Use a Virtual Private Network (VPN) to encrypt your internet connection, especially when using public Wi-Fi. This prevents attackers from eavesdropping on your online activities.
- Check URLs: Be cautious of URLs that look unusual or unfamiliar. Cybercriminals often use slightly altered URLs to trick users into visiting malicious sites.
- Security Indicators: Look for a padlock icon in the address bar and verify the site’s certificate to ensure it’s legitimate.
- Browser Extensions: Install extensions that block ads, trackers, and malicious sites. Examples include uBlock Origin and Privacy Badger.
- Antivirus Software: Use reputable antivirus software that provides real-time protection against malware and phishing attempts.
- Browsers and OS: Keep your web browser and operating system up to date to protect against security vulnerabilities.
- Plugins: Update plugins like Java and Flash or disable them if not needed, as they can be exploited by attackers.
- Sources: Download software and files only from trusted sources. Avoid pirated software, as it can contain malware.
- Scans: Use antivirus software to scan files before opening them.
- Complexity: Create passwords that are at least 12 characters long and include a mix of letters, numbers, and special characters.
- Uniqueness: Avoid reusing passwords across different accounts. Use unique passwords for each account.
- Extra Security: Enable 2FA on all accounts that offer it. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone.
- Methods: Use authentication apps like Google Authenticator or Authy instead of SMS-based 2FA for better security.
- Emails and Links: Be cautious of emails or messages asking for personal information or containing suspicious links. Verify the sender’s email address and look for signs of phishing.
- Attachments: Do not open attachments from unknown sources.
- Credit Reports: Regularly check your credit reports for any suspicious activity.
- Account Activity: Monitor your bank and online accounts for unauthorized transactions.
- Storage: Encrypt sensitive data stored on your devices. Tools like BitLocker (Windows) or FileVault (Mac) can encrypt your hard drive.
- Communication: Use encrypted communication tools for sending sensitive information. Apps like Signal and WhatsApp offer end-to-end encryption.
- Regular Backups: Regularly back up important data to an external drive or cloud service. Ensure that backups are encrypted and stored securely.
- Offsite Storage: Consider using an offsite location for storing backups to protect against physical threats like theft or fire.
- Permissions: Restrict access to sensitive information based on user roles. Ensure that only authorized individuals have access to certain data.
- Authentication: Use strong authentication methods for accessing sensitive systems and data.
- Data Wiping: Use secure methods to erase data from devices before disposal. Simply deleting files is not enough; use tools that perform a complete wipe of the storage.
- Physical Destruction: For highly sensitive information, consider physically destroying storage media to ensure data cannot be recovered.
- Replication: Viruses can replicate themselves and spread to other programs and files when the infected program or file is executed.
- Activation: Often, viruses lay dormant until the infected file is run or a specific condition is met.
- Payload: They can carry a payload that performs malicious actions like corrupting data, logging keystrokes, or even creating backdoors.
- Antivirus Software: Regularly update and run antivirus software to detect and remove viruses.
- Avoid Suspicious Links and Downloads: Be cautious when opening email attachments or downloading files from unknown sources.
- System Updates: Keep your operating system and applications up-to-date to protect against known vulnerabilities.
- Deception: Trojans appear as harmless or useful software but perform malicious activities once installed.
- Variety of Malicious Actions: They can create backdoors, steal information, or download additional malware.
- No Self-Replication: Unlike viruses and worms, Trojans do not replicate themselves but rely on social engineering to spread.
- Backdoor Trojans: Allow remote control over the infected system.
- Downloader Trojans: Download and install other malicious software.
- Spyware Trojans: Monitor user activities and steal sensitive information.
- Banking Trojans: Target online banking credentials and financial information.
- Download from Trusted Sources: Only download software from reputable and official sources.
- Be Wary of Unexpected Emails: Avoid downloading or opening attachments from unknown or unexpected email sources.
- Security Software: Use comprehensive security software that can detect and block Trojans.
- Pop-Up Ads: Generates frequent and intrusive advertisements, often in the form of pop-up windows.
- User Tracking: Adware can track the user’s browsing habits and send this data back to advertisers.
- Performance Impact: Can slow down system performance and use up bandwidth.
- Legitimate Adware: Comes with user consent, often bundled with freeware or shareware, and can usually be removed by uninstalling the associated software.
- Potentially Unwanted Programs (PUPs): Adware that is installed without explicit user consent and is often more difficult to remove.
- Adblockers: Use browser extensions that block ads and pop-ups.
- Careful Installation: Pay attention to installation prompts and opt out of installing additional software that you do not need.
- Anti-Adware Tools: Use security software that can detect and remove adware.
E-Waste Management
E-waste, or electronic waste, refers to discarded electronic appliances and devices. With the rapid pace of technological advancement, the accumulation of e-waste has become a significant environmental issue. Proper e-waste management is essential to mitigate its harmful effects on the environment and human health.
Importance of Proper E-Waste Management
- Environmental Protection: E-waste contains hazardous materials such as lead, mercury, cadmium, and brominated flame retardants, which can contaminate soil and water if not disposed of properly.
- Resource Conservation: Many electronic devices contain valuable materials like gold, silver, copper, and rare earth elements. Proper recycling can recover these materials and reduce the need for mining new resources.
- Health Protection: Improper disposal and informal recycling processes can expose workers and the public to toxic substances, leading to health issues like respiratory problems, skin diseases, and neurological damage.
- Reduce: Minimize e-waste generation by buying only what you need, choosing durable products, and avoiding unnecessary upgrades.
- Reuse: Extend the life of your electronic devices by repairing them, donating them to others, or selling them.
- Recycle: Ensure that old and non-functional devices are recycled properly through authorized e-waste recycling programs.
- Common E-Waste Items: Computers, laptops, mobile phones, tablets, televisions, printers, refrigerators, and other household appliances.
- Batteries and Accessories: Include batteries, chargers, earphones, and other electronic accessories in your e-waste disposal plans.
- Certified E-Waste Recyclers: Use certified e-waste recycling services to ensure that the devices are dismantled and recycled in an environmentally friendly manner.
- Manufacturer Take-Back Programs: Many electronics manufacturers offer take-back programs to recycle their products. Check with the manufacturer or retailer for such programs.
- Municipal Collection Programs: Participate in local government e-waste collection events or drop-off programs.
- Data Wiping: Before disposing of or recycling electronic devices, ensure that all personal data is securely erased. Use software tools to wipe data from hard drives, phones, and other storage devices.
- Physical Destruction: For highly sensitive data, consider physically destroying the storage media to prevent data recovery.
- Follow Local Laws: Adhere to local, state, and national regulations regarding e-waste disposal and recycling.
- Stay Informed: Keep updated with guidelines and best practices for e-waste management from reputable sources such as environmental organizations and government agencies.
E-Waste Recycling Process
1. Collection and Transportation:
E-waste is collected from various sources, including households, businesses, and institutions, and transported to recycling facilities.
2. Sorting and Dismantling:
Devices are manually sorted and dismantled into various components, such as plastics, metals, circuit boards, and glass.
3. Shredding and Separation:
The dismantled components are further shredded into smaller pieces and separated using techniques like magnetic separation (for ferrous metals), eddy current separation (for non-ferrous metals), and flotation (for plastics).
4. Recovery and Refinement:
Precious metals and other valuable materials are extracted and refined using chemical and electrochemical processes.
5. Disposal of Residual Waste:
Non-recyclable and hazardous materials are disposed of in compliance with environmental regulations to minimize environmental impact.
Information Technology Act (IT Act)
The Information Technology Act (IT Act), enacted in 2000 in India, is a comprehensive legal framework to address the issues related to cybercrime and electronic commerce. Here are the basic points of the IT Act:
1. Objective
- Primary Purpose: To provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "e-commerce".
- Cybercrime: To address the emerging legal issues related to online activities, cybercrime, and digital signatures.
2. Key Provisions
- Legal Recognition of Electronic Documents: Provides legal recognition to electronic documents, thus facilitating electronic governance.
- Digital Signatures: Legal recognition of digital signatures for the authentication of electronic records.
- Certifying Authorities: Establishes a framework for the accreditation of certifying authorities, who issue digital certificates.
- Electronic Contracts: Recognition of electronic contracts, making them legally enforceable.
3. Offenses and Penalties:
- Unauthorized Access: Penalties for gaining unauthorized access to computer systems, including hacking.
- Data Theft: Punishments for stealing data stored in a computer, such as copying or extracting data without permission.
- Virus Attacks: Penalties for introducing viruses, worms, or other malicious software into computer systems.
- Identity Theft: Penalties for identity theft and fraud involving the use of digital identities.
- Cyber Terrorism: Stringent penalties for cyber terrorism activities.
- Cyber Appellate Tribunal: Establishment of a Cyber Appellate Tribunal to handle appeals against orders from adjudicating officers related to contraventions under the Act.
- Regulation of Certifying Authorities: Guidelines for the regulation and functioning of certifying authorities who issue digital signatures.
- Appointment of Adjudicating Officers: Appointment of adjudicating officers to handle disputes and grievances related to the provisions of the IT Act.
- IT (Amendment) Act, 2008: Significant amendments to address evolving cyber threats, including:
- Child Pornography: Prohibition of child pornography and punishments for related offenses.
- Phishing and Spam: Provisions to combat phishing attacks and spamming.
- Data Protection: Introduction of data protection measures, including safeguards for sensitive personal information.
- Electronic Governance: Promotion of electronic governance and the use of digital signatures for government transactions.
- E-Commerce: Legal recognition and facilitation of electronic commerce, making online business transactions legally binding.
- Intermediary Guidelines: Defines the roles and responsibilities of intermediaries (e.g., ISPs, web hosts) in managing and removing unlawful content.
- Safe Harbor Provisions: Provides safe harbor protection to intermediaries, limiting their liability for third-party content under certain conditions.
- Privacy Protection: Provisions to safeguard the privacy of individuals and data protection requirements.
- Computer Resource Tampering: Penalties for tampering with computer resources, including data alteration and system interference.
- Confidentiality: Obligations on maintaining the confidentiality and security of electronic records and digital signatures.
- A. The physical trails left behind by someone on the internet
- B. The environmental impact of digital devices
- C. The collection of all the traces and activities someone leaves online
- D. The programming languages used in digital technology
- A. Browsing websites
- B. Posting on social media
- C. Sending emails
- D. All of the above
- A. Regularly clearing your browser history and cookies
- B. Using strong, unique passwords for different accounts
- C. Adjusting privacy settings on social media platforms
- D. All of the above
- A. Using all caps to emphasize your points
- B. Respecting others' opinions and responding politely
- C. Posting off-topic comments
- D. Ignoring other participants' contributions
- A. Forward it to all your contacts
- B. Click on any links to verify if they are safe
- C. Delete the email and report it to your email provider
- D. Reply to the email asking for more information
- A. Software designed to protect your computer from viruses
- B. Malicious software intended to damage or disable computers and computer systems
- C. A type of hardware that speeds up your computer
- D. An operating system feature
- A. Virus
- B. Trojan Horse
- C. Worm
- D. Spyware
- A. Adware
- B. Spyware
- C. Worm
- D. Ransomware
- A. To increase the production of electronic devices
- B. To dispose of electronic waste in landfills
- C. To recycle and properly dispose of electronic waste to minimize environmental impact
- D. To store electronic waste indefinitely
- A. Burning electronic devices to retrieve metals
- B. Disposing of electronic waste in household trash bins
- C. Dismantling electronic devices to recover valuable materials
- D. Using electronic devices as landfill cover
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.