Unit 9.1
Unit 9 Intro: Computer Security, Ethics, and Privacy
IT 231: IT and Application
Learning Objectives
By the end of this introductory chapter, you will be able to:
- ✅ Define the core concepts of computer security, ethics, and privacy.
- ✅ Identify major threats to digital information, such as malware and software piracy.
- ✅ Describe key protective controls like firewalls and encryption.
- ✅ Recognize the importance of cyber law and copyright in the IT profession.
The Core Concepts: A Digital Triad
This unit revolves around three interconnected pillars that are critical in today's digital world.
🔒 Security
Protecting information and systems from unauthorized access, use, disclosure, disruption, or destruction.
⚖️ Ethics
The moral principles that govern the use of computers and information systems. It's about what is right versus wrong in our digital actions.
👤 Privacy
The right of individuals to control the collection, storage, and dissemination of their personal information.
Why Does This Unit Matter?
Our world is increasingly digital. This reliance creates both incredible opportunities and significant risks.
- ⚡ Every transaction, communication, and piece of data is a potential target.
- 📊 Businesses, governments, and individuals are all vulnerable to digital threats.
- 🎯 The need for skilled, ethical IT professionals has never been greater.
Your Role: To build, maintain, and secure the digital infrastructure we all depend on.
Mapping the Landscape: Major Threats
We will explore several categories of threats to computer security. The most common include:
Key Threats to Investigate:
- Unauthorized Access: Gaining entry to a system without permission (e.g., hacking).
- Malware (Malicious Software): Viruses, worms, and ransomware designed to cause harm.
- Software Piracy: The illegal copying, distribution, or use of software.
Each of these will be covered in detail in upcoming chapters.
Threat Focus: Malware vs. Piracy
🦠 Malware
Software intentionally designed to cause damage to a computer, server, or network.
- Goal: Damage, disrupt, steal.
- Examples: Viruses, Ransomware, Spyware.
- Impact: Data loss, financial theft, system failure.
💿 Software Piracy
The unauthorized copying, distribution, or use of copyrighted software.
- Goal: Avoid payment, illegal distribution.
- Examples: Using one license on many PCs, downloading "cracked" software.
- Impact: Financial loss for developers, security risks from unofficial software.
Building Our Defenses: An Intro to Controls
While threats are numerous, we have powerful tools and strategies to protect our digital assets. These are known as security controls.
🎯 The goal of a security control is to prevent, detect, or minimize the impact of a security incident.
We'll start by looking at two fundamental network security controls...
Key Controls: Firewall & Encryption
🧱 Firewalls
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Think of it as a digital security guard at the gate of your network.
🔐 Encryption
The process of converting data into a code (ciphertext) to prevent unauthorized access. The data can only be read after it's decrypted with the correct key.
Think of it as writing a message in a secret language that only the recipient can understand.
The Bigger Picture: Law and Ethics
Technical skills are only part of the story. As an IT professional, you have legal and ethical responsibilities.
Cyber Law: Laws relating to the internet and internet-related technologies. It governs online activities and transactions, defining what is legally permissible.
Copyright: A legal right that grants the creator of an original work exclusive rights for its use and distribution. This is the foundation of anti-piracy laws.
Practical Application: The Nepali Context
These global issues have significant local impact.
Thinking Locally:
- Cyber Law in Nepal: The Electronic Transactions Act, 2063 (2008) is the primary legislation governing cyber activities. It covers unauthorized access, piracy, and online privacy.
- Local Challenges: Software piracy is widespread in Nepal, posing risks to both users (malware in cracked software) and the local software economy.
- Recent Events: High-profile data breaches of Nepali companies and government websites highlight the urgent need for better security practices and skilled professionals.
Unit 9.1: Key Takeaways
- ✅ The Digital Triad: Security, Ethics, and Privacy are interconnected and essential for modern IT.
- ✅ Threats are Real: We must understand threats like unauthorized access, malware, and piracy to combat them effectively.
- ✅ Controls are Our Tools: Firewalls and encryption are fundamental tools for protecting networks and data.
- ✅ Responsibility is Key: IT professionals must operate within legal frameworks (Cyber Law, Copyright) and strong ethical guidelines.
Thank You
This concludes our introduction to Unit 9.
Next Topic: 9.2 - Unauthorized Access and Protection