8.1 Digital Society and Computer Ethics
- Digital
Society: A society where information and communication technologies
(ICT) are widely used for communication, business, education, and
governance.
- Computer
Ethics: Moral principles guiding the use of computers and technology,
including:
- Privacy:
Protecting personal information.
- Accuracy:
Ensuring data integrity.
- Property:
Respecting intellectual property rights.
- Accessibility:
Ensuring fair access to technology.
8.2 Concept of Information Security
- Information
Security: Protecting data from unauthorized access, modification, or
destruction.
- Three
key principles (CIA Triad):
- Confidentiality:
Restricting access to authorized users.
- Integrity:
Ensuring data is accurate and unaltered.
- Availability:
Ensuring data is accessible when needed.
- Threats:
Hacking, phishing, malware, insider threats.
- Security
Measures: Firewalls, encryption, strong passwords, regular updates.
8.3 Concept of Cybercrime
- Cybercrime:
Illegal activities involving computers and networks.
- Types
of Cybercrime:
- Hacking
and unauthorized access.
- Identity
theft and fraud.
- Online
scams and phishing.
- Cyberbullying
and harassment.
- Ransomware
and data breaches.
8.4 Malicious Software and Spam
- Malicious
Software (Malware): Programs designed to harm a system, including:
- Virus:
Self-replicating programs that attach to files.
- Worm:
Self-spreading malware that does not need a host file.
- Trojan
Horse: Disguised as legitimate software.
- Spyware:
Secretly collects user information.
- Ransomware:
Encrypts data and demands payment.
- Spam:
Unsolicited or unwanted emails, often used for phishing and spreading
malware.
8.5 Protection from Cybercrime
- Use
Strong Passwords: Combination of letters, numbers, and symbols.
- Enable
Two-Factor Authentication (2FA): Extra security layer.
- Install
Antivirus and Firewalls: Protect against malware.
- Avoid
Phishing Scams: Do not click on suspicious links.
- Regular
Software Updates: Fix security vulnerabilities.
8.6 Intellectual Property Rights (IPR)
- Intellectual
Property: Creations of the mind, including inventions, artistic works,
and software.
- Types
of IPR:
- Copyright:
Protects books, music, software, etc.
- Patent:
Protects inventions.
- Trademark:
Protects brand names and logos.
- Trade
Secret: Confidential business information.
- Importance:
Encourages innovation and protects creators' rights.
8.7 Concept of Digital Signature
- Digital
Signature: Electronic authentication method that ensures:
- Authenticity:
Confirms sender’s identity.
- Integrity:
Ensures data is unchanged.
- Non-repudiation:
Prevents denial of sending a document.
- Uses:
Secure transactions, online contracts, e-governance.
8.8 Concept of Cyber Law in Nepal
- Cyber
Law: Legal regulations related to cyber activities.
- Key
Aspects of Nepal’s Cyber Law:
- Electronic
Transactions Act (ETA) 2063 (2006):
- Recognizes
digital signatures.
- Penalizes
hacking, data theft, and online fraud.
- Defines
punishment for cybercrime offenses.
8.9 ICT Policy in Nepal
- ICT
Policy: Government framework for promoting information and
communication technology.
- Key
Objectives:
- Develop
digital infrastructure.
- Promote
e-governance and digital literacy.
- Strengthen
cybersecurity measures.
- Encourage
innovation and digital entrepreneurship.
No comments:
Post a Comment