8.1 Digital Society and Computer Ethics
- Digital
Society: A society where information and communication technologies
(ICT) are widely used for communication, business, education, and
governance.
- Computer
Ethics: Moral principles guiding the use of computers and technology,
including:
- Privacy:
Protecting personal information.
- Accuracy:
Ensuring data integrity.
- Property:
Respecting intellectual property rights.
- Accessibility:
Ensuring fair access to technology.
8.2 Concept of Information Security
- Information
Security: Protecting data from unauthorized access, modification, or
destruction.
- Three
key principles (CIA Triad):
- Confidentiality:
Restricting access to authorized users.
- Integrity:
Ensuring data is accurate and unaltered.
- Availability:
Ensuring data is accessible when needed.
- Threats:
Hacking, phishing, malware, insider threats.
- Security
Measures: Firewalls, encryption, strong passwords, regular updates.
8.3 Concept of Cybercrime
- Cybercrime:
Illegal activities involving computers and networks.
- Types
of Cybercrime:
- Hacking
and unauthorized access.
- Identity
theft and fraud.
- Online
scams and phishing.
- Cyberbullying
and harassment.
- Ransomware
and data breaches.
8.4 Malicious Software and Spam
- Malicious
Software (Malware): Programs designed to harm a system, including:
- Virus:
Self-replicating programs that attach to files.
- Worm:
Self-spreading malware that does not need a host file.
- Trojan Horse: Harmful program that looks like safe or useful software, but once installed, it secretly damages computer or steals your information.
- Spyware:
Secretly collects user information.
- Ransomware: Encrypts data and demands payment.
- Spam: Unsolicited or unwanted emails, often used for phishing and spreading malware.
8.5 Protection from Cybercrime
- Use
Strong Passwords: Combination of letters, numbers, and symbols.
- Enable
Two-Factor Authentication (2FA): Extra security layer.
- Install
Antivirus and Firewalls: Protect against malware.
- Avoid
Phishing Scams: Do not click on suspicious links.
- Regular
Software Updates: Fix security vulnerabilities.
8.6 Intellectual Property Rights (IPR)
- Intellectual
Property: Creations of the mind, including inventions, artistic works,
and software.
- Types
of IPR:
- Copyright:
Protects books, music, software, etc.
- Patent:
Protects inventions.
- Trademark:
Protects brand names and logos.
- Trade
Secret: Confidential business information.
- Importance:
Encourages innovation and protects creators' rights.
8.7 Concept of Digital Signature
- Digital
Signature: Electronic authentication method that ensures:
- Authenticity:
Confirms sender’s identity.
- Integrity:
Ensures data is unchanged.
- Non-repudiation:
Prevents denial of sending a document.
- Uses:
Secure transactions, online contracts, e-governance.
8.8 Concept of Cyber Law in Nepal
- Cyber Law: Legal regulations related to cyber activities. The cyber law of Nepal is called the Electronic Transaction Act (ETA) 2063.
- Electronic
Transactions Act (ETA) 2063 (2006): ETA (Electronic Transaction Act) is a
law that deals with issues related to cybercrime and also help in making and
implementing laws over cybercrime. The Electronic Transactions Act, 2063
was authenticated and published on 24 Bhadra 2063 B.S. (2 September 2006).
- The ETA 2063 aims to regulate electronic transactions, promote digital signatures, prevent cybercrime, protect privacy, and provide a legal framework for e-commerce.
8.9 ICT Policy in Nepal
IT Policy 2072 (ICT Policy 2015) is a
framework aimed at developing Nepal’s ICT sector, promoting digital literacy,
expanding internet and broadband access, and using technology to support
sustainable development and improve government services.
Ø
IT Policy launch
in Nepal – 2000 AD (2057 BS).
Ø
Most recent and
the latest information technology policy– ICT Policy 2015 (2072 BS).
Ø
Total laws & Strategies
in ICT policies 2015 (2072 BS) – 21 Policies and 21 Strategies.
Vision of ICT Policy 2015: To transform Nepal into information and knowledge-based society
and economy.
Mission of ICT Policy 2015: To create conditions for the intensified development and growth of
ICT sector as a key driver for Nepal’s
sustainable development and poverty
reduction strategies.
Goals of ICT policy: (Imp)
a)
At least 75
percent of the population will have digital literacy skills by the end of 2020.
b)
80% of all
citizens facing government services would be offered online by 2020.
c)
By 2020, entire
population of Nepal to have access to Internet.
d)
By 2020, 90
percent of the population to have access to broadband service.
Two major uses of IT policy are:
a) IT policies provide clear guidelines for employees on the proper
use of technology in the organization.
b) They establish rules to protect digital assets and data from cyber
threats and unauthorized access.
Exercise:
Define Digital Society and Computer Ethics. Explain four key principles of computer ethics.
What is Information Security? Describe the three key principles of the CIA Triad.
List and explain at least four common threats to information security.
Define Cybercrime and describe its main types with examples.
Explain Malicious Software (Malware) and its types. Give one example of each type.
What is a Digital Signature? Explain its key features and uses.
Describe the Electronic Transaction Act (ETA) 2063 and its objectives in Nepal.
Explain ICT Policy 2015 (IT Policy 2072) of Nepal, including its vision, mission, goals, and major uses.
No comments:
Post a Comment