Page 153 - Robotics and AI class 10
P. 153
Understanding of Security and Ethical Issues
Unauthorised use of hardware refers to accessing or utilizing computer systems, devices, or equipment without
proper permission. It is a security risk as it can lead to data breaches, privacy violations, and disruption of
services. Unauthorized access is illegal and can result in legal consequences. Ethically, it is considered wrong
because it violates privacy, consent, and ownership principles. To prevent unauthorized use, security measures
like strong passwords, authentication methods, and physical locks should be implemented. Respecting others'
property and privacy is essential, and using hardware without permission is unethical.
Forester and Morrison, 4, observed that "The existence of computers-and their ability to malfunction or to be
abused-has created a whole new range of social problems or issues with which we need urgently to grapple."
They listed the issues as under, which we try to understand:
Theft of Software
Stealing of software media, illegally registering/activating/copying a program, or purposefully erasing a program,
and/or any such activity of using or working with software for which one does not have ownership or authority to
use.
Disputed Rights to Products
As they call it,” I took the inspiration from and did not copy”, most of the time with regards to music and content.
Any piece of software/data which is copyrighted and is an Intellectual Property, cannot be used wholly/partly
without the authorisation and permission to use from the owner. Any unauthorised use of the same falls under
the purview of disputed rights to the product.
The Use of Computer to Commit Fraud
Computer fraud, as the words suggests, is the use of internet services and internet devices on a computer to
defraud individuals or organizations of their resources, which could be financial, data, Intellectual Property or
even causing physical harm.
The Phenomenon of Hacking and Data Theft
Hacking is an act to break the security code and enter a computer system or network in an attempt to exploit
the information available for the illicit purpose or for the purpose of distorting code to achieve the malicious
goal of an unauthorised person.
Data theft is one of the outcomes of Hacking, where confidential or personal data of the individuals or
corporations are stolen for the purpose of misuse. The Data could be used for unwarranted things like selling the
information or use it for identity theft, which can be used to gain access to secure accounts or credit cards or use
the individual’s identity to benefit themselves. It can be a big issue of National Security, if sensitive information
related to the defense falls into the wrong hands.
Sabotage in the Form of Viruses
Let's first understand computer virus (Vital Information Resources Under Siege). As the full form already suggests,
it is a type of malicious software or malware as it is referred to, which spreads between computers or networks, and
causes damage to software code and data. The aim is to disrupt systems and contaminate hardware or software,
so as to disrupt the normal functioning of processes and/or destruction/damage of equipment or information.
Machine Intelligence and Cybersecurity in Computing 151

