Page 153 - Robotics and AI class 10
P. 153

Understanding of Security and Ethical Issues
            Unauthorised use of hardware refers to accessing or utilizing computer systems, devices, or equipment without
            proper permission. It is a security risk as it can lead to data breaches, privacy violations, and disruption of
            services. Unauthorized access is illegal and can result in legal consequences. Ethically, it is considered wrong
            because it violates privacy, consent, and ownership principles. To prevent unauthorized use, security measures
            like strong passwords, authentication methods, and physical locks should be implemented. Respecting others'
            property and privacy is essential, and using hardware without permission is unethical.

            Forester and Morrison, 4, observed that "The existence of computers-and their ability to malfunction or to be
            abused-has created a whole new range of social problems or issues with which we need urgently to grapple."

            They listed the issues as under, which we try to understand:

            Theft of Software
            Stealing of software media, illegally registering/activating/copying a program, or purposefully erasing a program,
            and/or any such activity of using or working with software for which one does not have ownership or authority to
            use.


            Disputed Rights to Products
            As they call it,” I took the inspiration from and did not copy”, most of the time with regards to music and content.
            Any piece of software/data which is copyrighted and is an Intellectual Property, cannot be used wholly/partly
            without the authorisation and permission to use from the owner. Any unauthorised use of the same falls under
            the purview of disputed rights to the product.


            The Use of Computer to Commit Fraud
            Computer fraud, as the words suggests, is the use of internet services and internet devices on a computer to
            defraud individuals or organizations of their resources, which could be financial, data, Intellectual Property or
            even causing physical harm.

            The Phenomenon of Hacking and Data Theft

            Hacking is an act to break the security code and enter a computer system or network in an attempt to exploit
            the information available for the illicit purpose or for the purpose of distorting code to achieve the malicious
            goal of an unauthorised person.

            Data  theft  is  one  of  the  outcomes  of  Hacking,  where  confidential  or  personal  data  of  the  individuals  or
            corporations are stolen for the purpose of misuse. The Data could be used for unwarranted things like selling the
            information or use it for identity theft, which can be used to gain access to secure accounts or credit cards or use
            the individual’s identity to benefit themselves. It can be a big issue of National Security, if sensitive information
            related to the defense falls into the wrong hands.

            Sabotage in the Form of Viruses
            Let's first understand computer virus (Vital Information Resources Under Siege). As the full form already suggests,
            it is a type of malicious software or malware as it is referred to, which spreads between computers or networks, and
            causes damage to software code and data. The aim is to disrupt systems and contaminate hardware or software,
            so as to disrupt the normal functioning of processes and/or destruction/damage of equipment or information.



                                                       Machine Intelligence and Cybersecurity in Computing  151
   148   149   150   151   152   153   154   155   156   157   158