Ch.
10 TRENDS IN COMPUTING AND ETHICAL ISSUES
Artificial Intelligence: Artificial Intelligence is a way of making a computer, a computer-controlled robot,
or a software think intelligently, in the similar manner the intelligent humans think.
Examples: Sophia(Humanoid robot),
Smart assistants like Siri, Alexa, Google Assistant etc.
Self Driving cars like Tesla
The Internet of things (IoT) : is the network of devices, vehicles, and home appliances that
contain electronics, software, actuators, and connectivity which allows these things to connect, interact
and exchange data.
Examples: Smart gadgets like Fitbit,Misfit,Nike etc.
Home securities like video surveillance, Temprature and Air quality control etc.
Virtual reality (VR): refers to computer-generated environments or realities that are designed to simulate
a person's physical presence in a specific environment that is designed to feel real. The purpose of VR is
to allow a person to experience and manipulate the environment as if it were the real world.
Using VR devices such as HTC Vive, Oculus Rift or Google Cardboard, users can be transported into a
number of real-world and imagined environments such as the middle of a squawking penguin colony or
even the back of a dragon.
Examples: VOLVO Reality ,Matterport 3D Spaces, BetterCloud VR recruitment etc.
Augmented reality (AR): is a technology that superimposes a computer-generated image on a user's
view of the real world, thus providing a composite view.
Examples of augmented reality experiences include Snapchat lenses and the game Pokemon Go.
Cyber Securities:
Cyber security is the protection of Internet-connected systems, including hardware, software, and data
from cyber attacks.
Types of Threats
1.Malware (a portmanteau for malicious software) is any software intentionally designed to cause
damage to a computer, server, client, or computer network.
2.Virus
A computer virus is a type of malicious software that, when executed, replicates itself by modifying
other computer programs and inserting its own code.
Computer worm is a standalone malware computer program that replicates itself in order to spread to
other computers.
Prepared By: Amit Kumar Trivedi
Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.
3.Spyware is software that aims to gather information about a person or organization, sometimes without
their knowledge, that may send such information to another entity without the consumer's consent, that
asserts control over a device without the consumer's knowledge, or it may send such information to
another entity with the consumer's consent, through cookies .
4.Adware, or advertising-supported software, is software that generates revenue for its developer by
automatically generating online advertisements in the user interface of the software or on a screen
presented to the user during the installation process.
5.Denial-Of-Service Attack : In computing, a denial-of-service attack (DoS attack) is a cyber-attack in
which the perpetrator seeks to make a machine or network resource unavailable to its intended users by
temporarily or indefinitely disrupting services
6.Eavesdropping is the act of secretly or stealthily listening to the private conversation or
communications of others without their consent.
7.Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords
and credit card details by disguising as a trustworthy entity in an electronic communication.
8.Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's
data or perpetually block access to it unless a ransom is paid.
Cyber Security Measures
1.Authorization is the function of specifying access rights/privileges to resources related to information
security and computer security in general and to access control in particular.
2.Authentication is the act of confirming the truth of an attribute of a single piece of data claimed true by
an entity.
3.Firewall
In computing, a firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier
between a trusted internal network and untrusted external network, such as the Internet.
Types
Network layer or packet filters
Application-layer
Proxies
Network address translation
4.An intrusion detection system (IDS) is a device or software application that monitors a network or
systems for malicious activity or policy violations.
Prepared By: Amit Kumar Trivedi
Major Ethical Issues
Individual’s Right to Privacy: The right to privacy is an element of various legal traditions to
restrain governmental and private actions that threaten the privacy of individuals.
Intellectual Property Rights: Intellectual property rights are the rights given to persons over the
creations of their minds. They usually give the creator an exclusive right over the use of his/her creation
for a certain period of time.
Intellectual property rights include patents, copyright, Trademarks etc.
Accuracy of Information: When a user pays for some information or software, he/she has every right to
ensure that the information or software being given to him/her is authentic, authorized and accurate.
Open Source Terminology
Freeware: Freeware is software, most often proprietary, that is distributed at no monetary cost to the end
user.
Free software or libre software: Free software is computer software distributed under terms that allow
users to run the software for any purpose as well as to study, change, and distribute it and any adapted
versions. Free software is a matter of liberty, not price.
Open-source software (OSS) : Open-source software is a type of computer software in which source
code is released under a license in which the copyright holder grants users the rights to study, change,
and distribute the software to anyone and for any purpose.
Free and open-source software (FOSS): FOSS is software that can be classified as both free
software and open-source software. That is, anyone is freely licensed to use, copy, study, and change the
software in any way, and the source code is openly shared so that people are encouraged to voluntarily
improve the design of the software.
Licenses and Domains of Open Source Technology
1. GNU General Public License(GPL)
2. GNU Lesser General Public License(LGPL)
3. BSD License
4. MIT license
5. Apache License
Prepared By: Amit Kumar Trivedi