SPI_module-2-assigned-topic-for-reporters
SPI_module-2-assigned-topic-for-reporters
SPI_module-2-assigned-topic-for-reporters
MODULE 3
Introduction
Ethics is a branch of philosophy that deals with what is considered to be
right or wrong. In simple words, it is the study of what is right to do in a
given situation and what we ought to do. It is important to note that
what is unethical is not necessarily illegal.
Key Terms
Hacking is an attempt to exploit a computer system or a private
network inside a computer
Keylogger is a simple software that records the key sequence and
strokes of your keyboard into a log file on your machine
Cookie theft The cookies of a browser keep our personal data such as
browsing history, username, and passwords for different sites that we
access.
1.1 Invasion of Privacy – Vince Valaquio
Let's say you accidentally leave a personal letter containing private
information on a public park bench, and that letter is picked up and
read by someone else. Even if the sharing of this information
damages your reputation or causes other harm, it is not a violation
of your privacy. That requires a "reasonable expectation" of privacy,
which would apply if the letter was not left out in public. But if you
are having a private conversation in your home and a neighbor uses
an electronic device to eavesdrop (and this causes some kind of
injury), then your expectation of privacy has in fact been violated.
Intrusion of Solitude
Intruding upon another's solitude or private affairs, physically or
otherwise, is subject to liability if this intrusion would be considered
highly offensive to a reasonable person. This type of invasion of privacy
is commonly associated with "peeping Toms," someone illegally
intercepting private phone calls, or snooping through someone's private
records.
False Light
A false light claim is similar to a defamation claim in that it allows
an individual to sue for the public disclosure of information that is
misleading (or puts that person in a "false light"), but not technically
false. The key difference is that defamation claims only apply to the
public broadcasting of false information.
Computer Security
Cyber security, computer security or IT security is the protection
of computer systems from the theft and damage to
their hardware, software or information, as well as
from disruption or misdirection of the services they provide.
Backdoor
A backdoor in a computer system, a cryptosystem or an
algorithm, is any secret method of bypassing normal authentication or
security controls. They may exist for a number of reasons, including by
original design or from poor configuration. They may have been added
by an authorized party to allow some legitimate access, or by an
attacker for malicious reasons; but regardless of the motives for their
existence, they create a vulnerability.
Denial-of-service attack
Denial of service attacks (DoS) are designed to make a machine
or network resource unavailable to its intended users. Attackers can
deny service to individual victims, such as by deliberately entering a
wrong password enough consecutive times to cause the victims
account to be locked, or they may overload the capabilities of a
machine or network and block all users at once. While a network attack
from a single IP address can be blocked by adding a new firewall rule,
many forms of Distributed denial of service (DDoS) attacks are possible,
where the attack comes from a large number of points – and defending
is much more difficult. Such attacks can originate from the zombie
computers of a botnet, but a range of other techniques are possible
including reflection and amplification attacks, where innocent systems
are fooled into sending traffic to the victim.
Eavesdropping
Eavesdropping is the act of surreptitiously listening to a private
conversation, typically between hosts on a network. For instance,
programs such as Carnivore and NarusInSight have been used by
the FBI and NSA to eavesdrop on the systems of internet service
providers. Even machines that operate as a closed system (i.e., with no
contact to the outside world) can be eavesdropped upon via monitoring
the faint electro-magnetic transmissions generated by the
hardware; TEMPEST is a specification by the NSA referring to these
attacks.
Spoofing
Spoofing is the act of masquerading as a valid entity through
falsification of data (such as an IP address or username), in order to
gain access to information or resources that one is otherwise
unauthorized to obtain.
Tampering
Tampering describes a malicious modification of products. So-
called "Evil Maid" attacks and security services planting of surveillance
capability into routers are examples.
Privilege escalation
Privilege escalation describes a situation where an attacker with
some level of restricted access is able to, without authorization, elevate
their privileges or access level. For example, a standard computer user
may be able to fool the system into giving them access to restricted
data; or even to "become root" and have full unrestricted access to a
system.
Phishing - Pallarcon
Phishing is the attempt to acquire sensitive information such as
usernames, passwords, and credit card details directly from
users. Phishing is typically carried out by email spoofing or instant
messaging, and it often directs users to enter details at a fake website
whose look and feel are almost identical to the legitimate one. Preying
on a victim's trust, phishing can be classified as a form of social
engineering.
Clickjacking
Clickjacking, also known as "UI redress attack" or "User Interface
redress attack", is a malicious technique in which an attacker tricks a
user into clicking on a button or link on another webpage while the user
intended to click on the top level page. This is done using multiple
transparent or opaque layers. The attacker is basically "hijacking" the
clicks meant for the top level page and routing them to some other
irrelevant page, most likely owned by someone else. A similar
technique can be used to hijack keystrokes. Carefully drafting a
combination of stylesheets, iframes, buttons and text boxes, a user can
be led into believing that they are typing the password or other
information on some authentic webpage while it is being channeled into
an invisible frame controlled by the attacker.
Information security
Information security, sometimes shortened to InfoSec, is the
practice of preventing unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of information. It is a
general term that can be used regardless of the form the data may take
(e.g. electronic, physical). Information security's primary focus is the
balanced protection of the confidentiality, integrity and availability of
data (also known as the CIA triad) while maintaining a focus on efficient
policy implementation, all without hampering organization
productivity. This is largely achieved through a multi-step risk
management process that identifies assets, threat sources,
vulnerabilities, potential impacts, and possible controls, followed by
assessment of the effectiveness of the risk management plan.
To standardize this discipline, academics and professionals
collaborate and seek to set basic guidance, policies, and industry
standards on password, antivirus software, firewall, encryption
software, legal liability and user/administrator training standards. This
standardization may be further driven by a wide variety of laws and
regulations that affect how data is accessed, processed, stored, and
transferred. However, the implementation of any standards and
guidance within an entity may have limited effect if a culture
of continual improvement isn't adopted.
Threats
Malicious software
A computer user can be tricked or forced into downloading
software onto a computer that is of malicious intent. Such software
comes in many forms, such as viruses, Trojan horses, spyware, and
worms.
Malware, short for malicious software, is any software used to
disrupt computer operation, gather sensitive information, or gain
access to private computer systems. Malware is defined by its
malicious intent, acting against the requirements of the computer
user, and does not include software that causes unintentional harm
due to some deficiency. The term badware is sometimes used, and
applied to both true (malicious) malware and unintentionally harmful
software.
A botnet is a network of zombie computers that have been taken
over by a robot or bot that performs large-scale malicious acts for
the creator of the botnet.
Computer Viruses are programs that can replicate their structures or
effects by infecting other files or structures on a computer. The
common use of a virus is to take over a computer to steal data.
Computer worms are programs that can replicate themselves
throughout a computer network, performing malicious tasks
throughout.
Ransomware is a type of malware which restricts access to the
computer system that it infects, and demands a ransom paid to the
creator(s) of the malware in order for the restriction to be removed.
Scareware is scam software with malicious payloads, usually of
limited or no benefit, that are sold to consumers via certain
unethical marketing practices. The selling approach uses social
engineering to cause shock, anxiety, or the perception of a threat,
generally directed at an unsuspecting user.
Spyware refers to programs that surreptitiously monitor activity on a
computer system and report that information to others without the
user's consent.
A Trojan horse, commonly known as a Trojan, is a general term for
malicious software that pretends to be harmless, so that a user
willingly allows it to be downloaded onto the computer.
KeyLogger, Keystroke logging, often referred to
as keylogging or keyboard capturing, is the action of recording
(logging) the keys struck on a keyboard
1.4 Theft
Theft is the act of stealing specifically the felonious taking and
removing of personal property with intent to dispute the rightful owner
of it.
Types of Theft
a. Robbery – the taking another person’s property by the use of
violence, threats, or intimidation
b. Embezzlement – the theft of money, property, or other assets by
a person who is in a position of trust or responsibility over the
assets.
c. Burglary – unlawful entry into any structure for the purpose of
committing a crime (whether or not anything is stolen).
d. Identity theft – the theft and fraudulent use of a person’s
identifying information.
e. Intellectual property theft – theft of material that is copyrighted,
the theft of trade secrets, and trademark violations.
While some viruses can be playful in intent and effect, others can have
profound and damaging effects, such as erasing data or causing
permanent damage to your hard disk, and worst yet, some are even
design with financial gains in mind.
Teleconference
A teleconference is a telephone meeting among two or more
participants involving technology more sophisticated than a simple two-
way phone connection. At its simplest, a teleconference can be an
audio conference with one or both ends of the conference sharing a
speaker phone. With considerably more equipment and special
arrangements, a teleconference can be a conference, called a
videoconference, in which the participants can see still or motion video
images of each other. Because of the high bandwidth of video and the
opportunity for larger and multiple display screens, a videoconference
requires special telecommunication arrangements and a special room
at each end. As equipment and high-bandwidth cabling become more
commonplace, it's possible that videoconferences can be held from
your own computer or even in a mobile setting.
Advantages of Teleconferencing - KC
1. Saves Time – The most important advantage of teleconferencing
is time-saving. With teleconferencing, it is possible to hold
meetings on a very short notice. In addition, there is no time
spent traveling to the venue of a meeting as all meetings are held
through machines or Internet. Reduced mileage translates to
thousands of hours of travel saved every year. Teleconferencing
also encourages punctuality as meetings are scheduled and done
at fixed time frames.
2. Save on Travel Expenses – In addition to time, travel costs can
be quite significant when added up over a long period. Most
companies that have a global reach incur massive costs
associated with the travel ever year. Teleconferencing, however,
removes the need to travel often and thus saves huge company
resources. Attend meeting thousands of miles away is now faster
and less cumbersome.
3. Efficient Record Keeping – One of the main teleconferencing
advantages is efficient meeting recording keeping. Computing
devices are able to record, keep logs and track every detail of a
particular online meeting without needing a lot of monitoring. This
makes teleconferencing facilities among the best tools for
capturing and storing important meeting data. Teleconferencing
also makes it very easy to retrieve this data in the future and
make references whenever necessary.
4. Cut Conference Costs – There are indeed many logistical costs
associated with holding a conference. Hiring equipment, acquiring
a venue, buying food and refreshment are just some of the
normal costs associated with any meeting. Teleconferencing
removes all these costs as no such arrangements need to be
made. The flexibility of teleconferencing also ensures that
meetings are held as often as possible with no extra costs being
incurred.
5. Encourage Productivity – The fifth teleconferencing advantage
is that teleconferencing ensures that workers at various
hierarchies in the company structure are in constant
communication. This translates to effective information-sharing
and prompt actions. Such recurrent engagement is a motivational
factor that results turns out increased productivity.
Teleconferencing also makes multi-branch management easier as
the proximity of every department of a company is optimized.
6. Reliability – Teleconferencing is one of the most reliable ways of
holding meetings. This reliability has increased exponentially over
the years due to advancement in technology. Teleconferencing
channels are today much more stable and communication
challenges are almost non-existent. It is also a very secure mode
of communication where the safety of data as well as privacy is
guaranteed.
Disadvantages of Teleconferencing
1. Prone to Technical Challenges – The main difference between
machines and humans is that machines are prone to wear and
tear. Technical challenges can thus hit teleconferencing systems
at any time. This can lead to time wastage and other
inconveniences. Most technological systems also come with a
learning curve. Lack of know-how can hinder a person from
effective utilization of teleconferencing facilities.
2. Less Effective Nonverbal Communication – When compared
to an actual meeting, teleconferencing is a less effective mode
of business communication. This is because important nonverbal
aspects of business communication like body language and
human contact are disregarded. Nonverbal cues are very crucial
to holistic communication. The lack of such cues makes it
impossible to pick important signals that could lead to a more
productive interaction.
3. Space Limitations – The fact that teleconferencing occurs on a
screen means that a lot of information is disregarded due to
limited space. It is, for instance, nearly impossible to deliver all
graphical data effectively even when holding a live online
meeting. Even with a big screen, simultaneous actions are not
possible in the same way they are at an actual meeting.
Consequently, some information is lost or not effectively
covered.
4. Discourages Team Dynamics – Another teleconferencing
disadvantage is that teleconferencing lacks the dynamism of a
real conference where participants are able to have a shared
engagement and raise or respond to issues instantaneously. This
means that it is often difficult to effectively interject or share
ideas as they arise. The lack of dynamism ultimately leads to few
people taking control of meetings at the expense of other people.
5. Eliminate Informal Interactions – The common pre-meeting
and post-meeting conversations are often very important in
setting the stage for the day's agenda and even future meeting
agendas. Such informal engagements are also where some key
ideas arise concerning important matters like policy and
planning. With the lack of such small talk, teleconferencing can
be seen as a rigid and non-progressive mode of conferencing.
6. Affect Professionalism – The fact that machines are the main
intermediary between the different parties involved in the
meeting, which can affect professionalism. This is because
participants are often forced to multitask. This multitasking can
shift the focus of participants to other issues that are unrelated
and not beneficial to the meeting.
What Is Defamation?
The publication or broadcast of any libelous or slanderous
statement about an individual or business that can be proven to be
false and published with the intention of harming that entity's
reputation is considered to be defamation. Online defamation is the
publication of such statements made on any Internet based media
including blogs, forums, websites, and even social networking websites.
While many Internet users believe that they are free to say and do as
they like while on the Internet, this is untrue and the same defamation
laws and regulations stand for online defamation as they do in any form
of media.
These elements contain nuances that are not all easily proved. Fir
st, not all false statements are fraudulent.
To befraudulent, a false statement must relate to a material fact. It sho
uld also substantially affect a person's decision to
enter into a contract or pursue a certain course of action.
A false statement of fact that does not bear on the disputed
transaction will not be considered fraudulent.
Summary
In this module, Ethical Dilemma/Issues in the Cyberworld “to do this to
the right person, to the right extent, at the right time, with the right
motive, and in the rightway, that is not for everyone nor is it easy:
where goodness is both are and laudable and noble.” Aristole, Ethics
IL9).
Assessment
Direction: Encode/Computerized your answer in word processor or any
apps using pc or android phone and save. Then attach and submit it
online thru [email protected].
1. How does a computer virus attack?
2. How do computer viruses spread?
3. How Unfair Competition Happens?
Performance Tasks
Direction: Encode/Computerized your answer in word processor or any
apps using pc or android phone and save. Then attach and submit it
online thru [email protected]
(a) List three steps an individual should take to avoid identity theft.
(b) List three steps a corporation that maintains your personal data in
its information system should take to safeguard your data.
(c) How can Internet activities contribute to the likelihood of identity
theft? How can this be prevented?
Literature Cited/Bibliography