Computer Ethics Review
Computer Ethics Review
Ethics are a structure of standards and practices that influence how people lead their lives.
Computer Ethics are a set of standards that govern the use of computers.
common issues of computer ethics are privacy concerns, intellectual property rights and effects
on society.
Hacking: Is unlawful intrusion in to a computer or a network.
Types of hacking/hackers
1) White Hat
2) Black Hat
3) Gray Hat
4) Script
5) State/Nation Sponsored
6) Hacktivist
Malware, or “malicious software,” is an any malicious program or code that is harmful to systems.
Most Common Forms of Malware
1) Adware is unwanted software designed to throw advertisements up on your screen,
2) Spyware is malware that secretly observes the computer user’s activities without
permission
3) A virus is a program which can harm our device and files and infect them for no further use.
4) A Trojan, or Trojan horse, is one of the most dangerous malware types.
5) Ransomware is a form of malware that locks you out of your device.
6) keylogger is malware that records all the user’s keystrokes on the keyboard.
Data Protection: Also known as information privacy or data privacy is the process of
safeguarding data.
Intellectual property rights are the rights given to the persons over the creations of their minds.
o copyright - is a type of intellectual property that gives its owner the right to copy and
distribute a creative work, usually for a limited time.
o Plagiarism - Is the act of copying and publishing another person’s work without proper
citation.
o Cracking - It’s a way of skipping the registration and authentication steps when installing
software.
Lecturer (2) Philosophical Ethics.
Philosophy the study of the fundamental nature of knowledge, reality.
personal ethics set of ethics refers to an individual’s beliefs and values in any area of life.
professional ethics refers to a person’s values within the workplace.
SEVEN ESSENTIAL COMPONENTS OF A PERSONAL CODE OF COMPUTER ETHICS
1. Honesty.
2. Respect.
3. Confidentiality.
4. Professionalism.
5. Responsibility.
6. Communication.
7. Obeying the law.
Netiquette guidelines that involve showing respect for others and yourself while you are online.
Types of Perpetrators.
1) Hacker
2) Cracker
3) Malicious
4) Hacktivist
5) Spy
6) Cyberterrorist
patent is a type of intellectual property that gives it’s owner the legal right to exclude others from
making, using or selling it.
Types of Information
1. Directly information.
2. Indirectly information.
3. Coded information.
4. Anonymous information.
four types of software licenses:
❑ Public Domain
❑ Freeware
❑ Shareware
❑ All Rights