0% found this document useful (0 votes)
21 views5 pages

Computer Ethics Review

Uploaded by

carab4 english
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

Computer Ethics Review

Uploaded by

carab4 english
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Lecture (1) Introduction to Computer

Ethics are a structure of standards and practices that influence how people lead their lives.
Computer Ethics are a set of standards that govern the use of computers.
common issues of computer ethics are privacy concerns, intellectual property rights and effects
on society.
Hacking: Is unlawful intrusion in to a computer or a network.
Types of hacking/hackers
1) White Hat
2) Black Hat
3) Gray Hat
4) Script
5) State/Nation Sponsored
6) Hacktivist
Malware, or “malicious software,” is an any malicious program or code that is harmful to systems.
Most Common Forms of Malware
1) Adware is unwanted software designed to throw advertisements up on your screen,
2) Spyware is malware that secretly observes the computer user’s activities without
permission
3) A virus is a program which can harm our device and files and infect them for no further use.
4) A Trojan, or Trojan horse, is one of the most dangerous malware types.
5) Ransomware is a form of malware that locks you out of your device.
6) keylogger is malware that records all the user’s keystrokes on the keyboard.
Data Protection: Also known as information privacy or data privacy is the process of
safeguarding data.
Intellectual property rights are the rights given to the persons over the creations of their minds.
o copyright - is a type of intellectual property that gives its owner the right to copy and
distribute a creative work, usually for a limited time.
o Plagiarism - Is the act of copying and publishing another person’s work without proper
citation.
o Cracking - It’s a way of skipping the registration and authentication steps when installing
software.
Lecturer (2) Philosophical Ethics.
Philosophy the study of the fundamental nature of knowledge, reality.
personal ethics set of ethics refers to an individual’s beliefs and values in any area of life.
professional ethics refers to a person’s values within the workplace.
SEVEN ESSENTIAL COMPONENTS OF A PERSONAL CODE OF COMPUTER ETHICS
1. Honesty.
2. Respect.
3. Confidentiality.
4. Professionalism.
5. Responsibility.
6. Communication.
7. Obeying the law.

Netiquette guidelines that involve showing respect for others and yourself while you are online.

Lecturer (3) Computer and Internet crime


Cybercrime is a crime that involves a computer and a network.
CIA (Confidentiality, Integrity and Availability) a security model that developed to help people.
Most Common Computer and Internet Cyber Crimes
1. Phishing 4. Prostitution 7. Drug Trafficking
2. Harassment 5. Intellectual Property Theft 8. Credit Card Fraud
3. Ransomware 6. Account Hacking
1. Phishing Phishing is when criminals send fake emails pretending to be from legitimate
businesses.
Smishing ➔ Uses MSS.
Vishing ➔ Uses voice mail messeges.
2. Harassment Cyber stalkers use electronic communication, such as email, social media, or
websites to stalk and harass people.
3. Ransomware Cyber criminals can install malicious software on your system that will.
4. Prostitution Many companies will advertise their services in online,
5. Intellectual Property Theft More commonly known as piracy, the Internet full off with
books, music, movies.
6. Account Hacking We all know how important it is to guard our passwords.
7. Drug Trafficking.
8. Credit Card Fraud.

Types of Perpetrators.
1) Hacker
2) Cracker
3) Malicious
4) Hacktivist
5) Spy
6) Cyberterrorist

Lecturer (4) Ethical and Social Issues in Information Systems


code of conduct is a set of rules and responsibilities of an individual party or an organization.
Five moral measurements of the information age:
1) Information rights and obligations
2) Property rights and obligations
3) Accountability and control
4) System quality
5) Quality of life
key elements in ethical action
1) Responsibility
2) Accountability
3) Liability
Three main ways that intellectual property can be protected are:
a) Trademark
b) Patent
c) Copyright

patent is a type of intellectual property that gives it’s owner the legal right to exclude others from
making, using or selling it.

Lecturer (5) Privacy and Confidentiality


Difference between confidentiality and privacy is :
Privacy protects the access to the person while
confidentiality protects the access to the data.

Types of Information
1. Directly information.
2. Indirectly information.
3. Coded information.
4. Anonymous information.
four types of software licenses:
❑ Public Domain
❑ Freeware
❑ Shareware
❑ All Rights

Lecturer (6) Computer Security, Safety, Ethics and Privacy


computer security risk is any event or action that could cause a loss or damage to computer
hardware, software, data,
Cyber torts are also becoming more and appearing in front of courts more often as they were.
Corporate espionage is the practice of using espionage techniques for commercial or financial
purposes.
perpetrator is a person who commits an illegal, criminal, or harmful act.
cyberextortionist is a person or group of people that participate in cyberextortion.
Cyberextortion is a computer crime where the extortionist demands payment, goods, or a service
to stop an attack or recover deleted or encrypted data.
Physical access is a term in computer security that refers to the ability of people to physically gain
access to a computer system.
Standard operating procedures (SOPs) helps an organization to prevent or minimize employee
errors.

Detective controls aim to reduce the impact


Corrective controls is to give a warning signal.
proxy server is a server outside the organization’s network that controls which communications
pass into the organization’s network.
honeypot is a vulnerable computer that is set up to entice or attract an intruder to break into it.

Lecturer (7) Communication and Network


Internet is a global system of computer networks that are available for everyone.
Intranet is a network of computers owned by any organization for a certain group of people.
firewall is a software utility or hardware device that acts as a filter for data entering or data
leaving a network.
Types of Communication
a) Verbal
b) Nonverbal
c) Written
d) Active listening

You might also like