0% found this document useful (0 votes)
10 views10 pages

Spi Reviewer

The document discusses the concept of ethics, its importance in society and business, and the role of IT professionals. It outlines the principles of ethics, ethical dilemmas, and the significance of a code of ethics in organizations. Additionally, it highlights the attributes and roles of IT specialists, emphasizing the need for ethical behavior in technology and business practices.

Uploaded by

onlyarc7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views10 pages

Spi Reviewer

The document discusses the concept of ethics, its importance in society and business, and the role of IT professionals. It outlines the principles of ethics, ethical dilemmas, and the significance of a code of ethics in organizations. Additionally, it highlights the attributes and roles of IT specialists, emphasizing the need for ethical behavior in technology and business practices.

Uploaded by

onlyarc7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

SPI REVIEWER

LECTURE 1
ETHICS
– comes from word “ethos” which suggests "custom" or "character" in Greek.
– originally employed by Aristotle, referred to man's character/ personality, balance between passion & caution.

 Ethics may be system of ethical principles.


 Ethics influences how people settle an issue & lead their lives.
 Ethics cares about what is good for people & society.
 Ethics covers subsequent problems:
 way to live an honest life
 our rights & responsibilities
 language of right & wrong moral decisions – what is good & what is bad?
 Ethics Centre (2018) explained ethics using 3 words – ‘values’, ‘principles, and ‘purpose’.
1. VALUES – what is good. Things we strive for, desire, & seek to protect.
2. PRINCLES – what is right – outlining how we may/ might not achieve our values.
3. PURPOSE – reason for being. Gives life to our values & principles.
 Ethics is process of questioning, discovering, & defending our values, principles, & purpose.
 Ethics refers to justifiable standards of right & wrong that order what humans have to do, usually in terms of
rights, obligations, welfare to society, equity, or integrity.
 Ethics refers to study & growth of one’s moral standards.

USE OF ETHICS – being complex creation, humans need guide. We are faced with complex & difficult questions regarding
liberty of expression, access to info, proper privacy, property rights, & cultural diversity. Likewise, we are faced with
different ethical dilemmas such as:

 how to live good life,


 our rights & responsibilities,
 language of right & wrong
 moral decisions - what is good & bad?
1. Ethics can provide moral map.
2. Ethics can pinpoint disagreement.
3. Ethics doesn’t always show proper answer to moral problems.
4. Ethics can give several answers.

IMPORTANCE OF ETHICS
– Because they permit society to still function, helping people to interact & functionally live their daily lives. They will
govern an individual's code of behavior & stop moral wrongs from occurring. Keep people from doing what is wrong.
– If a person has no ethics, he will do anything for as long as he believes it will benefit him & he can get away with it.
Ethics are different from laws & different from doing proper thing as result of fear of consequences.
Ethics is vital due to the following:

1. Satisfying Basic Human Needs.


2. Creating Credibility.
3. Uniting People & Leadership.
4. Improving Decision Making.
5. Long Term Gains.
6. Securing Society.

BASIC PRINCIPLES OF ETHICS


– When we are talking about being ethical person, have you ever asked yourself the following questions?

 Do you care about others/ are you selfish individual?


 Do you take responsibility for consequences of your actions/ do you blame others for what happens to you?
 Do you love others unconditionally/ do you expect something from them in return?
 You may ask yourself these questions to measure whether you are ethical person. Ethical people follow basic
principles of right & wrong.
1. The Rights of Others.
2. The Consequences of Our Actions.
3. Be Accountable for Your Actions.
4. Truthfulness, alongside integrity.

4 ETHICAL “isms”
– Hare (1993) [Essays in Ethical Theory]. Question that only philosopher would ask, really useful way of getting
transparent idea of what is happening when people talk about moral issues.
– Different 'isms' regard person uttering statement as doing various things. Can show several things that can be done
when you say “murder is bad” by rewriting statement to point out actual meaning:

1. Moral realism: about an ethical fact - "It’s wrong to murder."


2. Subjectivism: about your very own feelings - "I disapprove of murder."
3. Emotivism: expressing your feelings - "Down with murder!"
4. Prescriptivism: giving order/ command - "Don't murder people".

BRANCHES OF ETHICS

1. Metaethics – deals with whether/ not morality exists. Focuses on description & origin of ethical principles.
2. Normative Ethics – branch of moral philosophy/ ethics, concerned with criteria of what is morally right & wrong.
3. Applied Ethics – application of ethics to real-world problems. Practical ethics attempts to answer question of
how people should act in specific situations.

LECTURE 2
ETHICS IN THE BUSINESS WORLD
Business Ethics
– Ethics in business simply appliance of everyday moral/ ethical norms in business.
– Business Ethics is study of appropriate business policies & practices regarding potentially controversial subjects–
corporate governance, trading, bribery, discrimination, corporate social & fiduciary responsibilities (Twin, 2020).

WHAT QUALIFIES AS ETHICS?

1. Fraud & manipulation – obvious, but ethical companies don’t engage in shady/ manipulative financial practices,
like fraud, bribery/ trading.
2. Sustainability – refers to practices that continued indefinitely, usually about environment.
3. Diversity & inclusion – efforts also seen as responsible, ethical business practices. Including programs to employ
people from more diverse backgrounds, different ethnicities, sexes, & abilities.
4. Exploitation – big companies can make substantial gains by utilizing local populations, especially in developing
countries/ utilizing inadequacy of businesses. May yield business short-term benefit, they are heavily frowned
upon by public & seen as unethical.
5. Donations and contributions – business’s donations & volunteer contributions to charitable orgs, local groups, &
good causes, considered ethical &/or benevolent practices.
It’s important that company pays attention to, & potentially invests in following areas:
 The Age of Information
 The Millennial Factor
 Increased Competition
 The Bottom Line

PURPOSE OF CODE OF ETHICS IN AN ORGANIZATION


– Determining ethical/ unethical is debatable in any org. Code of ethics defines what ethical within an org &, may limit
debate about ethical dilemmas. Define acceptable standards of practice for those in org.

1. Function – designed to function as expected norms of practice within an org. Code provides clearly defined
expectations for members of org.
2. Communication – communicates your company's norms & policy in clearly defined fashion.
3. Integrity – according to Institute for Business, purpose is "to consolidate & strengthen culture of integrity &
openness, facilitate long-term business". With this, business becomes more reputable & profitable.
4. Reputation – builds your reputation within your field. When potential clients know that employees adhere to
code of ethics, they know that employees attain certain amount of value in their work.
5. Risk – when employees adhere to company's code of ethics, minimize operational & integrity risks in workplace.
Risk minimized; productivity increases & creates higher profit margin (“Value of Ethics Related To Business”).

IMPORTANCE OF FOSTERING GOOD ETHICS

1. To protect org & its employees from action.


2. To create an org that operates consistently.
3. To produce good services.
4. To avoid unfavorable publicity.
5. To gain goodwill of community.

COMMON WORKPLACE ETHICS VIOLATIONS

1. Theft – taking home office supplies/ grabbing stack of paper plates from break room when customer steals from
her employer, is costing company money.
2. Deception – Lying to clients, co-workers & supervisors is another common ethics violation.
3. Harassment – comes in variety of behaviors but is based on race, sex, age, religion, origin, & disability.
4. Internet Usage – advent of Internet came new type of workplace ethics violation. Companies have strict rules &
guidelines regarding Internet usage, & violating these policies can result in disciplinary actions, & firing.

IMPROVING CORPORATE ETHICS

1. Appointment of corporate ethics officer – is senior-level manager responsible for improving ethical behavior of
members of org.
2. Ethical Standards are set by board of directors – much more involved in creation of ethical standards. Shows
that increased level of importance is placed on ethical standards.
3. Establish corporate code of conduct.
 guide that highlights an org’s key ethical issues & identifies overarching values & principles that important to
org & help in decision making.
 set of formal, written statements about purpose of org, values, & principles that guide employees’ actions.
 ensures employees abide by law, follow necessary regulations, & behave ethically.
4. Conduct social audits – identify ethical lapses committed in past & take actions to avoid similar mistakes in
future.
5. Require employees to take ethics training – existence of formal training programs also reduce company’s
liability in event of legal action.
6. Include ethical criteria in employee appraisal/reward systems – employees are increasingly being evaluated on
demonstration of qualities & characteristics stated within corporate code of conduct.

ETHICS IN INFORMATION TECHNOLOGY


– IT ethics is study of moral issues arising from utilization & development of electronic technologies. Goal is to spot &
formulate answers to questions about moral basis of individual responsibilities & actions & moral underpinnings of
public policy.

SOURCES OF ETHICAL GUIDANCE FOR IT PROFESSIONALS


– several resources help IT profs who check out ethical guidance within scope of their job duties. Ex., IEEE features code
of ethics for its members; Association of Data Technology Professionals (AITP) features code of ethics & standards of
conduct, & SANS has published IT code of ethics.

IT ETHICS:

 Integrity
 Competence
 Professional responsibilities
 Work responsibilities
 Societal responsibilities

LEGAL & ETHICAL ISSUES IN IT:

1. Privacy – people have their private info spread throughout digital media. Even things thought to be secure, like
email/ personal accs, often accessed by unintended sources.
2. Digital Ownership – digital media platforms have permitted info to move more freely. Exchange ideas come with
legal & ethical backlash.
3. Data Gathering – everyone knows that their online lives are monitored. US has even passed legislation allowing
government to actively monitor private citizens in name of national security.
4. Security Liability – security issues were resolved by locking door. Digital security is much more complicated.
Security systems for digital networks are computerized in order to safeguard important info & major assets.
5. Access Costs – net neutrality become classy issue b’cuz of legislative efforts over previous couple of years. Issue
of net neutrality is essentially question of access.

DIFFERENT APPROACH SOLVING ETHICAL DILEMMAS

1. Moral-right approach – certain liberties & rights that every human has in their lives that can’t be violated by
some other individual's decision.
2. Justice Approach – idea that all equals should be treated equally.

POTENTIAL CAUSES OF UNETHICAL BEHAVIOR


– caused by different reasons. Ex., if there is conflict between self-interest & ethics, person may prioritize personal
interest. Existence of doubts about what is ethical & what is not may also result in following unethical path.

ETHICAL ISSUES FACED BY BUSINESS LEADERS


– expected to lead by ex. by fulfilling all their responsibilities including ethical. Level of expectation from leaders can itself
be termed an issue as may not be able to follow ethical standards always not send positive message down ranks.
LECTURE 3
IT PROFESSIONAL
– Merriam-Webster, professional means “employment that needs educ, training/ skill”, IT PROF is “characterized by/
conforming to technological/ ethical standards of career/ profession.”
– Wisegeek explained IT PROFS are people who maintain, build/ repair hardware & software associated with computer
systems/ components related to info processing. This job often difficult & can require big level of skill & knowledge, but
university degree isn’t always necessary.”

IT SPECIALIST
– Are what every org can never have enough of. IT SPECS cater to technical needs of companies.
– Defined as tech prof that’s liable for implementation, monitoring, & maintenance of IT system. It’s job descriptions
include specialization in network analysis, system administration, security, & knowledge assurance, IT audits, database &
web admin.
– Can add various areas of data tech. They add assistance desk to redress issues that end users face.
IT SPEC following roles:

• SOFTTWARE ENGINEER
• SOFTWARE DEVELOPERS
• DATABASE ADMINISTRATORS
• SYSTEM ANALYSTS
• COMPUTER SECURITY TECHNICIANS
• NETWORK ANALYSTS

ATTRIBUTES OF SUCCESSFUL IT PROFESSIONALS


– Core skills in IT like programming, app dev, proj management are in highest demand followed by mix of specific
technical skills (business intelligence & analytics, cloud computing, security, & virtualization.)

1. Business-focused – IT dept aren’t supposed to focus on IT. Not about tech but tech allows business to do. IT dept
is enable/ drive business strategy (cash-conscious time & corporations) gets to make sure that investment of
their time & resources generates performance for cost.
2. Strategic – IT is playing much larger role in handling strategic transformation in today’s enterprise. By far cry
from days where IT was seen as enabling business operations, now IT can be source of new services & products.
3. Pragmatic – business reality demands pragmatic thinkers who can weigh up sometimes conflicting demands &
look at what they can achieve given time, money & resource constraints involved.
4. Persuasive – ability to persuade people to influence outcomes is critical skill that IT PROFS need to master. Able
to communicate effectively about the pros & cons of one approach vs. another & helping others to see your pov.

TRAITS NECESSARY FOR BECOMING SUCCESSTFUL IT PROFS

1. Patience is one of key traits – IT PROF world if vast in nature, their tools require constant research, trial, & error
efforts to succeed in specific solution. One needs to be patient with people & equipment he works with.
2. He should be having good communication skills – comprehensible, simple, & crisp while communicating with
different types of audiences.
3. There are constant changes & new dev within IT professional definition field – quick to adapt & have desire to
learn new technologies, software, & programs. Should be up to date.
4. An IT PROF should be able to handle multiple tasks simultaneously – ex. He is repairing computer, have to take
care both hardware & software probs. At the same time, might need to learn about new ver of software/ device
to efficiently solve prob.
5. One should have the quality of problem-solving – in fields of networking, software, & program dev, he may face
probs that he has not dealt before. He has to apply problem-solving principles & techniques along with technical
knowledge he has acquired through experience & research.
6. Important traits that should possess is that tech prof should be passionate about his work – should enjoy his
work, ready to learn more about the field, & should be able to put his knowledge into practice.

IT ROLES OF AN IT SPECIALIST

1. Help Desk – unfortunate facts hardware & software programs don’t always work the way they are supposed to.
Most of us don’t have the technological to know how to find problem & fix. As result, someone places to call IT
SPEC who is usually avail 24/7.
• Computer Support Specialists – give advice & help anyone who uses computer in an org.
• IT Support Technicians – have skills to set up & install computer equipment & make most repairs.
2. Network Administration – IT SPEC have responsibility to support the day-today operations of network. Making
sure that network system keeps communications & info flowing smoothly.
• IT Technicians – select required computer hardware & software for specific apps & supervise installation.
• Network Administrators – design systems to operate at least cost & increase productivity. Confirm employees’
workstations are working properly while orgs’ servers & any mobile equipment are functioning correctly.
3. Security – world is full of people with criminal intentions, internet is fertile field for their unlawful acts. Number
of threats from hackers is constantly increasing & becoming more sophisticated. IT SPEC plays an important role
in designing software to stop cyber-attacks.
• Cyberattacks – can be costly. Hackers can steal personal identities & use info to open credit cards, apply for
bank loans & transfer home mortgages to their names & take ownership of your house.
• Information Security Technicians – design software (encryption programs & firewalls) to protect an org’s
computer systems & networks. Continuously check org’s networks to detect security breaches & investigate
when attack occurs.
4. Database Analysis – IT SPECS use special software to organize, manage & store data. Including info like financial
data, shipping records, purchase orders, payroll records, & administrative expenses. Database admin make this
info avail to users in org & set up security procedures that prevent unauthorized access.
5. Cloud Computing – moving data storage to cloud involves more than buying few MB of online capacity. Not
simple as swapping an inhouse computer for an outside source. Transitioning to use cloud requires analysis of
needs of an org, then plotting & planning installation.
6. IT specialist In Cloud Computing – computer systems don’t have software programs stored on hard drives at
physical site, will be accessed through cloud facility. Eliminates necessity for high-capacity hard disk storage.
7. Software Developers – software programs run everything you do on computer, & this job had to write code for
that program.
8. Software Engineers – after software dev write code and create program, programmer tests & installs systems.
Use their knowledge of hardware & software codes to implement programs & make them easy to use for non-IT
employees.
9. Business Intelligence Analysts – takes data that business has stored on computer/ cloud & converts into charts &
tables. Business-oriented specialists must know SQL prog & able to work with software devs to create data
mining algo.

MOST POPULAR CERTIFICATIONS OF AN IT SPECIALIST


1. CCNA (Cisco Certified Network Associate) – shows employers that you can install, configure & operate enterprise-
level routers & switches. CCNA technicians can detect & solve common probs with networks.
2. Comp TIA A+ Technician – demonstrates competence as entry-level IT technician. Validates entry-level skills in today's
essential IT domains (computer repair, software & OS, network admin, info security, cloud computing, & troubleshooting
of desktops & mobile devices.
3. Network + Technician – design, manage, & maintain wireless & wired networks. Usually work as help desk support.
4. Systems Security Professional – CISSP is recognized worldwide b’cuz best credential for IT SPEC to possess is ability to
style & maintain security programs.
5. MCSE (Microsoft Certified Systems Engineer) – individual has skills to analyze situation & create innovative solutions
by merging multiple technologies. Focus on server infrastructures, could computing, data platforms, business
intelligence, & communications.

OVERVIEW OF CODE OF ETHICS & PROFESSIONAL CONDUCT – includes general summary of how employees should
behave. Enlighten us how to handle harassment, safety, & conflicts of interest.

1. Be Inclusive – appreciate & support people from all walks of life & identities regardless of their sexual
orientation, age, size, family stats, belief, religion, & mental ability.
2. Be Considerate – all depend upon one another to perform best work we need to accomplish as corporation.
3. Be Respectful – not agree all the time, but disagreement is no excuse for disrespectful behavior.
4. Choose Your Words Carefully – conduct yourself professionally. Be kind to others. Don’t insult/ put down others.
Harassment & exclusionary behavior aren’t acceptable:
• threats of violence
• insubordination
• discriminatory jokes & language
• personal insults, especially those using racist/ sexist terms
• unwelcome sexual attention
• supporting for/ encouraging, any of the behavior above.
5. Do not harass – if someone asks to prevent doing something, then stop. When we disagree, try to understand
why. Differences of opinion & disagreement are mostly unavoidable.
6. Make differences into strengths – find strength in diversity. People have different perspectives on issues, often
valuable for solving probs/ generating new ideas.

LECTURE 4

CYBERCRIME – denotes criminal act where computer/ network is the source, tool, target/ crime place.
– people commit this for various reasons (curiosity, fame seeking, personal reasons like stalking/ emotional
harassment, & politics acts like protests, espionage/ cyber warfare.)

COMMON CYBERCRIMES:

1. HACKING – testing & exploring computer systems, highly skilled comprog/ practice accessing & altering other
people’s computer.

2. MALICIOUS SOFTWARE (Malware) – enables unauthorized access to network for different/ combination of
purposes like theft, sabotage/ spying.

DIFFERENT TYPES OF MALWARES:


– 2.1. Ransomware – software that uses encryption to disable target’s access to its data until ransom is paid.
– 2.2. Fileless Malware – doesn’t install anything; it changes files that are native to OS. Like PowerShell/ WMI. Is
not trapped by anti-virus software b’cuz OS recognizes edited files as legit. Are stealthy; up to 10x more
successful than traditional mal attacks.
– 2.3. Spyware – gathers info about users’ acts w/out consent.
– 2.4. Adware – tracks user’s surfing act. Similar to spyware, but doesn’t install any software on computer/
capture keystrokes.
– 2.5. Trojan – disguises itself as desirable code/ software.
– 2.6. Worms – install themselves into network’s target vulnerabilities in OS.
– 2.7. Virus – code that inserts itself into app & executes when app runs. In network, this may be used to steal
data, launch DDoS/ conduct ransomware.
– 2.8. Rootkits – software that provides malicious actors remote of victim’s pc with full administrative privileges.
– 2.9. Keyloggers – type of spyware that monitors user act. Have legit uses. Business can use them to monitor
employee’s acts, & parents to child’s online behaviors. Used for malicious purposes–stealing pass & other info.
– 2. 10. Bots/Botnets – software app that performs automated tasks on command. Used for real purposes like
indexing search engines. Used for malicious purposes–taking the form of self-propagating malware that can
connect back to central server.
– 2.11. Mobile Malware – attacks targeting mobile devices have risen 50% since 2018. Are as many as those
targeting desktops & include Trojans, ransomware, ads click fraud, etc.

3. PIRACY – internet piracy includes downloading & distribution of copyrighted media w/out paying for it. When
they download/ copy content like music, books, games, & other digital media, may infringing on copyright laws.

4. SPAM – unsolicited e-mails/ electronic equivalent of ‘junk mail’. Often spread in large amounts by sending out
generic e-mails to large lists of email addresses.

5. PISHING – criminally fraudulent way of acquiring sensitive info like usernames, passwords, & credit card details
by masquerading as trustworthy entity in electronic communication.

6. IDENTITY THEFT & FRAUD – uses keystrokes loggers, spyware, & phishing webs. Cybercriminals obtain wide
range of personal details. Details may use to commit ‘identity fraud’. Illegal accessing victim’s bank/ credit card
acc, take out loans under victim’s name, sell online to other cybercriminals/ use it to fabricate fake official docs.

7. CYBER PORNOGRAPHY – act of using cyberspace to create, display, import, distribute/ publish obscene materials
that illustrate children engaged in sexual acts with adults. Is criminal offense, causes harm to people.

8. COPYRIGHT INFRINGEMENT – unauthorized use of works under copyright is copyright infringement (includes
infringing copyright owner’s rights like right to duplicate/ perform their work/ to do derivative works).

9. DENIAL-OF-SEVICE (DoS) – attacker tries to stop legit users from accessing info/ services. Is done by accessing
your computer & its network connection. Attacker may prevent you from accessing e-mail, websites, online accs/
other services that depend on affected computer.

IT SECURITY ISSUES:

 PRIVACY ON CYBERSPACE – info systems made many successful businesses like Google, Fb, eBay, etc. wouldn’t
exist w/out info tech. Improper use of info tech can create problems for org & employees. One of legal issues
arising in cyberspace is PRIVACY. In real world, privacy is essential to individuals, corporations, & governments.

ONLINE COMMUNICATIONS – refers to how people communicate with each other thought network & internet.
OC types are instant ms, e-mails, online forum, filling out online forms, posting comments on socmed/ blogs,
social networking/ online conferencing (video & audio.))

EXPECTATION OF PRIVACY IN CERBERSPACE – according to Privacy & Cyber-Risk, privacy level that you can
expect will depend on nature of act. There are virtually no acts/ services online that guarantee absolute privacy.
1. “Public” activities
2. “Semi-private” activities
3. “Private” activities

 ONLINE TRACKING & MONITORING:


1. Online Services can track & record my online act.
2. Online Services access info store on my computer w/out my knowledge.
3. Hackers can get into my computer. When using broadband “always-on” service, computer user is most
susceptible to attacks by hackers.
4. Web/ Internet Bugs – could be graphic associate that appears on internet site/ can be in form of an
“enhanced” e-mail ms that permits 3rd party to watch who’s reading page/ ms.
5. Encryption – technique of scrambling e-mail ms/ file so that it’s meaningless to anyone who doesn’t know
how to unscramble its termed encryption.
6. PGP (Pretty Good Privacy) – and different encryption programs will protect user’s privacy by encrypting
info; solely supposed recipient will access it & know it.
7. Netiquette – set of social agreements that facilitate interaction over networks. Includes correct manners for
sending that provide rules of conduct in social things. Aims to assist, construct, & maintain pleasing,
comfortable, & economic atmosphere for OC; & avoid inserting strain on system & generating conflict users.

CYBERCRIME PREVENTIONS

7 CYBERSPACE PROTECTIONS:

1. The Basics:
• If In Doubt, Thow It Out – malware & phishing are becoming subtler. Don’t attempt to open e-mails that
look suspicious/ uncommon, particularly related to your e-mail, socmed, money service/ utility accs.
• Stay Updated – turn on automatic updates. Keep your computer’s OS & security software up to date.
• Think Before You Act – be cautious & open-eyed if an offer demands you to act in real-time, sounds too
smart to be true/ askas for personal info.

2. Privacy Settings – updating privacy settings on webs & services, particularly on socmed & search sites like Fb,
Google, & Yahoo is the best wat to begin protecting urself.

3. Blocking Cookies – good way to maintain anonymity while online is by Blocking 3rd-party cookies. Makes it
harder for webs to track last time you visited, username you use, & whether/ not you should be signed in.
Can be less convenient, increase in privacy is worth compromise.

4. Unlinking Accounts – some webs are now giving option to link accs, many webs option is to use your Google
login to access their site. Linking accs provide lot of risks. If each of your acc is compromised, all linked accs
will be in danger. Unlinking accs may be great way for safeguard data.

5. Secure Connections, Firewalls, & Antivirus Services – always use secure wireless connection. Time to create
new pass if you don’t have strong pass on your Wi-Fi. Firewall is also important to use in protecting
computer from unwanted network traffic. Important to have some kind of anti-virus/ spyware to your
computer clean & free of viruses.

6. Stronger Passwords – having different & stronger pass combi is critically necessary.
7. Better Browsing – internet/ web user must delete cookies often. User must have been compelled to log out
socmed like Fb & Google accs when not using them & don’t keep them open in tabs on web browser.

CYBERCRIME & CYBERCRIME LAW IN PH – September 12, 2012, the Cybercrime Prevention Act of 2012 (R.A. 10175) was
signed into law by President Benigno S. Aquino III. Original goal of this was to penalize acts (cybersex, child pornography,
identity theft, & unsolicited electronic communication in PH.

You might also like