際際滷

際際滷Share a Scribd company logo
Doing the Right Thing 
Computer Ethics
Computer ethics
Plagiarism 
 Downloading somebody elses works as if it were your 
own. 
 Plagiarism is a serious offense. The more famous you get, 
the more youre at risk. 
 In college writing, its fine to make use of someone elses 
effort as long as you use your own words and give credit. 
 Plagiarizing copyrighted materials is called copyright 
infringement
Privacy & Encryption 
 Privacy  refers to an individuals ability to restrict or 
eliminate the collection, use, and sale of confidential 
personal information. 
 Encryption  refers to a coding or scrambling process by 
which a message is rendered unreadable by anyone except 
the intended recipient. Coded Message
Cipher text 
 Refers to a coded message 
Decode the message below 
V YBIR LBH 
ORYC BRX WRR 
A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
Global Unique Identifiers (GUID) 
 A unique identification number that is generated by a computer 
hardware component or a program.
Privacy at Work. (Things to Remember) 
 Except in the case of an emergency, never use your employers 
telephone system for professional calls. Make all such calls from a 
pay telephone. 
 Never use the e-mail account your employer gives you for 
professional purposes. Get your own account with an Internet 
Service Provider (ISP), and be sure to send and receive all personal 
mail from your home computer. 
 Assume that everything you do while youre at work  whether its 
talking on the phone, using your computer, taking a break, or 
chatting with co-workers is being monitored and recorded.
Protecting your Privacy Online 
To safeguard your privacy on the internet do the following: 
 Browse anonymously by surfing from sites such as The Anonymizer or The-cloak 
 Disable cookies on your Web browser or use cookie management software, such 
as Junkbuster. 
 Use a throw-away e-mail address on a free Web-based service such as 
Hotmail. 
 Tell children not to divulge any personal information to strangers online without 
first asking permision. 
 Dont fill out site registration form unless you see a privacy policy statement 
indicating that the information you supply will not be sold to third parties.
Computer Crime: Tools and Techniques 
 Password guessing 
 Shoulder surfing 
 Packet sniffers 
 Dumpster diving 
 Social Engineering 
 Superuser status
SALAMI SHAVING AND DATA 
 Salami Shaving  a programmer alters a program so 
that it subtracts a very small amount of money from 
each account. 
 Data Diddling- insiders modify data so that its difficult 
or impossible to tell that theyve stolen fund or 
equipment.
COMPUTER VIRUSES 
 Computer Virus - a computer program that can copy itself and 
infect a computer without permission or knowledge of the 
user. 
 File infectors  attached themselves to a program file. 
 Boot sector virus  propagates by means of in infected program, but 
it installs itself at the beginning of a hard drive. 
 Macro Virus  Take advantage of the automatic command 
execution capabilities 
 Executable File- program that can run on a given computer 
Platform. 
 E-mail Attachment-a computer file that is included with an e-mail 
message. 
Plain Text  safe file
MORE ROGUE PROGRAMS 
 Time bombs- also called logic bombs, are designed to sit harmlessly 
on a system until a certain event or set of circumstance causes the 
program to become active. 
 Worm  resembles a computer virus in that it can spread from one 
computer to another. Can propagate over a computer network. 
 Trojan Horse  is disguised as a useful program, but it contains hidden 
instructions to perform a malicious task instead. Sometimes a trojan 
horse is disguised as a game or a utility program that users will find 
appealing.
ATTACKERS 
 Hackers  computer hobbyist who enjoy pushing computer system to 
their limits 
 Crackers  obsessed with gaining entry to highly secure computer 
systems 
 Cyber Gang  bring crackers together by means of the internet and 
physical meetings. 
 Computer virus Author - Makers of Computer Viruses 
 Disgruntled Employees  Kick out employees 
 Fraud Artist - Swindlers & Shills
Cyberstalkers & Sexual Predators 
 Cyberstalking  define as the use of the internet e-mail, and other 
electronic communication media to harass or threaten a person 
repeatedly. 
 Cybersex - a virtual sex encounter in which two or more persons 
connected remotely via a computer network send one another sexually 
explicit messages describing a sexual experience. It is a form of role-playing 
in which the participants pretend they are having actual sexual 
relations
INFORMATION WARFARE 
 IW  the use of information technologies to corrupt or destroy 
an enemys information and industrial infrastructure. 
 Electronic Warfare  The use of electronic device to destroy 
or damage computer system. 
 Network Warfare  hacker-like attacks on the nations 
network infrastructure, including the electronic banking 
system. 
 Structural Sabotage  Attacks on information systems that 
support transportation, finance, energy and 
telecommunication.
Spotlight Ethics 
 Plagiarism  The presentation of Somebody elses work as if 
it were your own. 
 At some colleges, plagiarism can get you thrown out of school on 
the first offense. 
 Copyright Infringement  Plagiarizing copyrighted material.
Ten Commandments for Computer Ethics 
1. Thou shalt not use computer to harm other people. 
2. Thou shalt not interfere with other peoples computer work. 
3. Thou shalt not snoop around in other peoples files. 
4. Thou shalt not use a computer to steal. 
5. Thou shalt not use a computer to bear false witness. 
6. Thou shalt not copy or use propriety software for which you have not paid. 
7. Thou shalt not use other peoples computer resources without authorization or proper 
compensation. 
8. Thou shalt not appropriate other peoples intellectual output. 
9. Thou shalt think about the social consequences of the program you write or the 
system you design. 
10. Thou shalt use a computer in ways that show consideration and respect for your 
fellow Humans.
Summary 
 Respecting yourself 
 Respecting Others 
 Respecting Academic Integrity

More Related Content

Computer ethics

  • 1. Doing the Right Thing Computer Ethics
  • 3. Plagiarism Downloading somebody elses works as if it were your own. Plagiarism is a serious offense. The more famous you get, the more youre at risk. In college writing, its fine to make use of someone elses effort as long as you use your own words and give credit. Plagiarizing copyrighted materials is called copyright infringement
  • 4. Privacy & Encryption Privacy refers to an individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information. Encryption refers to a coding or scrambling process by which a message is rendered unreadable by anyone except the intended recipient. Coded Message
  • 5. Cipher text Refers to a coded message Decode the message below V YBIR LBH ORYC BRX WRR A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
  • 6. Global Unique Identifiers (GUID) A unique identification number that is generated by a computer hardware component or a program.
  • 7. Privacy at Work. (Things to Remember) Except in the case of an emergency, never use your employers telephone system for professional calls. Make all such calls from a pay telephone. Never use the e-mail account your employer gives you for professional purposes. Get your own account with an Internet Service Provider (ISP), and be sure to send and receive all personal mail from your home computer. Assume that everything you do while youre at work whether its talking on the phone, using your computer, taking a break, or chatting with co-workers is being monitored and recorded.
  • 8. Protecting your Privacy Online To safeguard your privacy on the internet do the following: Browse anonymously by surfing from sites such as The Anonymizer or The-cloak Disable cookies on your Web browser or use cookie management software, such as Junkbuster. Use a throw-away e-mail address on a free Web-based service such as Hotmail. Tell children not to divulge any personal information to strangers online without first asking permision. Dont fill out site registration form unless you see a privacy policy statement indicating that the information you supply will not be sold to third parties.
  • 9. Computer Crime: Tools and Techniques Password guessing Shoulder surfing Packet sniffers Dumpster diving Social Engineering Superuser status
  • 10. SALAMI SHAVING AND DATA Salami Shaving a programmer alters a program so that it subtracts a very small amount of money from each account. Data Diddling- insiders modify data so that its difficult or impossible to tell that theyve stolen fund or equipment.
  • 11. COMPUTER VIRUSES Computer Virus - a computer program that can copy itself and infect a computer without permission or knowledge of the user. File infectors attached themselves to a program file. Boot sector virus propagates by means of in infected program, but it installs itself at the beginning of a hard drive. Macro Virus Take advantage of the automatic command execution capabilities Executable File- program that can run on a given computer Platform. E-mail Attachment-a computer file that is included with an e-mail message. Plain Text safe file
  • 12. MORE ROGUE PROGRAMS Time bombs- also called logic bombs, are designed to sit harmlessly on a system until a certain event or set of circumstance causes the program to become active. Worm resembles a computer virus in that it can spread from one computer to another. Can propagate over a computer network. Trojan Horse is disguised as a useful program, but it contains hidden instructions to perform a malicious task instead. Sometimes a trojan horse is disguised as a game or a utility program that users will find appealing.
  • 13. ATTACKERS Hackers computer hobbyist who enjoy pushing computer system to their limits Crackers obsessed with gaining entry to highly secure computer systems Cyber Gang bring crackers together by means of the internet and physical meetings. Computer virus Author - Makers of Computer Viruses Disgruntled Employees Kick out employees Fraud Artist - Swindlers & Shills
  • 14. Cyberstalkers & Sexual Predators Cyberstalking define as the use of the internet e-mail, and other electronic communication media to harass or threaten a person repeatedly. Cybersex - a virtual sex encounter in which two or more persons connected remotely via a computer network send one another sexually explicit messages describing a sexual experience. It is a form of role-playing in which the participants pretend they are having actual sexual relations
  • 15. INFORMATION WARFARE IW the use of information technologies to corrupt or destroy an enemys information and industrial infrastructure. Electronic Warfare The use of electronic device to destroy or damage computer system. Network Warfare hacker-like attacks on the nations network infrastructure, including the electronic banking system. Structural Sabotage Attacks on information systems that support transportation, finance, energy and telecommunication.
  • 16. Spotlight Ethics Plagiarism The presentation of Somebody elses work as if it were your own. At some colleges, plagiarism can get you thrown out of school on the first offense. Copyright Infringement Plagiarizing copyrighted material.
  • 17. Ten Commandments for Computer Ethics 1. Thou shalt not use computer to harm other people. 2. Thou shalt not interfere with other peoples computer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use propriety software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other peoples intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration and respect for your fellow Humans.
  • 18. Summary Respecting yourself Respecting Others Respecting Academic Integrity