This document discusses various topics relating to computer ethics and privacy. It addresses issues like plagiarism, encryption, privacy in the workplace, protecting privacy online, computer crimes and viruses, cyberstalking, and information warfare. It emphasizes the importance of respecting oneself, others, and academic integrity when using computers and the internet.
3. Plagiarism
Downloading somebody elses works as if it were your
own.
Plagiarism is a serious offense. The more famous you get,
the more youre at risk.
In college writing, its fine to make use of someone elses
effort as long as you use your own words and give credit.
Plagiarizing copyrighted materials is called copyright
infringement
4. Privacy & Encryption
Privacy refers to an individuals ability to restrict or
eliminate the collection, use, and sale of confidential
personal information.
Encryption refers to a coding or scrambling process by
which a message is rendered unreadable by anyone except
the intended recipient. Coded Message
5. Cipher text
Refers to a coded message
Decode the message below
V YBIR LBH
ORYC BRX WRR
A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
6. Global Unique Identifiers (GUID)
A unique identification number that is generated by a computer
hardware component or a program.
7. Privacy at Work. (Things to Remember)
Except in the case of an emergency, never use your employers
telephone system for professional calls. Make all such calls from a
pay telephone.
Never use the e-mail account your employer gives you for
professional purposes. Get your own account with an Internet
Service Provider (ISP), and be sure to send and receive all personal
mail from your home computer.
Assume that everything you do while youre at work whether its
talking on the phone, using your computer, taking a break, or
chatting with co-workers is being monitored and recorded.
8. Protecting your Privacy Online
To safeguard your privacy on the internet do the following:
Browse anonymously by surfing from sites such as The Anonymizer or The-cloak
Disable cookies on your Web browser or use cookie management software, such
as Junkbuster.
Use a throw-away e-mail address on a free Web-based service such as
Hotmail.
Tell children not to divulge any personal information to strangers online without
first asking permision.
Dont fill out site registration form unless you see a privacy policy statement
indicating that the information you supply will not be sold to third parties.
9. Computer Crime: Tools and Techniques
Password guessing
Shoulder surfing
Packet sniffers
Dumpster diving
Social Engineering
Superuser status
10. SALAMI SHAVING AND DATA
Salami Shaving a programmer alters a program so
that it subtracts a very small amount of money from
each account.
Data Diddling- insiders modify data so that its difficult
or impossible to tell that theyve stolen fund or
equipment.
11. COMPUTER VIRUSES
Computer Virus - a computer program that can copy itself and
infect a computer without permission or knowledge of the
user.
File infectors attached themselves to a program file.
Boot sector virus propagates by means of in infected program, but
it installs itself at the beginning of a hard drive.
Macro Virus Take advantage of the automatic command
execution capabilities
Executable File- program that can run on a given computer
Platform.
E-mail Attachment-a computer file that is included with an e-mail
message.
Plain Text safe file
12. MORE ROGUE PROGRAMS
Time bombs- also called logic bombs, are designed to sit harmlessly
on a system until a certain event or set of circumstance causes the
program to become active.
Worm resembles a computer virus in that it can spread from one
computer to another. Can propagate over a computer network.
Trojan Horse is disguised as a useful program, but it contains hidden
instructions to perform a malicious task instead. Sometimes a trojan
horse is disguised as a game or a utility program that users will find
appealing.
13. ATTACKERS
Hackers computer hobbyist who enjoy pushing computer system to
their limits
Crackers obsessed with gaining entry to highly secure computer
systems
Cyber Gang bring crackers together by means of the internet and
physical meetings.
Computer virus Author - Makers of Computer Viruses
Disgruntled Employees Kick out employees
Fraud Artist - Swindlers & Shills
14. Cyberstalkers & Sexual Predators
Cyberstalking define as the use of the internet e-mail, and other
electronic communication media to harass or threaten a person
repeatedly.
Cybersex - a virtual sex encounter in which two or more persons
connected remotely via a computer network send one another sexually
explicit messages describing a sexual experience. It is a form of role-playing
in which the participants pretend they are having actual sexual
relations
15. INFORMATION WARFARE
IW the use of information technologies to corrupt or destroy
an enemys information and industrial infrastructure.
Electronic Warfare The use of electronic device to destroy
or damage computer system.
Network Warfare hacker-like attacks on the nations
network infrastructure, including the electronic banking
system.
Structural Sabotage Attacks on information systems that
support transportation, finance, energy and
telecommunication.
16. Spotlight Ethics
Plagiarism The presentation of Somebody elses work as if
it were your own.
At some colleges, plagiarism can get you thrown out of school on
the first offense.
Copyright Infringement Plagiarizing copyrighted material.
17. Ten Commandments for Computer Ethics
1. Thou shalt not use computer to harm other people.
2. Thou shalt not interfere with other peoples computer work.
3. Thou shalt not snoop around in other peoples files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use propriety software for which you have not paid.
7. Thou shalt not use other peoples computer resources without authorization or proper
compensation.
8. Thou shalt not appropriate other peoples intellectual output.
9. Thou shalt think about the social consequences of the program you write or the
system you design.
10. Thou shalt use a computer in ways that show consideration and respect for your
fellow Humans.