際際滷

際際滷Share a Scribd company logo
Doing the Right Thing 
Computer Ethics
Computer ethics
Plagiarism 
 Downloading somebody elses works as if it were your 
own. 
 Plagiarism is a serious offense. The more famous you get, 
the more youre at risk. 
 In college writing, its fine to make use of someone elses 
effort as long as you use your own words and give credit. 
 Plagiarizing copyrighted materials is called copyright 
infringement
Privacy & Encryption 
 Privacy  refers to an individuals ability to restrict or 
eliminate the collection, use, and sale of confidential 
personal information. 
 Encryption  refers to a coding or scrambling process by 
which a message is rendered unreadable by anyone except 
the intended recipient. Coded Message
Cipher text 
 Refers to a coded message 
Decode the message below 
V YBIR LBH 
ORYC BRX WRR 
A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
Global Unique Identifiers (GUID) 
 A unique identification number that is generated by a computer 
hardware component or a program.
Privacy at Work. (Things to Remember) 
 Except in the case of an emergency, never use your employers 
telephone system for professional calls. Make all such calls from a 
pay telephone. 
 Never use the e-mail account your employer gives you for 
professional purposes. Get your own account with an Internet 
Service Provider (ISP), and be sure to send and receive all personal 
mail from your home computer. 
 Assume that everything you do while youre at work  whether its 
talking on the phone, using your computer, taking a break, or 
chatting with co-workers is being monitored and recorded.
Protecting your Privacy Online 
To safeguard your privacy on the internet do the following: 
 Browse anonymously by surfing from sites such as The Anonymizer or The-cloak 
 Disable cookies on your Web browser or use cookie management software, such 
as Junkbuster. 
 Use a throw-away e-mail address on a free Web-based service such as 
Hotmail. 
 Tell children not to divulge any personal information to strangers online without 
first asking permision. 
 Dont fill out site registration form unless you see a privacy policy statement 
indicating that the information you supply will not be sold to third parties.
Computer Crime: Tools and Techniques 
 Password guessing 
 Shoulder surfing 
 Packet sniffers 
 Dumpster diving 
 Social Engineering 
 Superuser status
SALAMI SHAVING AND DATA 
 Salami Shaving  a programmer alters a program so 
that it subtracts a very small amount of money from 
each account. 
 Data Diddling- insiders modify data so that its difficult 
or impossible to tell that theyve stolen fund or 
equipment.
COMPUTER VIRUSES 
 Computer Virus - a computer program that can copy itself and 
infect a computer without permission or knowledge of the 
user. 
 File infectors  attached themselves to a program file. 
 Boot sector virus  propagates by means of in infected program, but 
it installs itself at the beginning of a hard drive. 
 Macro Virus  Take advantage of the automatic command 
execution capabilities 
 Executable File- program that can run on a given computer 
Platform. 
 E-mail Attachment-a computer file that is included with an e-mail 
message. 
Plain Text  safe file
MORE ROGUE PROGRAMS 
 Time bombs- also called logic bombs, are designed to sit harmlessly 
on a system until a certain event or set of circumstance causes the 
program to become active. 
 Worm  resembles a computer virus in that it can spread from one 
computer to another. Can propagate over a computer network. 
 Trojan Horse  is disguised as a useful program, but it contains hidden 
instructions to perform a malicious task instead. Sometimes a trojan 
horse is disguised as a game or a utility program that users will find 
appealing.
ATTACKERS 
 Hackers  computer hobbyist who enjoy pushing computer system to 
their limits 
 Crackers  obsessed with gaining entry to highly secure computer 
systems 
 Cyber Gang  bring crackers together by means of the internet and 
physical meetings. 
 Computer virus Author - Makers of Computer Viruses 
 Disgruntled Employees  Kick out employees 
 Fraud Artist - Swindlers & Shills
Cyberstalkers & Sexual Predators 
 Cyberstalking  define as the use of the internet e-mail, and other 
electronic communication media to harass or threaten a person 
repeatedly. 
 Cybersex - a virtual sex encounter in which two or more persons 
connected remotely via a computer network send one another sexually 
explicit messages describing a sexual experience. It is a form of role-playing 
in which the participants pretend they are having actual sexual 
relations
INFORMATION WARFARE 
 IW  the use of information technologies to corrupt or destroy 
an enemys information and industrial infrastructure. 
 Electronic Warfare  The use of electronic device to destroy 
or damage computer system. 
 Network Warfare  hacker-like attacks on the nations 
network infrastructure, including the electronic banking 
system. 
 Structural Sabotage  Attacks on information systems that 
support transportation, finance, energy and 
telecommunication.
Spotlight Ethics 
 Plagiarism  The presentation of Somebody elses work as if 
it were your own. 
 At some colleges, plagiarism can get you thrown out of school on 
the first offense. 
 Copyright Infringement  Plagiarizing copyrighted material.
Ten Commandments for Computer Ethics 
1. Thou shalt not use computer to harm other people. 
2. Thou shalt not interfere with other peoples computer work. 
3. Thou shalt not snoop around in other peoples files. 
4. Thou shalt not use a computer to steal. 
5. Thou shalt not use a computer to bear false witness. 
6. Thou shalt not copy or use propriety software for which you have not paid. 
7. Thou shalt not use other peoples computer resources without authorization or proper 
compensation. 
8. Thou shalt not appropriate other peoples intellectual output. 
9. Thou shalt think about the social consequences of the program you write or the 
system you design. 
10. Thou shalt use a computer in ways that show consideration and respect for your 
fellow Humans.
Summary 
 Respecting yourself 
 Respecting Others 
 Respecting Academic Integrity

More Related Content

What's hot (20)

Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
jvonschilling
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
Computer ethics
Computer ethics Computer ethics
Computer ethics
Aglaia Connect
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
nurulafifa_matsaleh
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
RanaAbuHuraira
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
RJ Khan
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
SJBennett228
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
Middle East International School
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Muhammad Irfan
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
Data security
Data securityData security
Data security
Tapan Khilar
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
jvonschilling
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
RJ Khan
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
SJBennett228
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool

Similar to Computer ethics (20)

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
Cyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackersCyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackers
3aitestdata
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Animesh Shaw
Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
Computer Security
Computer SecurityComputer Security
Computer Security
Greater Noida Institute Of Technology
Security for database administrator to enhance security
Security for database administrator to enhance securitySecurity for database administrator to enhance security
Security for database administrator to enhance security
ssuser20fcbe
Ch 1 intro to cyber crime and cyber security.pdf
Ch 1 intro to cyber crime and cyber security.pdfCh 1 intro to cyber crime and cyber security.pdf
Ch 1 intro to cyber crime and cyber security.pdf
jpsarwade
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
Ankit Malviya
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
Cyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackersCyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackers
3aitestdata
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
Security for database administrator to enhance security
Security for database administrator to enhance securitySecurity for database administrator to enhance security
Security for database administrator to enhance security
ssuser20fcbe
Ch 1 intro to cyber crime and cyber security.pdf
Ch 1 intro to cyber crime and cyber security.pdfCh 1 intro to cyber crime and cyber security.pdf
Ch 1 intro to cyber crime and cyber security.pdf
jpsarwade
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN

Recently uploaded (20)

teacher activies un classroom and students
teacher activies un classroom and studentsteacher activies un classroom and students
teacher activies un classroom and students
prabowoedy1
ASP.NET Interview Questions PDF By ScholarHat
ASP.NET  Interview Questions PDF By ScholarHatASP.NET  Interview Questions PDF By ScholarHat
ASP.NET Interview Questions PDF By ScholarHat
Scholarhat
Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18
Celine George
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptxCRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
PoojaSen20
Helping Autistic Girls Shine Webinar 際際滷s
Helping Autistic Girls Shine Webinar 際際滷sHelping Autistic Girls Shine Webinar 際際滷s
Helping Autistic Girls Shine Webinar 際際滷s
Pooky Knightsmith
Mastering Soft Tissue Therapy & Sports Taping
Mastering Soft Tissue Therapy & Sports TapingMastering Soft Tissue Therapy & Sports Taping
Mastering Soft Tissue Therapy & Sports Taping
Kusal Goonewardena
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
Meeting the needs of modern students?, Selina McCoy
Meeting the needs of modern students?, Selina McCoyMeeting the needs of modern students?, Selina McCoy
Meeting the needs of modern students?, Selina McCoy
Economic and Social Research Institute
PUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health HistoryPUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health History
Jonathan Hallett
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
Prof. (Dr.) Vinod Kumar Kanvaria
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷sOne Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
Celine George
Azure Administrator Interview Questions By ScholarHat
Azure Administrator Interview Questions By ScholarHatAzure Administrator Interview Questions By ScholarHat
Azure Administrator Interview Questions By ScholarHat
Scholarhat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHatFull-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Scholarhat
Inventory Reporting in Odoo 17 - Odoo 17 Inventory App
Inventory Reporting in Odoo 17 -  Odoo 17 Inventory AppInventory Reporting in Odoo 17 -  Odoo 17 Inventory App
Inventory Reporting in Odoo 17 - Odoo 17 Inventory App
Celine George
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdfBlind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Ajaz Hussain
Admission Procedure and types in hospital pptx
Admission Procedure  and types in hospital pptxAdmission Procedure  and types in hospital pptx
Admission Procedure and types in hospital pptx
PoojaSen20
Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940
P.N.DESHMUKH
Odoo 18 Accounting Access Rights - Odoo 18 際際滷s
Odoo 18 Accounting Access Rights - Odoo 18 際際滷sOdoo 18 Accounting Access Rights - Odoo 18 際際滷s
Odoo 18 Accounting Access Rights - Odoo 18 際際滷s
Celine George
Oral exam Kenneth Bech - What is the meaning of strategic fit?
Oral exam Kenneth Bech - What is the meaning of strategic fit?Oral exam Kenneth Bech - What is the meaning of strategic fit?
Oral exam Kenneth Bech - What is the meaning of strategic fit?
MIPLM
Functional Muscle Testing of Facial Muscles.pdf
Functional Muscle Testing of Facial Muscles.pdfFunctional Muscle Testing of Facial Muscles.pdf
Functional Muscle Testing of Facial Muscles.pdf
SamarHosni3
teacher activies un classroom and students
teacher activies un classroom and studentsteacher activies un classroom and students
teacher activies un classroom and students
prabowoedy1
ASP.NET Interview Questions PDF By ScholarHat
ASP.NET  Interview Questions PDF By ScholarHatASP.NET  Interview Questions PDF By ScholarHat
ASP.NET Interview Questions PDF By ScholarHat
Scholarhat
Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18Effective Product Variant Management in Odoo 18
Effective Product Variant Management in Odoo 18
Celine George
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptxCRITICAL THINKING AND NURSING JUDGEMENT.pptx
CRITICAL THINKING AND NURSING JUDGEMENT.pptx
PoojaSen20
Helping Autistic Girls Shine Webinar 際際滷s
Helping Autistic Girls Shine Webinar 際際滷sHelping Autistic Girls Shine Webinar 際際滷s
Helping Autistic Girls Shine Webinar 際際滷s
Pooky Knightsmith
Mastering Soft Tissue Therapy & Sports Taping
Mastering Soft Tissue Therapy & Sports TapingMastering Soft Tissue Therapy & Sports Taping
Mastering Soft Tissue Therapy & Sports Taping
Kusal Goonewardena
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
PUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health HistoryPUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health History
Jonathan Hallett
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
AI and Academic Writing, Short Term Course in Academic Writing and Publicatio...
Prof. (Dr.) Vinod Kumar Kanvaria
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷sOne Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷s
Celine George
Azure Administrator Interview Questions By ScholarHat
Azure Administrator Interview Questions By ScholarHatAzure Administrator Interview Questions By ScholarHat
Azure Administrator Interview Questions By ScholarHat
Scholarhat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHatFull-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Scholarhat
Inventory Reporting in Odoo 17 - Odoo 17 Inventory App
Inventory Reporting in Odoo 17 -  Odoo 17 Inventory AppInventory Reporting in Odoo 17 -  Odoo 17 Inventory App
Inventory Reporting in Odoo 17 - Odoo 17 Inventory App
Celine George
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdfBlind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Ajaz Hussain
Admission Procedure and types in hospital pptx
Admission Procedure  and types in hospital pptxAdmission Procedure  and types in hospital pptx
Admission Procedure and types in hospital pptx
PoojaSen20
Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940Administrative bodies( D and C Act, 1940
Administrative bodies( D and C Act, 1940
P.N.DESHMUKH
Odoo 18 Accounting Access Rights - Odoo 18 際際滷s
Odoo 18 Accounting Access Rights - Odoo 18 際際滷sOdoo 18 Accounting Access Rights - Odoo 18 際際滷s
Odoo 18 Accounting Access Rights - Odoo 18 際際滷s
Celine George
Oral exam Kenneth Bech - What is the meaning of strategic fit?
Oral exam Kenneth Bech - What is the meaning of strategic fit?Oral exam Kenneth Bech - What is the meaning of strategic fit?
Oral exam Kenneth Bech - What is the meaning of strategic fit?
MIPLM
Functional Muscle Testing of Facial Muscles.pdf
Functional Muscle Testing of Facial Muscles.pdfFunctional Muscle Testing of Facial Muscles.pdf
Functional Muscle Testing of Facial Muscles.pdf
SamarHosni3

Computer ethics

  • 1. Doing the Right Thing Computer Ethics
  • 3. Plagiarism Downloading somebody elses works as if it were your own. Plagiarism is a serious offense. The more famous you get, the more youre at risk. In college writing, its fine to make use of someone elses effort as long as you use your own words and give credit. Plagiarizing copyrighted materials is called copyright infringement
  • 4. Privacy & Encryption Privacy refers to an individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information. Encryption refers to a coding or scrambling process by which a message is rendered unreadable by anyone except the intended recipient. Coded Message
  • 5. Cipher text Refers to a coded message Decode the message below V YBIR LBH ORYC BRX WRR A B C D E F J H I J K L M N O P Q R S T U V W X Y Z
  • 6. Global Unique Identifiers (GUID) A unique identification number that is generated by a computer hardware component or a program.
  • 7. Privacy at Work. (Things to Remember) Except in the case of an emergency, never use your employers telephone system for professional calls. Make all such calls from a pay telephone. Never use the e-mail account your employer gives you for professional purposes. Get your own account with an Internet Service Provider (ISP), and be sure to send and receive all personal mail from your home computer. Assume that everything you do while youre at work whether its talking on the phone, using your computer, taking a break, or chatting with co-workers is being monitored and recorded.
  • 8. Protecting your Privacy Online To safeguard your privacy on the internet do the following: Browse anonymously by surfing from sites such as The Anonymizer or The-cloak Disable cookies on your Web browser or use cookie management software, such as Junkbuster. Use a throw-away e-mail address on a free Web-based service such as Hotmail. Tell children not to divulge any personal information to strangers online without first asking permision. Dont fill out site registration form unless you see a privacy policy statement indicating that the information you supply will not be sold to third parties.
  • 9. Computer Crime: Tools and Techniques Password guessing Shoulder surfing Packet sniffers Dumpster diving Social Engineering Superuser status
  • 10. SALAMI SHAVING AND DATA Salami Shaving a programmer alters a program so that it subtracts a very small amount of money from each account. Data Diddling- insiders modify data so that its difficult or impossible to tell that theyve stolen fund or equipment.
  • 11. COMPUTER VIRUSES Computer Virus - a computer program that can copy itself and infect a computer without permission or knowledge of the user. File infectors attached themselves to a program file. Boot sector virus propagates by means of in infected program, but it installs itself at the beginning of a hard drive. Macro Virus Take advantage of the automatic command execution capabilities Executable File- program that can run on a given computer Platform. E-mail Attachment-a computer file that is included with an e-mail message. Plain Text safe file
  • 12. MORE ROGUE PROGRAMS Time bombs- also called logic bombs, are designed to sit harmlessly on a system until a certain event or set of circumstance causes the program to become active. Worm resembles a computer virus in that it can spread from one computer to another. Can propagate over a computer network. Trojan Horse is disguised as a useful program, but it contains hidden instructions to perform a malicious task instead. Sometimes a trojan horse is disguised as a game or a utility program that users will find appealing.
  • 13. ATTACKERS Hackers computer hobbyist who enjoy pushing computer system to their limits Crackers obsessed with gaining entry to highly secure computer systems Cyber Gang bring crackers together by means of the internet and physical meetings. Computer virus Author - Makers of Computer Viruses Disgruntled Employees Kick out employees Fraud Artist - Swindlers & Shills
  • 14. Cyberstalkers & Sexual Predators Cyberstalking define as the use of the internet e-mail, and other electronic communication media to harass or threaten a person repeatedly. Cybersex - a virtual sex encounter in which two or more persons connected remotely via a computer network send one another sexually explicit messages describing a sexual experience. It is a form of role-playing in which the participants pretend they are having actual sexual relations
  • 15. INFORMATION WARFARE IW the use of information technologies to corrupt or destroy an enemys information and industrial infrastructure. Electronic Warfare The use of electronic device to destroy or damage computer system. Network Warfare hacker-like attacks on the nations network infrastructure, including the electronic banking system. Structural Sabotage Attacks on information systems that support transportation, finance, energy and telecommunication.
  • 16. Spotlight Ethics Plagiarism The presentation of Somebody elses work as if it were your own. At some colleges, plagiarism can get you thrown out of school on the first offense. Copyright Infringement Plagiarizing copyrighted material.
  • 17. Ten Commandments for Computer Ethics 1. Thou shalt not use computer to harm other people. 2. Thou shalt not interfere with other peoples computer work. 3. Thou shalt not snoop around in other peoples files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use propriety software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other peoples intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration and respect for your fellow Humans.
  • 18. Summary Respecting yourself Respecting Others Respecting Academic Integrity