Cyber Ethics Lesson - PDF
Document Details

Uploaded by EnticingOrbit1193
Tags
Summary
This document covers essential aspects of cyber ethics, including ethical computing, unethical practices like plagiarism, and safety measures for computer and internet use. It also addresses cyberbullying, phishing, and digital footprints, providing steps to protect yourself from online threats. The document concludes with discussions on software piracy and individual rights to privacy.
Full Transcript
Here's the conversion of the image to a structured markdown format: ## Lesson 9: Cyber Ethics ### Learning in this Chapter * Computing Ethics * Unethical Practices * Safety measure while using computer and the internet * Digital Footprints The internet has become an essential part of mod...
Here's the conversion of the image to a structured markdown format: ## Lesson 9: Cyber Ethics ### Learning in this Chapter * Computing Ethics * Unethical Practices * Safety measure while using computer and the internet * Digital Footprints The internet has become an essential part of modern life. It is a global system of interconnected computer networks that enables the users to share information and various resources with each other. It has several advantages. However, it is a tool, which must be handled with caution, as its misuse can be hazardous. ### Computing Ethics Ethics is a set of moral principles that governs the behavior of a group or an individual. Similarly, computing ethics is a set of procedures, moral principles, and ethical practices that regulates the use of a computer. It focuses on implementing and use of computing resources and includes new issues that are raised by new technologies. It basically aims at encouraging IT users to be responsible in order to utilize the technology tools judiciously, respect the views of others, and acknowledge the rights and properties of the people on the internet. Some of the common ethical guidelines that should be followed while using a computer are as follows: * Do not use computer technology to cause disruption or interference in other user's work. * Do not spy on another person's computer data. * Do not use computer technology to steal information. * Do not contribute to the spread of wrong information using computer technology. * Avoid buying pirated software, pay for software unless it is free. * Do not use someone else's computer resources without an authorization. * It is wrong to claim ownership on a work, which is the output of someone else's intellect. * Before developing software, think about the social impact it can have. * Be respectful and courteous with the fellow members while communicating on the internet. ### Unethical Practices Some of the common unethical practices that are prevalent in the society are discussed as follows: #### Plagiarism Plagiarism is the usage or imitation of the language and thoughts of another person projected as one's own original work. It is considered a crime or fraudulent act. The Merriam-Webster Dictionary describes 'plagiarism' as follows: * To steal and pass off (ideas or words of another) as one's own * To use (another's productio), without crediting the source. * To commit literary theft * To present as new and original an idea or product derived from an existing source. International Copyright Laws also state that "the expression of original ideas is considered as the intellectual property and is protected by law. Thus, it gives the owner of a copyright the legal right to control the reproduction and distribution of such creation." Plagiarism has become very easy with technological advances, like web searching and copy/paste options. Most critics have linked carelessness, laziness, lack of interest, and arrogance as the major reasons of plagiarism. #### Steps to Prevent Plagiarism The simplest way to prevent plagiarism is 'Citation', acknowledging. The original writer and source from where the material has been taken is called 'Citation'. It includes the following steps: * All sources are neither accurate nor do they validate the source to confirm the accuracy. Therefore, one must specify * The soource, which informs the readers regarding the basis of one's ideas and the extent of one's research. Citation gives strength to your resource. * To avoid plagiarism, one can rephrase the material * Use quotation Marks aorund all tje qjoted ekrds if antjer persib to aboid plagiatosn * In the eduaction sector, tje stidemts shoukd be enciuraged to present tjer iriginal amd innovatice deas Ecen if tjej ### Cyperbullying It is the act of harming, harassing, or targeting a person by another person using the internet, in a deliberate manner. This includes insulting remarks and threatening messages sent by email, spreading rumors about the person either by emails or social networking sites, posting embarrassing photos and videos to hurt the person, derogatory remarks against gender, race, religion, or nationality. #### Steps to Prevent Cyberbullying You should take the following measures to prevent cyberbullying: * Do not disclose your identify to unkown persons * Safeguard your password and all private information for inquisitive peers * Restrict your online profile to be checked by some trusted friends only * Search the whereabouts of the person you meet online and know about him fully before extending you hand for friendship * If you are cyber bullied by someone, do not remain silent but take action against it. Do not be repulsive in your language rather block the communication with the cyberbully and share this problem with your parents. ### Phishing It is an act of sending an email to a user, misleading him to believe that it is from a trusted person or organization. The user is asked to visit a website where he is supposed to update or validate his personal details, such as username, password, credit card details, etc. In this way, the operators of the fake website steal your identity and commit crimes in your name. This could damage your reputation and cause heavy financial losses. #### Steps to Prevent Phishing * Keep your passwords secret and change them periodically. * Update your operating systems and avoid using open Wi-Fi as it makes it easy for hackers to steal the information and contents. * Always make use of secure websites by looking at the green lock sign or https on the address bar. This ensures that is encrypted and can't be deciphered. ### Spamming Spams are unwanted bulk emails that come from unknown sources. They are generally sent in large numbers for commercial advertising. In spamming, millions of copies of the same message are sent to the email users worldwide. Spam is a serious security concern as it can be used to deliver trojan horses, viruses, worms, spyware, and organize targeted phishing attacks *Always check permissions and authenticity on the apps before installing them. *Do not divulge personal information over the phone unless you initiate the call Enter your sensitive data in secure websites only. *Check your online accounts and bank statements. ### Hacking Hacking refers to an illegal intrusion into a computer system or network. Hackers are highly technical people, who secretly break into computers to steal important data or sometimes to destroy it. They not only steal important data but also hack applications and websites to change program logics. Hackers usually tamper with data for unethical purposes, just for an obsession to break the system's securities. Ethical Hacking is done without consent and is not always destructive. Cracking is an equivalent term to hacking where crackers steal financial details of passwords and cause harm by destroying data. #### Steps to Prevent Spamming * Install spam filtering/blocking software. * If you suspect that an email is a spam, do not respond, just delete it. * Sometimes, spam attackers keep sending emails, this process known as Mail Bombing ### Individual right to privacy Private parameters are diminishing. These are the steps: 1. Update your operating systems and software frequently. 2. passwords secret and change them 3. Never store your credit card info 4. Avoid Open Wifi 5. Check permissions for SPAM: *Messages that do not include your email address in the To: or Cc: *The spam can contain offensive language or Linky to websites ### Measures to protect a company from internal threats #### Let's know more * Click jacking - malicious technique for tricking a web user to click something different from what they think they are * Vishing - using social influence over the telephone system, most often VoIP, to gain access to sensitive information * Bots - malware that performs a wide variety of automated tanks on behalf of cyper criminals * Cyberespionage - obtaining secret from individual, competitors, groups, governments and enemies for military, political, or economic advantage **What does this right entail?** The right to privacy allows and ensures that individuals/groups/institutions get to determine when, how and to what extent any information relating to them may be communicated to others, **How to protect your right to privacy:** * Be careful when sharing your personal profile on social networking sites. * Never share your login details with anyone. * Delete any sensitive data that is not in use. * Never click on a link sent to you via text or email from a stranger. * A cookie is a small text file stored on your computer's browser directory that collects information of your online activity and reports back to the host. * Install security software (e.g. anti-virus, antispyware, or a firewall to protect your system against intrusions and inflections. * Lock your screen when not in use. ### Software Piracy -Licenced copies -Encourage piracy The term "piracy" arises when copyright law is breached. As technology advances, the creation of copyrightable works becomes easier However, what is less acknowledged is that this ability to readily distribute and copy software over the Internet makes it easier to pirate such protected works. As a result Software companies spend a lot of money preventing soft-fitting ### Software Piracy Is the illegal copying and distribution of software. A license from the copyright owner is required to copy the genuine programs, **You encourage piracy when:** * You purchase a single licenced copy of the software and load it onto several computer contrary to the licence's terms (this is called *Softlifting).*] * Install security software, like antivirus, anti-spyware, or firewall to protect your system against intrusions and infections. * Lock your system when not in use. *You make unauthorised copies of the copyrighted software and distribute them You install unauthorised copies of software on the hard drive of personal computers * *You make unauthorised selling of software for termory use of sell of bud the software CDs/DVDs on rent*. * **_Always buy licensed versions and never make illegal copies_** **Steps to Protect Software Piracy** * **Buy licensed *software CDs from a reputed seller to ensure that it is genuine. Avoid using illegal given to your friends to listen to your favorite movies." **What types of crimes is cyber ethics mainly used for?** **_intellectual theft, Software piracy, Spreading Malware.Hacking and Unauthorized Access to Information , Identity theft, Cyberbullying and Hate speech, Online child exploitation and Grooming , Phishing scams and Online fraud, Cyber stalking & Invasion of privacy and Social engineering and misinformation_** **What is the gateway of a network?** It is defined as that follows specific sets of rules defined by the user or network. The gateway controls incoming network traffic and outgoing network traffic ## DIGITAL FOOTPRINTS A footprint is impression left behind by a foot. Digital footprint is a mark by an internet about a person that exists on the internet because and to what extent by their behavior. You can fill out a registration form, send email attachments, shop online, and make comments on networking sites ### Categorizing digital foot prints * **Active datatrace:** chats social medial etc * **Passive data tace**: online and offline data collection from shopping etc. **What are some of the implications for ethical footprints?** Never post crazy , inappropriate or abusive comments. Be careful while making friends Set your private account on social media sites Don't log in to inappropriate websites Tune your privacy settings so only family members can see post pics