Ethics and Cybercrime PDF

Summary

This document reviews ethical principles and the concepts of cybercrime. It explores the issues involved in computer ethics. There is a clear distinction between ethical conduct and cyber-crimes, and several examples of how such crimes occur.

Full Transcript

Ethics and Morals Cybercrime and Cybersecurity  Ethics is a collection of standards of conduct and  Crimes committed using computers and networks moral judgment forming the basis for reasoned are known as c...

Ethics and Morals Cybercrime and Cybersecurity  Ethics is a collection of standards of conduct and  Crimes committed using computers and networks moral judgment forming the basis for reasoned are known as cybercrime. and impartial decisions as to what is right and  Cybercrime is a crime committed using a wrong. computer and a network.  Morals refer to traditions of belief about right or  Cybercrime relates to all of the following: wrong. computer, internet, and email.  Ethics is the study of values.  Gaining unauthorized access to someone else’s  The word "ethics" is derived from the Greek word computer files is known as hacking. ethos.  The use of internet or other devices to send or  Ethics determines the rightness or wrongness of post content intended to hurt or embarrass human actions. another person is known as cyberbullying.  Ethos means character.  Accessing unauthorized data or using someone’s  Ethical issues are problems, situations, or computer without permission is not considered a opportunities requiring individuals or cybercrime. organizations to choose among several actions  Flaming is the term for aiming abusive and that must be evaluated as right or wrong. insulting messages at another person online.  Ethical theories and moral standards are derived  Identity theft refers to impersonating someone from values. to commit fraud.  Sam's belief that the death penalty is wrong is an  The illegal assumption of someone’s identity for example of his morals. economic gain is called identity theft.  A cyberattack that involves sending emails asking Business Ethics for sensitive information is known as phishing.  A file or code that infects, explores, or steals  Business Ethics primarily deals with moral information is known as malware. obligation.  The collective name for trojan horses, spyware, and worms is malware.  Ethical issues deal with right and wrong choices.  The four ethical issues created by the expanding  A computer worm is malware designed to infect use of IT are Property, Accuracy, Privacy, and other computers. Accessibility.  Malware is unwanted software installed without consent. Privacy and Security in IT  Trojan horse is malware that tricks you into handing over sensitive information.  All of these are potential victims of a phishing  Privacy issues involve collecting, storing, and attack. disseminating information about individuals.  An identity thief would most likely steal your  Accuracy issues involve the authenticity and information to access your bank account, credit fidelity of information that is collected and card, and other financial resources. processed.  Accessibility issues involve who may obtain Computer-Related Mistakes and Waste information and how much they should pay for it.  The browser mode that eliminates history files and blocks most cookies is privacy mode.  Computer-related mistakes refer to errors, failures, and other computer problems that make  The browser mode that ensures your browsing computer output incorrect or not useful. activities are not recorded is privacy mode.  Tracking cookies record your activities across  The inappropriate use of computer technology and resources is called computer waste. different sites.  Firewalls are used to protect against unauthorized access. Copyright and Intellectual Property  A major way a computer virus can spread is via email.  The term used when someone does not have  A phishing email encourages you to click on a link legal rights to copy someone else’s work is called to a fraudulent website. copyright.  You can protect yourself against spam or  Copying and using commercial software fraudulent emails by using a spam filter, being purchased by someone else is unauthorized use. aware of fraudulent emails, and never clicking on  The exclusive legal right given to creators to suspicious links. print, publish, or perform artistic or musical  Phishing attacks are easy to fall for because they material is known as copyright. use messages that look official.  Plagiarism is presenting someone else’s work as  If you receive an email from a well-known your own. company with a misspelled name, you should  The situation where Larry asks for a copy of a report it as a possible phishing scam. video game falls under piracy.  A sign of malware on your computer is when your homepage has changed unexpectedly. Internet Usage and Behavior  Installing antivirus for protection is not considered a type of cybercrime.  Spamming: The use of electronic messaging  You can tighten your security by using a strong systems to send unsolicited bulk messages. password, logging off personal accounts when  Downloading and copying data from an open not in use, and using a firewall. system fraudulently is treated as cybercrime.  When a person is repeatedly harassed by being followed, called, or written to, they are a target of stalking.

Use Quizgecko on...
Browser
Browser