Ethics and Cybercrime PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document reviews ethical principles and the concepts of cybercrime. It explores the issues involved in computer ethics. There is a clear distinction between ethical conduct and cyber-crimes, and several examples of how such crimes occur.

Full Transcript

Ethics and Morals Cybercrime and Cybersecurity  Ethics is a collection of standards of conduct and  Crimes committed using computers and networks moral judgment forming the basis for reasoned are known as c...

Ethics and Morals Cybercrime and Cybersecurity  Ethics is a collection of standards of conduct and  Crimes committed using computers and networks moral judgment forming the basis for reasoned are known as cybercrime. and impartial decisions as to what is right and  Cybercrime is a crime committed using a wrong. computer and a network.  Morals refer to traditions of belief about right or  Cybercrime relates to all of the following: wrong. computer, internet, and email.  Ethics is the study of values.  Gaining unauthorized access to someone else’s  The word "ethics" is derived from the Greek word computer files is known as hacking. ethos.  The use of internet or other devices to send or  Ethics determines the rightness or wrongness of post content intended to hurt or embarrass human actions. another person is known as cyberbullying.  Ethos means character.  Accessing unauthorized data or using someone’s  Ethical issues are problems, situations, or computer without permission is not considered a opportunities requiring individuals or cybercrime. organizations to choose among several actions  Flaming is the term for aiming abusive and that must be evaluated as right or wrong. insulting messages at another person online.  Ethical theories and moral standards are derived  Identity theft refers to impersonating someone from values. to commit fraud.  Sam's belief that the death penalty is wrong is an  The illegal assumption of someone’s identity for example of his morals. economic gain is called identity theft.  A cyberattack that involves sending emails asking Business Ethics for sensitive information is known as phishing.  A file or code that infects, explores, or steals  Business Ethics primarily deals with moral information is known as malware. obligation.  The collective name for trojan horses, spyware, and worms is malware.  Ethical issues deal with right and wrong choices.  The four ethical issues created by the expanding  A computer worm is malware designed to infect use of IT are Property, Accuracy, Privacy, and other computers. Accessibility.  Malware is unwanted software installed without consent. Privacy and Security in IT  Trojan horse is malware that tricks you into handing over sensitive information.  All of these are potential victims of a phishing  Privacy issues involve collecting, storing, and attack. disseminating information about individuals.  An identity thief would most likely steal your  Accuracy issues involve the authenticity and information to access your bank account, credit fidelity of information that is collected and card, and other financial resources. processed.  Accessibility issues involve who may obtain Computer-Related Mistakes and Waste information and how much they should pay for it.  The browser mode that eliminates history files and blocks most cookies is privacy mode.  Computer-related mistakes refer to errors, failures, and other computer problems that make  The browser mode that ensures your browsing computer output incorrect or not useful. activities are not recorded is privacy mode.  Tracking cookies record your activities across  The inappropriate use of computer technology and resources is called computer waste. different sites.  Firewalls are used to protect against unauthorized access. Copyright and Intellectual Property  A major way a computer virus can spread is via email.  The term used when someone does not have  A phishing email encourages you to click on a link legal rights to copy someone else’s work is called to a fraudulent website. copyright.  You can protect yourself against spam or  Copying and using commercial software fraudulent emails by using a spam filter, being purchased by someone else is unauthorized use. aware of fraudulent emails, and never clicking on  The exclusive legal right given to creators to suspicious links. print, publish, or perform artistic or musical  Phishing attacks are easy to fall for because they material is known as copyright. use messages that look official.  Plagiarism is presenting someone else’s work as  If you receive an email from a well-known your own. company with a misspelled name, you should  The situation where Larry asks for a copy of a report it as a possible phishing scam. video game falls under piracy.  A sign of malware on your computer is when your homepage has changed unexpectedly. Internet Usage and Behavior  Installing antivirus for protection is not considered a type of cybercrime.  Spamming: The use of electronic messaging  You can tighten your security by using a strong systems to send unsolicited bulk messages. password, logging off personal accounts when  Downloading and copying data from an open not in use, and using a firewall. system fraudulently is treated as cybercrime.  When a person is repeatedly harassed by being followed, called, or written to, they are a target of stalking.

Use Quizgecko on...
Browser
Browser