* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Computer Ethics
Cyberwarfare wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer recycling wikipedia , lookup
Trusted Computing wikipedia , lookup
Mobile security wikipedia , lookup
Computer security wikipedia , lookup
Cyberattack wikipedia , lookup
Social engineering (security) wikipedia , lookup
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. Some questions in computer ethics  Hacking  Copyright Infringement of software  E-democratic technology Ethical standards  Association for Computing Machinery (ACM) code of ethics – Ethical behavior among computing professionals – Learned society – Founded in 1947 Computers in the Workplace: Are They Used Ethically?  Then typewriters, filing cabinets, and correction fluid were the norm.  Replaced by desktop and portable computers, database management systems, and word processing software.  Benefits: You are already familiar with some of the benefits of using computers in the workplace Two types:  Crimes that target computer networks or devices directly,  Crimes facilitated computer networks or devices, the primary target of which is independent of the computer network or device COMPUTER CRIME Examples of crimes that primarily target computer networks or devices would include,  Malware (malicious code)  Denial-of-service attacks  Computer viruses Examples of crimes that merely use computer networks or devices would include;  Cyber stalking  Fraud and identity theft  Phishing scams  Information warfare  Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. A denial-of-service attack (DoS attack) or distributed denial-ofservice attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.  computer virus is a computer program that can copy itself and infect a computer.  The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability.  Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.  Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge  Cyberstalking is the use of the Internet or other electronic means to stalk someone. a fraud is an intentional deception made for personal gain or to damage another individual criminal fraud include : Banckruptcy fraud  benefit fraud  False advertising  False billing  False insurance claims  forgery  Health fraud  Identity theft  Marriage fraud  taking payment for goods sold online, by mail or phone, such as tickets, with no intention of delivering them  Tax fraud, (tax evasion),  Identity theft  Five categories: – business/commercial identity theft – criminal identity theft – financial identity theft – identity cloning – medical identity theft Techniques for obtaining personal information Researching about the victim in government  Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport.  Stealing payment or identification cards  Stealing personal information from computers and computer databases  Advertising bogus job offers   phishing is the criminally fraud process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.  Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. – Collection of tactical information, – Assurance(s) that one's own information is valid, – spreading of propaganda or disinformation to demoralizethe enemy and the public Television and radio transmission(s) can be jammed.  Television and radio transmission(s) can be hijacked for a disinformation campaign.  Logistics networks can be disabled.  Enemy communications networks can be disabled.  Stock exchange transactions can be sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation.  Computer security  What is computer security?  Why should I care about computer security?  Who would want to break into my computer at home?  How easy is it to break into my computer? Information security is concerned with three main areas: •Confidentiality - information should be available only to those who rightfully have access to it •Integrity -- information should be modified only by those who are authorized to do so •Availability -- information should be accessible to those who need it when they need it Electronic Commerce Act  Electronic commerce, commonly known as (electronic marketing) ecommerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks Cybercrimes The Department of Justice categorizes computer crime in three ways :  The computer as a target  The computer as a weapon  The computer as an accessory Personal responsibility  Contribute to society and human well-being  Avoid harm to others  Be honest and trustworthy  Be fair and take action not to discriminate  Honor property rights including copyrights and patent  Give proper credit for intellectual property  Respect the privacy of others  Honor confidentiality Social network service A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services.  Philippine IT Related Laws Ten Commandments of Computer Ethics Other Emerging Issues in IT