Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Cyberwarfare wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer recycling wikipedia , lookup
Trusted Computing wikipedia , lookup
Mobile security wikipedia , lookup
Computer security wikipedia , lookup
Cyberattack wikipedia , lookup
Social engineering (security) wikipedia , lookup
What is computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. Some questions in computer ethics Hacking Copyright Infringement of software E-democratic technology Ethical standards Association for Computing Machinery (ACM) code of ethics – Ethical behavior among computing professionals – Learned society – Founded in 1947 Computers in the Workplace: Are They Used Ethically? Then typewriters, filing cabinets, and correction fluid were the norm. Replaced by desktop and portable computers, database management systems, and word processing software. Benefits: You are already familiar with some of the benefits of using computers in the workplace Two types: Crimes that target computer networks or devices directly, Crimes facilitated computer networks or devices, the primary target of which is independent of the computer network or device COMPUTER CRIME Examples of crimes that primarily target computer networks or devices would include, Malware (malicious code) Denial-of-service attacks Computer viruses Examples of crimes that merely use computer networks or devices would include; Cyber stalking Fraud and identity theft Phishing scams Information warfare Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. A denial-of-service attack (DoS attack) or distributed denial-ofservice attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Spyware is a type of malware that is installed on computers and collects little bits information at a time about users without their knowledge Cyberstalking is the use of the Internet or other electronic means to stalk someone. a fraud is an intentional deception made for personal gain or to damage another individual criminal fraud include : Banckruptcy fraud benefit fraud False advertising False billing False insurance claims forgery Health fraud Identity theft Marriage fraud taking payment for goods sold online, by mail or phone, such as tickets, with no intention of delivering them Tax fraud, (tax evasion), Identity theft Five categories: – business/commercial identity theft – criminal identity theft – financial identity theft – identity cloning – medical identity theft Techniques for obtaining personal information Researching about the victim in government Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport. Stealing payment or identification cards Stealing personal information from computers and computer databases Advertising bogus job offers phishing is the criminally fraud process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. – Collection of tactical information, – Assurance(s) that one's own information is valid, – spreading of propaganda or disinformation to demoralizethe enemy and the public Television and radio transmission(s) can be jammed. Television and radio transmission(s) can be hijacked for a disinformation campaign. Logistics networks can be disabled. Enemy communications networks can be disabled. Stock exchange transactions can be sabotaged, either with electronic intervention, leaking sensitive information or placing disinformation. Computer security What is computer security? Why should I care about computer security? Who would want to break into my computer at home? How easy is it to break into my computer? Information security is concerned with three main areas: •Confidentiality - information should be available only to those who rightfully have access to it •Integrity -- information should be modified only by those who are authorized to do so •Availability -- information should be accessible to those who need it when they need it Electronic Commerce Act Electronic commerce, commonly known as (electronic marketing) ecommerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks Cybercrimes The Department of Justice categorizes computer crime in three ways : The computer as a target The computer as a weapon The computer as an accessory Personal responsibility Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patent Give proper credit for intellectual property Respect the privacy of others Honor confidentiality Social network service A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities. A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Philippine IT Related Laws Ten Commandments of Computer Ethics Other Emerging Issues in IT