Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Viruses & Destructive Programs
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Mrs. Jefferson Business Information Management I.
Viruses & Destructive Programs
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Types of Electronic Infection
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Computer Skills and Applications Computer Security.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
Any criminal action perpetrated primarily through the use of a computer.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Viruses & Destructive Programs
3.6 Fundamentals of cyber security
Unit A: Exploring Computer Systems
Related to data, hardware, and software
COMPUTER CRIME.
BCT 2.00 Analyze Technology Issues
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

Computer Ethics

Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information that is either not personal or carries your permission for use.Public Data: information that is either not personal or carries your permission for use. Private Data: Information such as credit card numbers or security passwords mean only for personal use.Private Data: Information such as credit card numbers or security passwords mean only for personal use.

Ethics Notes (Cont.) Intellectual Property : a product created out of someone’s own thoughts or ideas.Intellectual Property : a product created out of someone’s own thoughts or ideas. Copyright: legal protection for written intellectual propertyCopyright: legal protection for written intellectual property Patent: legal protection for product designs and inventionsPatent: legal protection for product designs and inventions

Ethics Notes (Cont.) Trademark: legal protection of logos and symbols.Trademark: legal protection of logos and symbols. Software Piracy: is the unauthorized reproduction or duplication of a software programSoftware Piracy: is the unauthorized reproduction or duplication of a software program Commercial Software: copyrighted software available for purchase.Commercial Software: copyrighted software available for purchase.

Ethics Notes (Cont.) Share Ware: copyrighted software that is distributed free of charge on a trial basis. A nominal fee is charged if the user decides to keep it.Share Ware: copyrighted software that is distributed free of charge on a trial basis. A nominal fee is charged if the user decides to keep it. Free Ware: copyright software that is given away free of charge but is still the property of the owner and the user doesn't have the right to distribute copies just the owner.Free Ware: copyright software that is given away free of charge but is still the property of the owner and the user doesn't have the right to distribute copies just the owner.

Ethics Notes (Cont.) Public Domain Software: software donated for public use, which can be freely copied and distributed.Public Domain Software: software donated for public use, which can be freely copied and distributed. Software License: Legal permission to use softwareSoftware License: Legal permission to use software –Single User – Good for one computer or person. –Multi-User – Good for a select number of people or computers. –Site License – Good for any computer at your organization.

Ethics Notes (Cont.) Plagiarism:Plagiarism: Plagiarism is the act of copying someone else's work and publishing it as your own. This includes text, media, and even ideas. Is it Plagiarism? Spam: version of junk mailSpam: version of junk mail

Ethics Notes (Cont.) Hacking: is the unauthorized use of a computer or programHacking: is the unauthorized use of a computer or program Spyware:Spyware: capture information like Web browsing habits, messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

Ethics Notes (Cont.) Sabotage: deliberately causing damage to property (hardware or software).Sabotage: deliberately causing damage to property (hardware or software). Malware: Any harmful programMalware: Any harmful program Computer Virus: a computer program designed to harm a computer’s hardware and/or software usually by replicating itself and delivering harmful data.Computer Virus: a computer program designed to harm a computer’s hardware and/or software usually by replicating itself and delivering harmful data.

Ethics Notes (Cont.) Computer Worm: destructive code that bores it way through a computer's files. It can move from computer to computer, dropping off segments of itself as it goes.Computer Worm: destructive code that bores it way through a computer's files. It can move from computer to computer, dropping off segments of itself as it goes. Computer Bomb: destructive code that is set to activate at a certain time or when a specific action is taken.Computer Bomb: destructive code that is set to activate at a certain time or when a specific action is taken.

Ethics Notes (Cont.) Trojan Horse :Trojan Horse : destructive code that gains access to a computer disguised as something such as a desirable software program. Once inside the computer, the Trojan horse can do its damage but it cannot spread from disk to disk or computer to computer.

Ethics Notes (Cont.) Anti-Spyware Program: Program designed to find and remove spyware from a computer system.Anti-Spyware Program: Program designed to find and remove spyware from a computer system. Virus Protection Program: software designed to protect a computer system from viruses, usually containing a virus disinfectant program and an anti-virus program.Virus Protection Program: software designed to protect a computer system from viruses, usually containing a virus disinfectant program and an anti-virus program.

Ethics Notes (Cont.) Virus Disinfectant Program: a program used to search for viruses that may be established on a hard drive (doesn't automatically search).Virus Disinfectant Program: a program used to search for viruses that may be established on a hard drive (doesn't automatically search). Anti Virus Program: a program that automatically checks each floppy disk as it is inserted into the disk drive and scans all data from telecommunications devices to locate and give warning of any virus that may be likely to enter a computer.Anti Virus Program: a program that automatically checks each floppy disk as it is inserted into the disk drive and scans all data from telecommunications devices to locate and give warning of any virus that may be likely to enter a computer.