Presentation is loading. Please wait.

Presentation is loading. Please wait.

LESSON 2: Internet, Computer Ethics and Security

Similar presentations


Presentation on theme: "LESSON 2: Internet, Computer Ethics and Security"— Presentation transcript:

1 LESSON 2: Internet, Computer Ethics and Security
OBJECTIVES Review the basics Internet Concepts and its types Determine the computer ethics and netiquette Discuss different kinds of computer risks Name some computer and internet crimes List ways how to secure computer and Internet security measures WHAT IS INTERNET? Is the Worldwide collection of networks, cooperating with each other to exchange data using a common software standard, on which end –user services.

2 The Internet provides following main facilities:
WHAT IS WEBSITE? Is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide some kind of useful information. Chat Searching Jobs Advertising for Business E-commerce Searching Information

3 TYPES OF WEBSITE Advocacy Website Blogs Website Wiki Website
Portal website News Website Informational Website Business / Marketing Website Small Business Websites Large Business Websites Educational Website Entertainment Website Advocacy Website Blogs Website Wiki Website Content Aggregator Website Social Network website Search Engine , Directories, Yellow pages and Portals Website

4 COMPUTER ETHICS Real People Exist Behind The Computers
It is the RESPONSIBLE USE of computers and computer networks. NETIQUETTE Or net etiquette, refers to etiquette on the Internet. GOOD NETIQUETTE INVOLVES RESPECTING OTHER’S PRIVACY AND NOT DOING ANYTHING ONLINE THAT WILL ANNOY OR FRUSTRATE OTHER PEOPLE. It is about proper ways in which to use a network and to determine whether information reliable, while emphasizing 3 important Points. Real People Exist Behind The Computers Protect your Privacy Avoid Spamming

5 Day-to-Day Ethics All of us must know these already, because their modified forms of ethics today told by us by our grandparents/parents, like don’t open letters of others, don’t copy the home work from others, don’t listen to any conversation secretly etc. the following discusses the basic day-today ethics to observe when using computers. Software Piracy Computer Viruses/Worms Plagiarism Hacking File privacy Intellectual Property Rights Copyright Information Privacy

6 THE REPUBLIC ACT 10175: ANTI-CYBERCRIME LAW
the Law defines cybercrime offenses with definitive punishments. Illegal Access Illegal Interception Data Interference System Interference Misuse of Devices Cyber squatting Computer –Related Forgery Computer –Related Fraud Computer –Related Identity Theft Cybersex Child Pornography Unsolicited Commercial Libel COMPUTER SECURITY RISKS This is a very general statement because many things are in fact, computer security risks. A RISKS is a vulnerability that could allow lost of confidentiality , integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited. THE REPUBLIC ACT 10175: ANTI-CYBERCRIME LAW - The purpose of this act define, provide for the prevention , investigation , suppression and penalties therefore and other purpose.

7 Facebook is spying on your mom, your relationship and your Political Views
Facebook has been spying on user’s ethnicities, political views, romantic and partners, and even how they talk to their children. ( Unlike the mood study, the facebook studies listed below are observational; they don’t attempt to change user’s behavior. )

8 It’s unlikely Facebook users have heard about most these studies, they’ve consented to them; the social network’s Data Use Policy states. “We may use the information we receive about you…for internal operations, including troubleshooting, data analysis, testing, research and service improvement.”

9 How to Prevent Cyber Crime
Prevention will always be your best Line of defense against cyber criminals. Like any other criminal activity, those vulnerable tend to be first targeted. Ideally, you’ll want to work with a IT security expert to assess your specific needs and vulnerabilities, but there are certainly some universal steps you can take that will greatly reduce your likelihood of attack.


Download ppt "LESSON 2: Internet, Computer Ethics and Security"

Similar presentations


Ads by Google