Chapter 12 Flashcards
Ethics
Moral principles that we use to judge right or wrong
Natural Law
System of rights held to be common and derived from nature
Utilitarianism
Actions are ethical or unethical based on their consequences or outcomes
Computer Ethics
Right decisions in your daily computer use
10 Commandments for Computer Ethics
- Not use a computer to harm others
- Not interfere with people’s computer works
- Not snoop in others computer files
- Not use a computer to bear false witness
- Not use a computer to steal
- Not copy or use software you haven’t paid for
- Not use others computer resources without permission or compensation
- Not appropriate other’s output
- Shall think of the social outcomes of your program or system
- Shall use computers in ways that ensure consideration and respect for others.
Patent
Creates protection for someone who creates a new product or process. This is a limited period and in the US lasts for 20 years.
Whistle-blowing
Reporting company conducts that pose a danger to the public. You will only be protected if the wrongdoing is in the public’s interest.
Software Piracy
Use of software that isn’t properly licensed
Software License
The right to make backups of program disks and install the software
Public Domain Software
Free programs that can be copied or modified without restrictions
Botnet
A group of computers comprised by malware and used to attack other computers
Logic Bomb
Software that does malicious acts when specific conditions are met
3 Goups of Hackers
- White Hat
-penetrates the system without exploiting the breach
-often hired to do penetration tests - Black Hat
-uses code to exploit a computer illegally and is criminally oriented - Gray Hat
-often law-abiding but eventually crosses the line
Script Kiddy
Non-experienced hacker
Preaking
Breaks into telephone system and usually requires a great amount of telephone experience and knowledge.