Computer Ethics Flashcards
Ethics is derived from the Greek term “ethos”, which means ______________.
character or custom
refers to the guiding precepts and norms that are adopted and applied to regulate and control the use of computers and its applications.
Computer Ethics
characterized by an explicit attempt by attackers to prevent or bar legitimate users of computers from availing themselves of computer services.
Denial of service attack
There are basic types of attacks in ‘Denial of service attack’:
a) Consumption of scarce, limited or non renewable resources
b) Destruction or alteration of configuration information,
c) Physical destruction or alteration of network components
involves unauthorized access to a computer, its files, and programs. There are many reasons why hackers hack computers.
Hacking
if a system offers some type of service and a hacker has a use for it, he/she will hack the system
Theft of service
for example, a hacker may get into the homepage of the university that kicked him out and deface the homepage
Vengeance and hatred
sending of abusive emails or messages to other people or newsgroups.
Flaming
is considered poor online conduct and is not tolerated
well in chatrooms or newsgroups.
Flaming
sometimes called unsolicited commercial email, is the Internet version of junk mail. It is an attempt to deliver a message over the Internet to someone who would not otherwise choose to receive it.
Spamming
Almost all spam is ___________.
commercial advertising
is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed.
Virus
is a self replicating program designed to spread across a network without requiring any outside actions to take place.
Worm
messages about free money, children in trouble and other items designed to grab your attention and get you to forward the message to everyone you know
(chain letters).
Internet hoaxes
is concerned with the promotion of the welfare of the people. In computing, social justice would pertain to equity of access. Some issues emanating from equity of access involves gender, physical disabilities, language
Social justice
_____________ is one of the constitutional rights guaranteed by the supreme law of the land. Hence, it is constantly advocated by those who do no want to be subjected to restrictions in their expressions or articulation of their thoughts.
The right to freedom of expression