Cyber Ethics Flashcards

1
Q

Internet

A

a global system of interconnected computer networks which allow users to share and receive information worldwide

{Misuse of such a resource can be hazardous}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber Ethics

A

a set of moral principles or procedures that regulate the use of computers

  1. Avoid buying pirated softwares
  2. Do not spy on a another person’s data
  3. Do not use computer technology to disrupt another user’s work
  4. Be respectful and courteous while communicating on the internet
  5. Before developing a software, think about the social impact it can have
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plagiarism

A

the imitation or use of another person’s thoughts/ ideas, projected as your own
=> caused by arrogance, lack of interest, laziness or carelessness
=> stealing or passing off someone else’s work as your own
=>using someone else’s thoughts without crediting their source
=> commiting literary theft
=>deriving new data from existing source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventing Plagiarism

A
  1. Use quotation marks
  2. Citation (acknowledging the original writor)
  3. Rephrase the lines
  4. Encourage students to have their own thoughts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyberbullying

A

the act of harassing or targeting an individual online is called cyberbullying
1. insulting, spreading rumors or threatening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Preventing Cyberbullying

A
  1. restrict your online profile to your friends and family
  2. safeguard your logins and passwords
  3. get to know the people you interact with online before getting too comfortable
  4. Report any cyberbullying attack
  5. do not share your identity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

the act of sending an email to a person making them believe it is from a trusted source
– motive of stealing personal information, identity and commit crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Prevent Phishing

A
  1. Identify phishing emails
  2. Do not click on unauthorised links
  3. Do not enter your personal details on unsafe websites. A safe website always has ‘https//:’ in its URL.
  4. Protect your browser from phishing emails by using a firewall, spam filter, antivirus etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking

A

the illegal intrusion on someone else’s computer for the motives of tampering data or inserting some malicious software to break down their security system.
– Ethical Hacking: done to identify faults in a companies’ software
– Cracking (similar term): entering malicious software into a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventing Hacking

A
  1. keep your password a secret and regularly change it
  2. Update your operating systems
  3. Do not use open wifi
  4. Never save your credit card number on a website
  5. Check the authenticity of a software before using it
  6. Use secure websites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spamming

A
  1. sending bulk emails to an account from unknown sources
  2. Portrayed as commercial advertising but are used to deliver viruses or organise phishing attacks
  3. Mail Bombing: sending so many emails that the server gets full
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to identify spamming emails?

A
  1. Contain inappropriate content or rude/unconventional language
  2. Do not include your email id in the sent box
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy

A

the right of an individual to control when, where and to what extent their personal information is being exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent spamming?

A
  1. Identify spam emails and delete them
  2. Update your software regularly
  3. Use a spam filtering or blocking software
  4. Reject any instant messages from unknown people online
  5. Do not click on any URL present in the emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to protect your right to privacy?

A
  1. Carefully share your personal information
  2. Never share your login details
  3. Disable cookies
  4. Delete any information not in use
  5. Do not click on unauthorised links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software Piracy

A

the malicious activity of when a software is copied and distributed illegally without any license or authentication

17
Q

Acts that support Software Piracy.

A
  1. Softlifting: buying a single licensed software and downloading it on many different computers
  2. making unauthorised copies and distributing them
  3. renting a CD/DVD and then selling them
18
Q

Preventing Software Piracy

A
  1. Buying an authentic software
  2. Downloading it from the manufacturer’s website
  3. Buying it from a reputed source
  4. Registering the software
19
Q

Intellectual Property Rights

A

legal property rights that grant a person legal right of his/her creations, either commercial or artistic.
–safeguarding them from unauthorized copying or piracy.

20
Q

Patent

A

Sole right to an individual or company to manufacturing and selling an invention for a specific period of time.
–20 yrs in India

21
Q

Copywrite

A

Legal document given by the government to the creator of its original work
–prohibits others from copying, translating or distributing the work
–for novels or works of art
– lasts more than 70 years

22
Q

Trademark

A

A trademark can be any word, phrase, symbol, design, or a combination of these things that identifies your goods or services.

It’s how customers recognize you in the marketplace and distinguish you from your competitors.

Lasts for 10 years

23
Q

Digital Footprint

A

impressions or information left on a website by a person due to his/her online activity

also called digital dossier

e.g. logging into a website

24
Q

Active and Passive Digital Footprints

A

– Active: left intentionally by a person
e.g. emails. chats
– Passive: left unintentionally by a person
e.g. data traces, searches or online shopping

25
Q

Guidelines for maintaining a good Digital Footprint

A

–do not post something silly
–turn on privacy settings
–do not log into inappropriate websites

26
Q

cookies

A

texts that collect data from browser history and report it to the host

27
Q

cybertrafficking

A

serious crime of selling drugs, weapons and even human being over the internet

28
Q

Defamation

A

communication that intends to harm the reputation of a person, business or a company

29
Q

Keyloggers

A

programs that are used to check the user’s keystroked and get important passwords/information

30
Q

Social Engineering

A

psychological manipulation of a person into divulging in certain action or giving important information

31
Q

Clickjacking

A

malicious technique of tricking a web user into clicking on something different from what they perceive
this reveals confidential information or innocuous web pages

32
Q

Vishing

A

voice and phishing
– using social influence to take over a telephone system and gaining access to sensitive information

33
Q

Bot

A

crime-ware application that performs a wide variety of automated tasks on the behalf of criminals

34
Q

Cyberespionage

A

act of finding information from rival groups or parties and using it for some advantage