Cyber Ethics Flashcards
Internet
a global system of interconnected computer networks which allow users to share and receive information worldwide
{Misuse of such a resource can be hazardous}
Cyber Ethics
a set of moral principles or procedures that regulate the use of computers
- Avoid buying pirated softwares
- Do not spy on a another person’s data
- Do not use computer technology to disrupt another user’s work
- Be respectful and courteous while communicating on the internet
- Before developing a software, think about the social impact it can have
Plagiarism
the imitation or use of another person’s thoughts/ ideas, projected as your own
=> caused by arrogance, lack of interest, laziness or carelessness
=> stealing or passing off someone else’s work as your own
=>using someone else’s thoughts without crediting their source
=> commiting literary theft
=>deriving new data from existing source
Preventing Plagiarism
- Use quotation marks
- Citation (acknowledging the original writor)
- Rephrase the lines
- Encourage students to have their own thoughts
Cyberbullying
the act of harassing or targeting an individual online is called cyberbullying
1. insulting, spreading rumors or threatening
Preventing Cyberbullying
- restrict your online profile to your friends and family
- safeguard your logins and passwords
- get to know the people you interact with online before getting too comfortable
- Report any cyberbullying attack
- do not share your identity
Phishing
the act of sending an email to a person making them believe it is from a trusted source
– motive of stealing personal information, identity and commit crimes
Prevent Phishing
- Identify phishing emails
- Do not click on unauthorised links
- Do not enter your personal details on unsafe websites. A safe website always has ‘https//:’ in its URL.
- Protect your browser from phishing emails by using a firewall, spam filter, antivirus etc.
Hacking
the illegal intrusion on someone else’s computer for the motives of tampering data or inserting some malicious software to break down their security system.
– Ethical Hacking: done to identify faults in a companies’ software
– Cracking (similar term): entering malicious software into a computer
Preventing Hacking
- keep your password a secret and regularly change it
- Update your operating systems
- Do not use open wifi
- Never save your credit card number on a website
- Check the authenticity of a software before using it
- Use secure websites
Spamming
- sending bulk emails to an account from unknown sources
- Portrayed as commercial advertising but are used to deliver viruses or organise phishing attacks
- Mail Bombing: sending so many emails that the server gets full
How to identify spamming emails?
- Contain inappropriate content or rude/unconventional language
- Do not include your email id in the sent box
Privacy
the right of an individual to control when, where and to what extent their personal information is being exposed
How to prevent spamming?
- Identify spam emails and delete them
- Update your software regularly
- Use a spam filtering or blocking software
- Reject any instant messages from unknown people online
- Do not click on any URL present in the emails
How to protect your right to privacy?
- Carefully share your personal information
- Never share your login details
- Disable cookies
- Delete any information not in use
- Do not click on unauthorised links
Software Piracy
the malicious activity of when a software is copied and distributed illegally without any license or authentication
Acts that support Software Piracy.
- Softlifting: buying a single licensed software and downloading it on many different computers
- making unauthorised copies and distributing them
- renting a CD/DVD and then selling them
Preventing Software Piracy
- Buying an authentic software
- Downloading it from the manufacturer’s website
- Buying it from a reputed source
- Registering the software
Intellectual Property Rights
legal property rights that grant a person legal right of his/her creations, either commercial or artistic.
–safeguarding them from unauthorized copying or piracy.
Patent
Sole right to an individual or company to manufacturing and selling an invention for a specific period of time.
–20 yrs in India
Copywrite
Legal document given by the government to the creator of its original work
–prohibits others from copying, translating or distributing the work
–for novels or works of art
– lasts more than 70 years
Trademark
A trademark can be any word, phrase, symbol, design, or a combination of these things that identifies your goods or services.
It’s how customers recognize you in the marketplace and distinguish you from your competitors.
Lasts for 10 years
Digital Footprint
impressions or information left on a website by a person due to his/her online activity
also called digital dossier
e.g. logging into a website
Active and Passive Digital Footprints
– Active: left intentionally by a person
e.g. emails. chats
– Passive: left unintentionally by a person
e.g. data traces, searches or online shopping
Guidelines for maintaining a good Digital Footprint
–do not post something silly
–turn on privacy settings
–do not log into inappropriate websites
cookies
texts that collect data from browser history and report it to the host
cybertrafficking
serious crime of selling drugs, weapons and even human being over the internet
Defamation
communication that intends to harm the reputation of a person, business or a company
Keyloggers
programs that are used to check the user’s keystroked and get important passwords/information
Social Engineering
psychological manipulation of a person into divulging in certain action or giving important information
Clickjacking
malicious technique of tricking a web user into clicking on something different from what they perceive
this reveals confidential information or innocuous web pages
Vishing
voice and phishing
– using social influence to take over a telephone system and gaining access to sensitive information
Bot
crime-ware application that performs a wide variety of automated tasks on the behalf of criminals
Cyberespionage
act of finding information from rival groups or parties and using it for some advantage