Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
10 views

netiquette-and-computer-ethics

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

netiquette-and-computer-ethics

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

NETIQUETTE AND THE

COMPUTER ETHICS
Does social norms and ethical
standards in real world applies
even in digital world?
• Netiquette

• the forms of
required by good
breeding or
prescribed by
authority to be
required in social or
official life.
• netiquette is a set
of rules for
behaving properly
online.
• Netiquette

• The word comes from


Network etiquette.
• is concerned with the
"proper" way to
communicate in an
online environment.
Important words to
remember
• The Golden Rule
• Avoid slang, acronym or text
talk
• Avoid "screaming" in text
messages
• Proofread your messages
before sending them
• Exercise good judgement when
sharing information with others
• Respect diversity in viewpoints
10 Core Rules of Netiquette
Adapted from Virginia Shea

- Remember the human - Share expert


- Adhere to the same knowledge
standards of behavior - Help keep flame wars
online that you follow under control
in real life - Respect other people's
- Know where you are in privacy
the cyberspace - Don’t abuse your
- Respect people's time power
and bandwidth - Be forgiving with other
- Make yourself look people's mistake
good online
CyberCrimes
What is Cyber?
• It is anything that is related
to computers, information
technology and virtual
reality

CyberCrime
• defined as a crime in which
a computer is the object of
the crime (hacking,
phishing, spamming and
child pornography) is used
as a tool to commit an
offense.
Cybercriminals may
use computer
technology to access
personal information,
business trade secrets
or use the internet for
exploitative or
malicious purposes.
Republic Act No. 10175
Cybercrime Prevention Act
of 2012
• a law in the Philippines
approved on September
12,2012 which aims to
address legal issues
concerning online
interactions and internet.

Republic Act No. 10173 Data


Privacy Act of 2012
• an act protecting individual
personal information.
COMMON FORMS OF
CYBERCRIMES:

a. Copyright
• Copyright
Infringement

b. Plagiarism

c. Computer Addiction
• Offline/Online:
• Virtual Self
Criminal Activities
• a. Hacking
• Unauthorized access of or
interference with computer
systems, servers, or other
information and communication
systems.

• corrupt, alter, steal, or destroy


electronic data using computers or
other information and
communication systems without the
computer or system owner’s
knowledge and consent.

• penalty is between 12-20 years


reclusion temporal 6-12years of
imprisonment also known as prison
mayor.
b. Computer-related forgery,
fraud and/or identity theft
• An attempt to obtain sensitive
information such as
usernames, passwords, and
credit card details and
(indirectly money), often for
malicious reasons.
• Phishing
• Pharming / Spam
• Maximum of Php 200,000 fine
or prison mayor
c. Electronic theft

• Illegal Downloading
• Obtaining files that you do not
have the right to use from the
internet.
• Digital Piracy
• Practice of illegally copying
and selling digital music,
video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500,
000 and or prison mayor
d. Cyberbullying

• The use of electronic


communication to
bully a person,
typically by sending a
message of an
intimidating or
threatening nature.
• The Anti-Bullying Act
of 2013 (RA 10627)
e. Cybersex

• Willful engagement, maintenance, control, or operation, directly or


indirectly of any lascivious exhibition of sexual organs or sexual activity
with the aid of a computer system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
f. Child Pornography

- Is a form of child sexual exploitation.


- Unlawful or prohibited acts defined
and punishable by Republic Act No.
9775 or the Anti- Child Pornography
Act of 2009, committed through a
computer system.
- Penalty of 12-20 years of
imprisonment or reclusion temporal
g. Cyber Defamation

- Is an unprivileged false
statement of fact which
tends to harm the
reputation of a person or
company.
- Penalty of 6-12 years of
imprisonment or prison
mayor.
INTERNET
THREATS
Hacking is a term used to describe
actions taken by someone to gain
unauthorized access to a computer.

What it can do
- Find weaknesses (or pre-existing
bugs) in your security settings and
exploit them in order to access your
information.
- Install a Trojan horse, providing a
back door for hackers to enter and
search for your information.
Malware is one of the more
common ways to infiltrate or
damage your computer.

What it can do
- Intimidate you with scareware, which is
usually a pop-up message that tells you your
computer has a security problem or other
false information.
- Reformat the hard drive of your computer
causing you to lose all your information.
- Alter or delete files. Steal sensitive
information. Send emails on your behalf.
- Take control of your computer and all the
software running on it.
Pharming is a common type of
online fraud. A means to point you
to a malicious and illegitimate
website by redirecting the
legitimate URL. Even if the URL is
entered correctly, it can still be
redirected to a fake website.

What it can do
- Convince you that the site is real and
legitimate by spoofing or looking almost
identical to the actual site down to the
smallest details. You may enter your personal
information and unknowingly give it to
someone with malicious intent.
Phishing is used most often by
cyber criminals because it's easy to
execute and can produce the
results they're looking for with very
little effort. Fake emails, text messages
and websites created to look like they're
from authentic companies. This is also
known as “spoofing”.

What it can do
- Trick you into giving them information by
asking you to update, validate or confirm your
account. It is often presented in a manner than
seems official and intimidating, to encourage
you to take action.
Ransomware is a type of malware
that restricts access to your
computer or your files and displays
a message that demands payment
in order for the restriction to be
removed.

What it can do
- Ransomware will display a notification stating
that your computer or data have been locked
and demanding a payment be made for you to
regain access. Sometimes the notification
states that authorities have detected illegal
activity on your computer, and that the
payment is a fine to avoid prosecution.
- 2 types: Lockscreen and Encryption
Spam is one of the more common
methods of both sending
information out and collecting it
from unsuspecting people.

What it can do
- Annoy you with unwanted junk mail.
- Create a burden for communications service
providers and businesses to filter electronic
messages.
- Phish for your information by tricking you into
following links or entering details with too-
good- to-be-true offers and promotions.
- Provide a vehicle for malware, scams, fraud
and threats to your privacy.
Spyware and adware are Software
that collects personal information
about you without you knowing.
These are difficult to remove and
can infect your computer with virus

What it can do
- Collect information about you without you
knowing about it and give it to third parties.
- Send your usernames, passwords, surfing
habits, list of applications you've downloaded,
settings, and even the version of your
operating system to third parties.
- Change the way your computer runs without
your knowledge.
- Take you to unwanted sites or inundate you
with uncontrollable pop-up ads.
Trojan Horses. A malicious
program that is disguised as, or
embedded within, legitimate
software.

What it can do
- Delete your files.
- Use your computer to hack other computers.
- Watch you through your web cam.
- Log your keystrokes (such as a credit card
number you entered in an online purchase).
- Record usernames, passwords and other
personal information.
Viruses. Malicious computer
programs that are often sent as
an email attachment or a
download with the intent of
infecting your computer, as
well as the computers of
everyone in your contact list.

What it can do
- All imaginable harm to your
computer/device, files and drives
that can even extend to contact
lists from your emails.
How will you know if your computer is infected?
- It takes longer than usual for your computer to start up, it restarts on its
own or doesn't start up at all.
- It takes a long time to launch a program.
- Files and data have disappeared.
- Your system and programs crash constantly.
- The homepage you set on your web browser is different (note that this
could be caused by Adware that has been installed on your computer).
- Web pages are slow to load.
- Your computer screen looks distorted.
- Programs are running without your control.
- If you suspect a problem, make sure your security software is up to date
and run it to check for infection. If nothing is found, or if you are unsure
of what to do, seek technical help.
Worms are a common threat to
computers and the Internet as a
whole.
- goes to work on its own without
attaching itself to files or programs.
- It lives in your computer memory,
doesn't damage or alter the hard drive
and propagates by sending itself to
other computers in a network whether
within a company or the Internet itself.

What it can do
- Cause a tremendous amount of damage by
shutting down parts of the Internet, wreaking
havoc on an internal network and costing
companies’ enormous amounts of lost revenue.
WiFi eavesdropping is
another method used by
cyber criminals to capture
personal information. Virtual
“listening in” on information
that's shared over an unsecure
(not encrypted) WiFi network.

What it can do
- Potentially access your computer with
the right equipment.
- Steal your personal information
including logins and passwords.
THAT'S ALL FOR MIDTERM
EXAM!
Goodluck!

You might also like