netiquette-and-computer-ethics
netiquette-and-computer-ethics
COMPUTER ETHICS
Does social norms and ethical
standards in real world applies
even in digital world?
• Netiquette
• the forms of
required by good
breeding or
prescribed by
authority to be
required in social or
official life.
• netiquette is a set
of rules for
behaving properly
online.
• Netiquette
CyberCrime
• defined as a crime in which
a computer is the object of
the crime (hacking,
phishing, spamming and
child pornography) is used
as a tool to commit an
offense.
Cybercriminals may
use computer
technology to access
personal information,
business trade secrets
or use the internet for
exploitative or
malicious purposes.
Republic Act No. 10175
Cybercrime Prevention Act
of 2012
• a law in the Philippines
approved on September
12,2012 which aims to
address legal issues
concerning online
interactions and internet.
a. Copyright
• Copyright
Infringement
b. Plagiarism
c. Computer Addiction
• Offline/Online:
• Virtual Self
Criminal Activities
• a. Hacking
• Unauthorized access of or
interference with computer
systems, servers, or other
information and communication
systems.
• Illegal Downloading
• Obtaining files that you do not
have the right to use from the
internet.
• Digital Piracy
• Practice of illegally copying
and selling digital music,
video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500,
000 and or prison mayor
d. Cyberbullying
- Is an unprivileged false
statement of fact which
tends to harm the
reputation of a person or
company.
- Penalty of 6-12 years of
imprisonment or prison
mayor.
INTERNET
THREATS
Hacking is a term used to describe
actions taken by someone to gain
unauthorized access to a computer.
What it can do
- Find weaknesses (or pre-existing
bugs) in your security settings and
exploit them in order to access your
information.
- Install a Trojan horse, providing a
back door for hackers to enter and
search for your information.
Malware is one of the more
common ways to infiltrate or
damage your computer.
What it can do
- Intimidate you with scareware, which is
usually a pop-up message that tells you your
computer has a security problem or other
false information.
- Reformat the hard drive of your computer
causing you to lose all your information.
- Alter or delete files. Steal sensitive
information. Send emails on your behalf.
- Take control of your computer and all the
software running on it.
Pharming is a common type of
online fraud. A means to point you
to a malicious and illegitimate
website by redirecting the
legitimate URL. Even if the URL is
entered correctly, it can still be
redirected to a fake website.
What it can do
- Convince you that the site is real and
legitimate by spoofing or looking almost
identical to the actual site down to the
smallest details. You may enter your personal
information and unknowingly give it to
someone with malicious intent.
Phishing is used most often by
cyber criminals because it's easy to
execute and can produce the
results they're looking for with very
little effort. Fake emails, text messages
and websites created to look like they're
from authentic companies. This is also
known as “spoofing”.
What it can do
- Trick you into giving them information by
asking you to update, validate or confirm your
account. It is often presented in a manner than
seems official and intimidating, to encourage
you to take action.
Ransomware is a type of malware
that restricts access to your
computer or your files and displays
a message that demands payment
in order for the restriction to be
removed.
What it can do
- Ransomware will display a notification stating
that your computer or data have been locked
and demanding a payment be made for you to
regain access. Sometimes the notification
states that authorities have detected illegal
activity on your computer, and that the
payment is a fine to avoid prosecution.
- 2 types: Lockscreen and Encryption
Spam is one of the more common
methods of both sending
information out and collecting it
from unsuspecting people.
What it can do
- Annoy you with unwanted junk mail.
- Create a burden for communications service
providers and businesses to filter electronic
messages.
- Phish for your information by tricking you into
following links or entering details with too-
good- to-be-true offers and promotions.
- Provide a vehicle for malware, scams, fraud
and threats to your privacy.
Spyware and adware are Software
that collects personal information
about you without you knowing.
These are difficult to remove and
can infect your computer with virus
What it can do
- Collect information about you without you
knowing about it and give it to third parties.
- Send your usernames, passwords, surfing
habits, list of applications you've downloaded,
settings, and even the version of your
operating system to third parties.
- Change the way your computer runs without
your knowledge.
- Take you to unwanted sites or inundate you
with uncontrollable pop-up ads.
Trojan Horses. A malicious
program that is disguised as, or
embedded within, legitimate
software.
What it can do
- Delete your files.
- Use your computer to hack other computers.
- Watch you through your web cam.
- Log your keystrokes (such as a credit card
number you entered in an online purchase).
- Record usernames, passwords and other
personal information.
Viruses. Malicious computer
programs that are often sent as
an email attachment or a
download with the intent of
infecting your computer, as
well as the computers of
everyone in your contact list.
What it can do
- All imaginable harm to your
computer/device, files and drives
that can even extend to contact
lists from your emails.
How will you know if your computer is infected?
- It takes longer than usual for your computer to start up, it restarts on its
own or doesn't start up at all.
- It takes a long time to launch a program.
- Files and data have disappeared.
- Your system and programs crash constantly.
- The homepage you set on your web browser is different (note that this
could be caused by Adware that has been installed on your computer).
- Web pages are slow to load.
- Your computer screen looks distorted.
- Programs are running without your control.
- If you suspect a problem, make sure your security software is up to date
and run it to check for infection. If nothing is found, or if you are unsure
of what to do, seek technical help.
Worms are a common threat to
computers and the Internet as a
whole.
- goes to work on its own without
attaching itself to files or programs.
- It lives in your computer memory,
doesn't damage or alter the hard drive
and propagates by sending itself to
other computers in a network whether
within a company or the Internet itself.
What it can do
- Cause a tremendous amount of damage by
shutting down parts of the Internet, wreaking
havoc on an internal network and costing
companies’ enormous amounts of lost revenue.
WiFi eavesdropping is
another method used by
cyber criminals to capture
personal information. Virtual
“listening in” on information
that's shared over an unsecure
(not encrypted) WiFi network.
What it can do
- Potentially access your computer with
the right equipment.
- Steal your personal information
including logins and passwords.
THAT'S ALL FOR MIDTERM
EXAM!
Goodluck!