Ethics in Computing
O8. ETHICS AND SAFETY MEASURES
Ethics:- It
refers to the principle that a follow to keep or maintain moral justice in the
society.
Computer Ethics:- It is a the concept that identifies the moral issues which are raised from the application
of I.T tools and address rights.
Ø
It
is the procedure, moral values and practices that govern the process of using
I.T resources and their related disciplines without damaging the ethics and
beliefs of any individuals.
Right To Privacy:- It refers to the concept that one can protect
of our personal information from public security. So, it can also be known as
information privacy.
Ø To
maintain the privacy of our personal information you should not disclose
his/her personal information.
Ø Privacy
is also to ensure that the information should be available to the authorized
user only.
Intellectual property
right:- It is the
legal right that covers the privileges for an individual who has created or
invented something with his own intellectual creativity and is the owner of his
work.
Ø There
are following intellectual property right such as:
1)
Patents.
2)
Copy right.
3)
Trademarks.
4)
Trade secret.
Plagiarism:- It
is the act of copying someone else work & publishing & proprieting it
as one’s own work.
Ø It
can include text, media and even ideas.
Ø It
is a serious problem in this time computer field or any other field. So, there
are laws in many places for protection against it. The most notable is the
“International copy right law”.
Cyber bullying :- It is a type
of harassment that takes place on internet by someone sending with absurd and
nasty messages, unethical videos, embarrassed pictures on social media.
Ø Cyber
bullying includes absurd and cheap messages or rumors sent by email.
Ø It
also includes faking someone’s profile or making fake profiles with wrong
intentions.
Hacking :- It refers to the unauthorized intrusion into a computer
or a network to steal data information of a computer system which is on
network.
Ø
A
person who perform this type of activity
is known as “Hacker”.
Ø
A
hacker may intrude or damage the security features of a computer network to
accomplish their goal.
Ø
Website
hacking, network hacking, account hacking etc. are the examples of hacking.
Ethical hacking :- It is also a type of hacking in which ‘cracker’
identifies the weakness in computer system or networks. And, suggests the
counter measures to over comes the weakness.
Ø Ethical
hackers must abide the following rules:-
1)
Get
written permission from the owner before hacking.
2)
Protect the privacy of the hacked system.
3)
Transparently report all the identified
weakness of the computer system to the owner.
Phishing :- It is a type of an unethical activity on internet in
which some miscreants try to lure the people with interesting messages and
offers which might look attractive but, are actually meant for cheating or
hacking.
Ø The
people on internet lured by the offers through spam emails, advertisement or
cloned/dublicate websites.
Spamming :- It is an unethical process which is performed by spammer.
Ø Who
send the spam is known as spammer.
Ø Spam
is unwanted, unsolicited junk email.
Ø But
now a day,spam messages are also received on mobile phones.
Software piracy :- It is an
unauthorized copying reproduction or users of software product.
Ø Installation
of any copy of the software by making its dublicate without his consent of
owner or without paying the cost to the owner is known as “software piracy”.
Ø It
is also harms the local and national economics as scare sales of original
software which results in the loss of tax revenue.
Ø There
are many types of piracies that are damaging the software developing companies
and the end users too.
Soft loading :- It means
purchasing a single license version of the software & then installing the
software into several computers resulting in the violence of license term.
Software counterfeiting :- The
process of making fake copies of software in such a way that they appear to be
authentic.
Ø Counterfeit
software is commonly produced by using a CD burner to copy the software &
by making photocopies of the manual.
Software overuse :- The licenses
for the usage of some software are given for a fixed period of time. Using the
software beyond its last date is a kind of piracy.
Online piracy :- It typically involves downloading a copy of software from websites, blocks, etc.
Hard disk loading :- The process of installation of an unauthorized copy
of software being sold to a customer.
Ø It
is often done by the hardware vendors in order to make the deal more
attractive.
Cyber crime :- The process of performing anti- social &
immoral internet activities (like: piracy, hacking, plagiarism etc.)are known as
cyber crimes.
Ø Almost
every country has its own specific cyber crimes controller department to deal
with cyber crimes.
Safety measures :- There are
various terms for making safety on internet. Such as :-
1)
Keep strong passwords
:- A password
which is difficult to detect by humans and computers both & effectively
protects data from unauthorized access.
Ø There
are some rules for making strong passwords. Such as :
a)
Password should be consists of at least eight
(8) characters.
b)
To make strong password we should use
alphabets (A to Z), numbers(1,2,3,4,5 etc.) and symbols(@,#,$,%,^,&,*,/,?,<,>,
”)etc.
Ø To make strong password we must
contain letters in both uppercase and lowercase also.
Protection using firewall
:- A firewall is
a network security system which is designed to prevent an unauthorized access
from private network.
Ø It
acts as a barrier between a “trusted network and un-trusted network”.
Ø Firewall
can be implemented in both hardware and software or a combination of both.
· Note:- Full
form of BAS is “Biometric attendance system”.
Digital footprint :- It refers to a unique set of traceable digital
activities, actions, contributions, communication of an individual that are
manifested on the internet or on platform through digital devices.
Ø It
is also known as digital shadow.
Ø There
are two classifications of digital footprint such as :
1)
Passive digital footprint :- It is created
when an individual’s digital activities are being traced without permission.
2)
Active digital footprint :-It is created
when a personal data (information) is deliberately shared by a user on social
media (like: Twitter, Facebook, Instagram),blogs etc.
Comments
Post a Comment
Hello students
If you have any doubt then let me know.