Ethics in Computing

 

O8. ETHICS AND SAFETY MEASURES

*    Ethics:- It refers to the principle that a follow to keep or maintain moral justice in the society.

 

*    Computer Ethics:- It is a the concept that identifies the moral issues which are raised from the application of I.T tools and address rights.

Ø It is the procedure, moral values and practices that govern the process of using I.T resources and their related disciplines without damaging the ethics and beliefs of any individuals.

 

*    Right To Privacy:- It refers to the concept that one can protect of our personal information from public security. So, it can also be known as information privacy.

Ø To maintain the privacy of our personal information you should not disclose his/her personal information.

Ø Privacy is also to ensure that the information should be available to the authorized user only.

 

*    Intellectual property right:- It is the legal right that covers the privileges for an individual who has created or invented something with his own intellectual creativity and is the owner of his work.

Ø There are following intellectual property right such as:

1)      Patents.

2)     Copy right.

3)     Trademarks.

4)     Trade secret.

 

*    Plagiarism:- It is the act of copying someone else work & publishing & proprieting it as one’s own work.

Ø It can include text, media and even ideas.

Ø It is a serious problem in this time computer field or any other field. So, there are laws in many places for protection against it. The most notable is the “International copy right law”.

 

*    Cyber bullying :- It is a type of harassment that takes place on internet by someone sending with absurd and nasty messages, unethical videos, embarrassed pictures on social media.

Ø Cyber bullying includes absurd and cheap messages or rumors sent by email.

Ø It also includes faking someone’s profile or making fake profiles with wrong intentions.

 

*    Hacking :- It refers to the unauthorized intrusion into a computer or a network to steal data information of a computer system which is on network.

Ø A person who perform this type of activity  is known as “Hacker”.

Ø A hacker may intrude or damage the security features of a computer network to accomplish their goal.

Ø Website hacking, network hacking, account hacking etc. are the examples of hacking.

 

*    Ethical hacking :- It is also a type of hacking in which ‘cracker’ identifies the weakness in computer system or networks. And, suggests the counter measures to over comes the weakness.

Ø Ethical hackers must abide the following rules:-

1)      Get written permission from the owner before hacking.

2)     Protect the privacy of the hacked system.

3)     Transparently report all the identified weakness of the computer system to the owner.

 

*    Phishing :- It is a type of an unethical activity on internet in which some miscreants try to lure the people with interesting messages and offers which might look attractive but, are actually meant for cheating or hacking.

Ø The people on internet lured by the offers through spam emails, advertisement or cloned/dublicate websites.

 

*    Spamming :- It is an unethical process which is performed by spammer.

Ø Who send the spam is known as spammer.

Ø Spam is unwanted, unsolicited junk email.

Ø But now a day,spam messages are also received on mobile phones.

 

*    Software piracy :- It is an unauthorized copying reproduction or users of software product.

Ø Installation of any copy of the software by making its dublicate without his consent of owner or without paying the cost to the owner is known as “software piracy”.

Ø It is also harms the local and national economics as scare sales of original software which results in the loss of tax revenue.

Ø There are many types of piracies that are damaging the software developing companies and the end users too.

 

*    Soft loading :- It means purchasing a single license version of the software & then installing the software into several computers resulting in the violence of license term.

 

*    Software counterfeiting :- The process of making fake copies of software in such a way that they appear to be authentic.

Ø Counterfeit software is commonly produced by using a CD burner to copy the software & by making photocopies of the manual.

 

*    Software overuse :- The licenses for the usage of some software are given for a fixed period of time. Using the software beyond its last date is a kind of piracy.


*    Online piracy :- It typically involves downloading a copy of  software from websites, blocks, etc.


*    Hard disk loading :- The process of installation of an unauthorized copy of  software being sold to a customer.

Ø It is often done by the hardware vendors in order to make the deal more attractive.

 

*    Cyber crime :- The process of performing anti- social & immoral internet activities (like: piracy, hacking, plagiarism etc.)are known as cyber crimes.

Ø Almost every country has its own specific cyber crimes controller department to deal with cyber crimes.

 

*    Safety measures :- There are various terms for making safety on internet. Such as :-

 

1)     Keep strong passwords :- A password which is difficult to detect by humans and computers both & effectively protects data from unauthorized access.

Ø There are some rules for making strong passwords. Such as :

a)     Password should be consists of at least eight (8) characters.

b)    To make strong password we should use alphabets (A to Z), numbers(1,2,3,4,5 etc.) and symbols(@,#,$,%,^,&,*,/,?,<,>, ”)etc.

Ø To make strong password we must contain letters in both uppercase and lowercase also.

 

*    Protection using firewall :- A firewall is a network security system which is designed to prevent an unauthorized access from private network.

Ø It acts as a barrier between a “trusted network and un-trusted network”.

Ø Firewall can be implemented in both hardware and software or a combination of both.

 

·      Note:- Full form of BAS is “Biometric attendance system”.

 

*    Digital footprint :- It refers to a unique set of traceable digital activities, actions, contributions, communication of an individual that are manifested on the internet or on platform through digital devices.

Ø It is also known as digital shadow.

Ø There are two classifications of digital footprint such as :

1)     Passive digital footprint :- It is created when an individual’s digital activities are being traced without permission.

2)     Active digital footprint :-It is created when a personal data (information) is deliberately shared by a user on social media (like: Twitter, Facebook, Instagram),blogs etc.

 

 This is posted by JYOTSHNA MISHRA of class 9th standard . She belongs to SSVM School.


 

 

 

 

 

 

Comments

Popular posts from this blog

HTML

Administration of the Internet

FUNDAMENTAL OF COMPUTER