Saturday, 27 March 2021

Cyber ethics and cyber Crime

 

Cyber ethics

Cyberethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.
1.   Privacy
privacy from an ethical and moral point of view to be "central to dignity and individuality and personhood. Privacy is also indispensable to a sense of autonomy — to 'a feeling that there is an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.'
2.     Intellectual property rights
The ever-increasing speed of the internet and the emergence of compression technology, such as mp3 opened the doors to Peer-to-peer file sharing, a technology that allowed users to anonymously transfer files to each other
3.   Security
It is better to protect the common good of the community or rather should we safeguard the rights of the individual. As an ever increasing amount of people connect to the internet and more and more personal data is available online there is susceptibility to identity theft, cyber crimes and computer hacking.
4.   Accuracy
Due to the ease of accessibility and sometimes collective nature of the internet we often come across issues of accuracy e.g. who is responsible for the authenticity and fidelity of the information available online. Who should be allowed to contribute content and who should be held accountable if there are errors in the content or if it is false.
5.     Freedom of information
Freedom of information, that is the freedom of speech as well as the freedom to seek, obtain and impart information brings up the question of who or what, has the jurisdiction in cyberspace. The right of freedom of information is commonly subject to limitations dependent upon the country, society and culture concerned.
Ten Commandments of Computer Ethics

The ethical values as defined in 1992 by the Computer Ethics Institute; a nonprofit organization whose mission is to advance technology by ethical means, lists these rules as a guide to computer ethics:
  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid.
  7. Thou shalt not use other people's computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.[20]
(ISC)² code of ethics
(ISC)² an organization committed to certification of computer security professional has further defined its own code of ethics generally as:
  1. Act honestly, justly, responsibly, and legally, and protecting the commonwealth.
  2. Work diligently and provide competent services and advance the security profession.
  3. Encourage the growth of research – teach, mentor, and value the certification.
  4. Discourage unsafe practices, and preserve and strengthen the integrity of public infrastructures.
  5. Observe and abide by all contracts, expressed or implied, and give prudent advice.
  6. Avoid any conflict of interest, respect the trust that others put in you, and take on only those jobs you are qualified to perform.
  7. Stay current on skills, and do not become involved with activities that could injure the reputation of other security professionals.[19]

              CYBER CRIME

Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
     Categories of  cyber crime
We can categorize cyber crime in two ways.
       The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.
       The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and  pornography etc.
Types of cyber crime
1.       HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government  websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. 
       { Motive behind the crime called HACKERS: Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services. }
2.       CHILD PORNOGRAPHY : The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles.
    { How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.}
TYPES OF CYBER CRIME
       DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks.
       VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc.
       COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
       CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc.
       SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
SAFETY TIPS TO CYBER CRIME
       Use antivirus Software
       Insert Firewalls
       Uninstall unnecessary software
       Maintain backup
       Check security settings

No comments:

Post a Comment