0% found this document useful (0 votes)
268 views6 pages

CYBER ETHICS Notes

Uploaded by

nagpatneyv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
268 views6 pages

CYBER ETHICS Notes

Uploaded by

nagpatneyv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CYBER ETHICS

Ethics is a system of moral principles that differentiates between good and bad
practices. Computer ethics involved the code of conduct to use information
technology in a responsible way. It fulfils the requirement of individual users
without manipulating or destroying the data of any other users.
Netiquette
The term netiquette is a combination of two words net (Internet) and etiquettes
(Good Manner). It is defined as a special set of rules that govern the behaviour of
a user communicating online. The communication can be via emails, forums,
blogs and social networking sites etc.
There are some guidelines to follow while communicating online
 Use proper salutation and signature: When communicating online
always begin your message with a salutation and it with your name or
signature.
 Include a subject line: Give a descriptive phrase in the subject line of the
message header that conveys the purpose of the message.
 Keep your message concise: Be precise and catchy while drafting a
message so that people can quickly read it.
 Respect others privacy: Do not read or forward another person’s mail
without seeking his permission going through another person’s works
could land you in trouble.
 Use appropriate language: Remember to check your spelling and
grammar before posting your message or is understand whatever you are
expressing it all makes sense be polite and courteous to everyone.
CYBER ETHICS FOR E-COMMERCE:
The internet has significantly changed the way of conducting business all over the
world. E-Commerce stands for electronic commerce which refers to the
transaction of goods and services online using the internet. The internet offers a
convenient way to shop from our homes or offices for almost everything we can
buy or sell new as well as a second hand goods while buying and selling products
each associate should stick to ethical conduct a show that no one is treated a trick
in any form.
FRAUD
E-Commerce fraud is an illegal transaction performed on an ecommerce platform
by a criminal or fraudster by using stolen payment information for online
transactions without the account owner’s knowledge. It is also known as
purchase fraud. It can be done by using a false identity, stolen credit card, fake
cards, and details, false personal and card information, etc.
Types of E-commerce Fraud:
1. Identity theft: Identity theft or identity fraud takes place when an
impostor obtains and uses personally identifiable and financial
information of another person. This is the form of illegal impersonating. It
is the unauthorized use of personal and financial data.
2. Misleading product listing: In the case of e-commerce the customers can
not touch the product which they are buying. The bias rate descriptions
and that may give a little or an accurate account of the product.
3. Fraudulent payment: These are the payments made using A stolen credit
cards or bank account information.
4. Charity fraud: It is a type of online is camp where the victim willingly give
the money under the false Britain's the criminal appeals to your sense of
righteousness by posing a representative of a charitable organisation
dedicated to an important cause liver cancer or its search.

WAYS TO PREVENT E-COMMERCE FRAUD:

1. Keep your computers and mobile devices up to date. Having the latest
security software, web browser, and operating system are the best
defences against viruses, malware, and other online threats. Turn on
automatic updates so you receive the newest fixes as they become
available.

2. Set strong passwords. A strong password is at least eight characters in


length and includes a mix of upper and lowercase letters, numbers, and
special characters.

3. Watch out for phishing scams. Phishing scams use fraudulent emails and
websites to trick users into disclosing private account or login information.
Do not click on links or open any attachments or pop-up screens from
sources you are not familiar with. Forward phishing emails to the Federal
Trade Commission (FTC) at [email protected] – and to the company, bank, or
organization impersonated in the email.

4. Keep personal information personal. Hackers can use social media profiles
to figure out your passwords and answer those security questions in the
password reset tools. Lock down your privacy settings and avoid posting
things like birthdays, addresses, mother’s maiden name, etc. Be wary of
requests to connect from people you do not know.

5. Secure your internet connection. Always protect your home wireless


network with a password. When connecting to public Wi-Fi networks, be
cautious about what information you are sending over it.

6. Shop safely. Before shopping online, make sure the website uses secure
technology. When you are at the checkout screen, verify that the web
address begins with https. Also, check to see if a tiny locked padlock
symbol appears on the page.
7. Read the site’s privacy policies. Though long and complex, privacy policies
tell you how the site protects the personal information it collects. If you
don’t see or understand a site’s privacy policy, consider doing business
elsewhere.

SECURE DATA TRANSMISSION:

Secure data transmission means that data/information is not being received or


modified by an unauthorized person, over a network, from source to destination.
For secure data transmission, we can convert an actual message (which is in
readable form) into an unreadable message (called an encrypted message) with
the help of the concept of encryption. This unreadable message is sent through
the network to the destination. If a hacker tries to read this message, he/she
receives an unreadable message that cannot be easily converted into the actual
message. The unreadable message can be converted to the original message by
the receiver at the destination.

Techniques that may be applied to ensure secure data transmission:

1. Authentication and authorization: Authentication is the process of


determining whether someone or something is, in fact, who or what it
declares itself to be. ... Users are usually identified with a user ID, and
authentication is accomplished when the user provides a credential, for
example a password, that matches with that user ID.
Authorization is the process of giving someone permission to do or have
something. ... Thus, authorization is sometimes seen as both the
preliminary setting up of permissions by a system administrator and the
actual checking of the permission values that have been set up when a user
is getting access.
2. Intrusion detection system: An intrusion detection system (IDS) is a device
or software application that monitors a network for malicious activity or
policy violations. Any malicious activity or violation is typically reported or
collected centrally using a security information and event management
system.
3. Cryptography/Encryption: In cryptography, encryption is the process of
encoding information. This process converts the original representation of
the information, known as plaintext, into an alternative form known as
cipher text. Ideally, only authorized parties can decipher a cipher text back
to plaintext and access the original information.
4. Password and Pin Numbers: Never share your password and Pin Number
with unauthorised personnel, under any circumstances.
INTELLECTUAL PROPERTY RIGHTS:
Intellectual property is a category of property that includes intangible creations
of the human intellect. There are many types of intellectual property:
(1)Industrial Property: These include patents for inventions, industrial
designs (aesthetic creations related to the appearance of industrial
products), trademarks, layout-designs of integrated circuits, commercial
names and design- nations, geographical indications and protection
against unfair competition.
(2)Copyright: Copyright refers to the legal right of the owner of intellectual
property. In simpler terms, copyright is the right to copy. This means that
the original creators of products and anyone they give authorization to are
the only ones with the exclusive right to reproduce the work.
(3)Digital Property: Digital property (or digital assets) refers to any
information about you or created by you that exist in digital form.
Digital Property Rights Include:
Digital property includes data, Internet accounts, and other rights in the digital
world, including contractual rights and intellectual property rights. Data are the
files and information stored and used by computers (such as e–mails, word
processing documents, spread sheets, pictures, audio files, and movies). This data
may be stored locally on a computer’s hard drive or on removable media, or data
may be stored remotely and accessed over the Internet.

THREATS TO DIGITAL PROPERTY:

Some common threats to digital properties :

1. Digital software penetration tools: - Although one needs to buy usage rights
or license to use a digital property, there are many software penetration tools
such as cracks and keygens, tools created by hackers to penetrate your software's
registration system and enable unauthorized users to freely access your software
without actually paying for it.
2. Stealing and plagiarizing codes of your digital properties: - Sometimes
other developers somehow get hold of your software's source code and then
create plagiarized versions of your code and use it in their own software. In other
words, they steal your software's source code and use it to build their own
versions of it, and then sell it under their own company name.

WAYS TO PROTECT DIGITAL PROPERTY RIGHTS:

 Be aware of your Intellectual Property Rights.


 Consult an expert.
 Double check if your idea is unique.
 Keep a record of almost everything related.
 Protect your IP without delay.

PLAGIARISM: Plagiarism is the representation of another author's language,


thoughts, ideas, or expressions as one's own original work.
TYPES OF PLAGIARISM:

1. Direct Plagiarism:Most commonly, the crime of plagiarism involves


adopting parts from the writing of another writer without proper mention
of the source. Often the person copying from the text does not change even
a single word. The plagiarist can also change parts of sentences or replace
some of the words with his/her own. However, it also comes under the
crime of plagiarism.

2. Mosaic Plagiarism: There is another type of plagiarism which is


unintentional. In this case, the plagiarist may have mentioned the source of
the content he has referred to. But, if he/she does not acknowledge the
quoted part or put them under the quotation marks correctly, then the
writer commits the crime of plagiarism.
3. Self-Plagiarism: Self-plagiarism is one of the common types of plagiarism,
where high school students copy and paste part of their previously
submitted academic paper. If the student submits the same paper for two
different class projects without asking the concerned teacher, then that is
considered as self-plagiarism.
4. Accidental Plagiarism: Another common form of plagiarism involves
accidental plagiarism. When the plagiarist misquotes the phrases or parts
of the text he/she has taken from the source material or does not cite the
source even or adequately or cites a wrong source, they that is considered
as plagiarism.

STEPS TO PREVENT PLAGIARISM:

 Paraphrase your content. Do not copy–paste the text verbatim from the
reference paper.
 Use Quotations.
 Cite your Sources – Identify what does and does not need to be cited.
 Maintain records of the sources you refer to. ...
 Use plagiarism checkers.

FREEDOM OF INFORMATION:
Freedom of Information (FOI) is a concept that broadly refers to the principle
that individuals and the public at-large have the right to access information that
is pertinent to their interests. The United Nations recognizes freedom of
information as a fundamental human right.
DIGITAL DIVIDE: The digital divide refers to the gap between demographics and
regions that have access to modern information and communications
technology and those that don't have access.
HOW TO BRIDGE THE DIGITAL GAP:The digital gap must be breast before it is
too late it can be achieved with the efforts of both the government and the
citizens of the nation

BY THE GOVERNMENT

 The government should conduct awareness camp and classes for the
enquiry to address their hesitation of using information technology.
 The entire government institute must be encouraged to propose
various computer courses at nominal fees.
 The government should provide internet access to the remotest part of
the country.
 The government should provide computers and tablet at a low price to
the students.

THE CITIZENS

 We can help someone in learning computers by assisting and conducting


classes for them at regular intervals.
 We can also give our old computers to a person who cannot buy a
computer for themselves.

DIFFERENCE BETWEEN OPEN SOURCE AND FREE SOFTWARE:

Free Software:
Free software” means software that respects users’ freedom and community.
Roughly, it means that the users have the freedom to run, copy, distribute,
study, change and improve the software.

The term “free software” is sometimes misunderstood—it has nothing to do


with price. It is about freedom.
Open Source Software:
Open Source Software is something which you can modify as per your needs,
share with others without any licensing violation burden. When we say Open
Source, source code of software is available publicly with Open Source licenses
like GPL (General Public License) which allows you to edit source code and
distribute it.
Free and open-source software (FOSS):
Free and open-source software (FOSS) is software that is both free
software and open-source software where anyone is freely licensed to use, copy,
study, and change the software in any way, and the source code is openly shared
so that people are encouraged to voluntarily improve the design of the software.

You might also like