Beruflich Dokumente
Kultur Dokumente
What is Ethics?
Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral
principles that regulate the use of computers.
Some common issues of computer ethics include
• Intellectual property rights (such as copyrighted electronic content)
• Privacy concerns,
• How computers affect society.
For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do
so without the author's approval. And while it may be possible to access someone's personal information on a computer system,
computer ethics would advise that such an action is unethical.
Ethical behavior is not necessarily related to the law.
• For example, just because something is not against the law doesn't mean it is okay to do it.
Philosophers today usually divide ethical theories into three general subject areas:
• Met ethics:-
• Met ethics investigates where our ethical principles come from, and what they mean. Are they merely social
inventions?
• Normative ethics:-
• Normative ethics takes on a more practical task, which is to arrive at moral standards that regulate right and wrong
conduct.
• Applied ethics:-
• Finally, applied ethics involves examining specific controversial issues, such as abortion, infanticide, animal rights,
environmental concerns, etc.
(you do not have to memorise this…this is just for information)
Computer ethics is concerned with the procedures, values and practices that govern the process of consuming computing technology and
its respective disciplines without harming or violating the moral values and beliefs of any personal, organization or entity.
“Computer ethics can be understood as that branch of applied ethics which studies and analyzes social and ethical impact of
information technology.”
Violation of copyright law may results in fines, imprisonment or Plagiarism may result in academic dismissal or loss of job.
both.
Freeware, Shareware and Free Software (Open Source):-
Hacking:-
Types of Hackers:-
White Hat Hackers Grey Hat Hackers Black Hat Hackers
People who Specialise hacking to Exploit the systems security to gain People who break into networks and
check the system faults. the attention of the owners. harm to the network and property.
They are the good guys. Also known
as ethical hackers.
Hacking Vs Cracking:-
Note the difference between CRACKING and HACKING. Hacking is breaking into a computer system to steal personal data without
the owner’s consent or knowledge (e.g. to steal a password file). Cracking is where someone edits a program source code (i.e. looks for a
‘back door’ in the software so that the code can be exploited or changed for a specific purpose). This is usually done for a malicious
purpose (e.g. legitimate software could be altered by a cracker to perform a different task e.g. send a user to a specific website).
Essentially, hacking isn’t necessarily harmful whilst cracking is ALWAYS totally illegal and is potentially very damaging.
• A computer virus is a program that attaches itself to an application or "host file" and then spreads by making copies of it. Some
type of human action (e.g. opening an attachment) is always required for a virus to take effect. Once a virus gets onto your
computer it might modify, delete, or steal your files, make your system crash, or take over your machine.
• A computer worm is like a virus, but it infects other computers all by itself, without human action and without a host file. It
usually infects other computers by sending emails to all the names in your email address book.
• A Trojan horse is a program that tricks you into running it by appearing useful or harmless. However, once it is run, it damages
your computer, usually by providing "back door" access to the computer. This allows hackers to control or use your computer,
destroy or steal files, install viruses or spyware, or run arbitrary programs.
• A root kit is a program that allows an intruder to gain access to your system without your knowledge by hiding what it is doing
on the system. The intruder can then install difficult-to-detect back doors into your system to seize control.
Phishing:-
Wardriving:-
Spyware:-