You are on page 1of 2

CYBERETHICS IN ONE GO...

Key points for revision before your examination.

 Exploring ethial behaviour related to online environment is known as CYBER


ETHICS
 Copyright property and industrial property they both come under INTELLECTUAL
PROPERTY. Ex : Designing a company logo, designing a software etc
 Intellectual Property Rights cover Copyrights, Patent and Trademark.
 Digital Property is also known as Digital Assets/Digital Estate.
 Software that provides freedom to use it and can be modifed are called as FOSS
(Free and Open Source)
 The unauthorised use of thoughts of another author and representation of the same
as one’s own original work is called as PLAGIARISM. This word is derived from
Latin word PLAGIARIUS
 If the original is rephrased with same meaning it is known as PLAGIARISM
 A technique in which a message is converted into an unreadable format is called as
ENCRYPTION and the encoded text or message is known as CIPHER TEXT. The
reverse process is known as DECRYPTION.
 Sending mails and newsletters of fake charity schemes, investment etc asking for
money etc is known as SCAM.
 Cracking of software license keys and hacking streaming media without permission
is known as DIGITAL SOFTWRAE PIRACY
 Industrial designs and patent are examples of industrial property rights.
 ADWARE tracks your Internet browsing habits and sends pop-ups containing
advertisements.
 INFORMATION SECURITY plays an important role in growth of E-commerce.
 In E-commerce, an important factor of privacy is CONSUMER CONSENT.
 Fraud committed using Internet is called ONLINE FRAUD.
 Full form of SSL is Secure Socket Layer
 Full form of GNU is GNU Not UNIX
 The frst copy left license was made available by GNU which is known as GPL and it
stands for General Public License
 Public Domain Software are those that can be used by any person, not only
programmer, not only a particular system or so. Hence they are COMMUNITY
SUPPORTED softwares.
 The least restrictive open source license is MIT
 Policies of companies related to protection of personal information of online users
are known as PRIVACY.
 Email account, social media account, online shopping account, own registered
domain name etc are collectively called DIGITAL PROPERTY.
 ANTIVIRUS is a software that is designed to help the user’s computer detect the
virus and avoid them.
 QuickHeal, Kaspersky, McAfee are some of the antivirus software.
 CYBER LAW refers to all the legal and regulatory aspects of Internet and World Wide
Web.
 COPYRIGHT gives protection to original work.
 Proprietary Software : neither free nor open source.
 Free Software : Free to use (not in terms of cost but in terms of freedom)
 Freeware : Free of cost and no source code is available.
 OSS : Open source software
 Shareware : For which license fee is to be payable after some time limit.
 Shareware is a distribution method to judge the software whether it is good or bad
before you pay for it. This is because after some time only the payment for it is
required.
 OSS for web designing is Nvu
 When a person is harassed repeatedly by being followed, he/she is a target of
STALKING or CYBER STALKING
 Unauthorised access is a network security issue.
 Changing the passwords frequently improves the security of our online accounts.
 Encryption improves network security. Also, it retains privacy of data from third
parties.
 A plain text ‘TOM’ can be encrypted to ‘VQO’ if key is 2. (Key 2 means an original
letter is converted into its next to next letter. ‘T’ + 2 = ‘V’. Similarly, other characters
can be done.)
 HTTPS is Hypertext transfer protocol secured.
 IDS stand for Intrusion Detection System.
 SSL primarily focuses on Integrity and Authenticity
 To avoid plagiarism the following can be used
CITATION : Within the text which includes author’s name.
REFERENCES : Just like bibliography at the end of the book.
PARAPHRASING : Re creating the idea in own words.
QUOTATION : It is mentioning the name of the author in the manner
“According to ......”
 The name of the IT Law that India is having in the Indian Legislature is India’s
Information Technology (IT) Act 2000 and it came into existence in the year
2000.
 Cyber Crimes:
Phishing : Extracting information like credit card details, password etc.
Cyber Stalking : Harassing an individual, a group or an organization.
Eavesdropping : Interception of the communication between two parties by a
malicious third party.
Scams : Online business practice that extracts money from online
users.
 Malwares:
VIRUS : Malware that afects the system and corrupt the data
WORMS : It replicates itself and flls the computer memory
ADWARE : Pop-ups fashing on screen and containing malicious code.
SPYWARE : Code that secretly monitors the user activities.

NOTE : Learn all the full forms for both HTML and CYBER ETHICS. Also while
solving the question check carefully about the word NOT asked in question and
answer them very carefully....
Ex : Which if the following statement is not correct?
In such case you have to fnd out the statement or the option that is
incorrect.

*****************

You might also like