You are on page 1of 46

Ethics and rules of netiquette

ethics
• Also known as moral philosophy is a branch
of philosophy that involves systematizing,
defending, and recommending
concepts of right and wrong conduct.
• Ethics seeks to resolve questions of
human morality by defining concepts such
as good and evil, right
and wrong, virtue and vice, justice and crime.
• The English word "ethics" is derived from the Ancient
Greek word ēthikós (ἠθικός), meaning "relating to one's
character“.
Ethics: Major branches
• Three major areas of study within ethics recognized today are:
– Meta-ethics, concerning
the theoretical meaning
and reference of moral
propositions, and how
their truth values (if any)
can be determined.
– Normative ethics, concerning the practical means of determining a
moral course of action
– Applied ethics, concerning what a person is obligated (or permitted)
to do in a specific situation or a particular domain of action
Ethics: Meta-Ethics
• Meta-ethics is the
branch of philosophical
ethics that asks how we
understand, know about,
and what we mean when
we talk about what is
right and what is wrong.
– For example:
"Is it ever possible to have secure knowledge of what is
right and wrong?" is a meta-ethical question.
Ethics: Meta-Ethics
Ethics: Normative ethics
• Normative ethics is the
branch of ethics that
investigates the set of
questions that arise
when considering how one
ought to act, morally
speaking.
– Normative ethics is distinct from meta-ethics because normative ethics
examines standards for the rightness and wrongness of actions, while
meta-ethics studies the meaning of moral language and the
metaphysics of moral facts.
Ethics: Applied ethics
• Applied Ethics refers to the practical application of moral considerations.
• It is ethics with respect to real-
world actions and their moral
considerations in the areas of
private and public life, the
professions, health, technology, law,
and leadership.
– For example, the bioethics
community is concerned with
identifying the correct approach to moral issues in the life sciences,
such as euthanasia, the allocation of scarce health resources, or the
use of human embryos in research.
Ethical position
• the ethical school that a given individual may be inclined
towards in comportment and behaviour.

-In other words, it relates to one’s


frame of mind given all the
reasoning made available to him/her that in turn warrants
their justification for their own actions within their focus of
control (ie. environment). 
Ethical Absolutism
• Absolutism is making normative ethical decisions based on
objective rules.
– It maintains that some things
are always right and
some things are always
wrong.
– They are fixed for all time,
places and people.
Ethical Relativism
• Relativism says that nothing is intrinsically right or wrong.
– Ethical relativism is the
theory that holds that
morality is relative to the
norms of one's culture. 
– That is, whether an
action is right or wrong
depends on the moral
norms of the society in
which it is practiced. 
Ethical egoism
• Ethical egoism is the normative ethical position that moral
agents ought to do what is in their own self-interest.
– Ethical egoism holds, therefore, that actions whose
consequences will
benefit the doer can be
considered ethical in
this sense.
• Ethical egoism was
introduced by the philosopher Henry Sidgwick in his book 
The Methods of Ethics, written in 1874.
Ethical egoism: Forms
Ethical Altruism
• Ethical Altruism is an ethical doctrine that holds that
the moral value of an individual's actions depend solely on
the impact on other individuals, regardless of the
consequences on the individual itself.
– James Fieser states the
altruist dictum as: "An
action is morally right if the
consequences of that
action are more favorable
than unfavorable to everyone
except the agent."
Ethical position
• -To different people, and ethical school of thought(s), the term
‘values’ can mean ‘the value people hold’, or it can mean ‘the
value something has’.
RULES OF NETIQUETTE
RULES OF NETIQUETTE
RULES OF NETIQUETTE
Security vs Safety
When we say -
• Security - We must protect our computers and
data in the same way that we secure the doors
to our homes.
 
• Safety - We must behave in ways that protect
us against risks and threats that come with
technology.
Threats, attacks & vulnerability
• Threat is the expressed potential for the
occurrence of a harmful event such as an
attack.
• Attack is an action taken against a target with
the intention of doing harm.
• Vulnerability is a weakness that makes targets
susceptible to an attack.
Threats, attacks & vulnerability
• Relationship:
– A threat is a potential for violation of security,
which exists when there is a circumstance,
capability, action, or event that could breach
security and cause harm. 
– In other words, a Threat is a possible Attack that
might exploit Vulnerability.
Cia triad
 It is a model designed to guide policies for information
security within an organization.
 The model is also sometimes referred to as the AIC triad
(availability, integrity and confidentiality) to avoid
confusion with the Central Intelligence Agency.
 The elements of the triad are considered the three most
crucial components of security: Confidentiality, Integrity, and
Availability
confidentiality
Confidentiality - protecting information from
being disclosed to unauthorized parties.
It also refers to measures undertaken to ensure
confidentiality are designed to prevent sensitive
information from reaching the wrong people, while
making sure that the right people can in fact get it.
Integrity
 Integrity - protecting information from being changed by
unauthorized parties.
It involves maintaining the consistency, accuracy, and
trustworthiness of data over its entire life cycle.
Availability
Availability - to the availability of information to
authorized parties only when requested.
It is best ensured by rigorously maintaining
all hardware, performing hardware repairs immediately
when needed and maintaining a correctly functioning
operating system environment that is free of software
conflicts.
Providing adequate communication bandwidth and
preventing the occurrence of bottlenecks are equally
important. 
INTERNET THREATS
INTERNET THREATS
1. Malware – stands for Malicious
Software.
2. Spam – unwanted email mostly from bots
or advertisers.
3. Phishing – its goal is to acquire sensitive
personal information like passwords and
credit card details.
INTERNET THREATS
INTERNET THREATS
4. SOCIAL ENGINEERING
– Manipulates people into performing actions or divulging confidential
information.
– Similar to a confidence trick or simple fraud, the term applies to the
use of deception to gain information, commit fraud, or access
computer systems.
5. BOTNET
– A botnet is a large number of compromised computers that are used
to create and send spam or viruses or flood a network with messages
as a denial of service attack.
– The compromised computers are called zombies
INTERNET THREATS
INTERNET THREATS
6. PHARMING (FAKE WEB PAGE)
– The link provided in the e-mail leads to a fake webpage which collects
important information and submits it to the owner.
– The fake web page looks like the real thing
– Extracts account information
INTERNET THREATS
INTERNET THREATS
Types of Malware
a. Virus – a malicious program designed to
replicate itself and transfer from one
computer to another.
b. Worm – a malicious program that
transfers from one computer to another
by any type of means.
INTERNET THREATS
• Types of Malware
c. Trojan - a malicious program that is
disguised as a useful program but once
downloaded or installed, leaves your PC
unprotected and allows hacker to get you
information
• Rouge security software
• Tricks the user into posting that is a security
software.
INTERNET THREATS
Types of Malware
d. Spyware - a program that runs in the
background without you knowing it.
* Keyloggers – used to record the keystroke
done by the user.
e. Adware - a program designed to send you
advertisements, mostly as pop-ups.
Use and protection of intellectual property
rights
• Intellectual Property – is a general term that includes all the
products of the human mind.
– These products can be tangible or intangible.
• Intellectual Property Rights – include the protections
afforded to individuals and companies by governments
through governments’ granting of copyrights, patents, and
through registration of trademarks and service marks.
• Right to publicity – is a limited right to control others’
commercial use of an individual’s name image, likeliness, or
identifying aspect of identity.
Four types of intellectual property protection

• You'll find four main types of IP protection for


every business:
• Copyrights
• Patents
• Trademarks
• Trade Secrets
copyright
• Copyright – is a right by a government to the author or
creator of a literary or artistic work.
• The right is for the specific length of time provided in the
copyright law and gives the author or creator the sole and
exclusive right to print, publish, or sell the work.
copyright
• Creations that can be copyrighted include virtually all forms of
artistic or intellectual expression
– books
– music
– artworks
– recordings (audio and video)
– architectural drawings
– choreographic works
– product packaging
– computer software
Copyright Infringement
• is the use of works protected by copyright law without
permission, infringing certain exclusive rights granted to the
copyright holder, such as the right to reproduce, distribute,
display or perform the protected work, or to make derivative
works
patent
• Patent – is an exclusive right granted by the government to an
individual to make, use and sell an invention.
• A patent grants property rights on an invention, allowing the
patent holder to exclude others from making, selling, or using
the invention.
• A patent on the design for an invention provides protection
for 14 years.
– To be patentable, an invention must be genuine, novel,
useful, and not obvious given the software programs that
met the terms of the international patent law.
patent
• Inventions allow many businesses to be successful because
they develop new or better processes or products that offer
competitive advantage on the marketplace.
• Without this legal protection, anyone can use similar designs,
products, and processes without risk.
• There are three types of patents:
– Utility
– Design
– Plant
Patent Infringement
• is the commission of a prohibited act with respect to a
patented invention without permission from the patent
holder.
• Permission may typically be granted in the form of a license.
• The definition of patent infringement may vary by jurisdiction,
but it typically includes using or selling the patented
invention.
– In many countries, a use is required to be commercial (or
to have a commercial purpose) to constitute patent
infringement.
Trademark
• A trademark is a word, phrase, symbol, or design that
distinguishes the source of products (trademarks) or services
(service marks) of one business from its competitors.
• Trademark – is a distinctive mark, device, motto, or
implement that a company affixes to the goods it produces for
identification purposes.
• Service Mark – is similar to a trademark, but it is used to
identify services provided.
• Trade Name – The name (or part of that name) that a
business uses to identify itself.
Trademark infringement
• Where the respective marks or products or services are not
identical, similarity will generally be assessed by reference to
whether there is a likelihood of confusion that consumers will
believe the products or services originated from the
trademark owner.
Trade secrets
• trade secret is a formula, process, device, or other business
information that companies keep private to give them a
business advantage over their competitors.
• Examples of trade secrets include:
• Soda formulas
• Customer lists
• Survey results
• Computer algorithms
• Training Materials
Trade secrets
• Unlike the other types of intellectual property, you can't
obtain protection by registering your trade secret.
• Instead, protection lasts only as long as you take the
necessary steps to control disclosure and use of the
information.
• Businesses use nondisclosure agreements, restricted access to
confidential information, post-employment restrictive
covenants, and other security practices to maintain trade
secrets.
Rules of Netiquette
Think Before You Click
1. Before you post something on the web,
ask these questions to yourself:
• Would you want your parents or
grandparents to see it?
• Would you want your future boss to see it?
Rules of Netiquette
Think Before You Click
2. Your friends depend on you to protect their
reputation online.
3. Set your post to “private”.
4. Avoid using names.
5. If you feel that a post can affect you or other’s
reputation, ask the one who posted it to pull
it down or report it as inappropriate.
End

You might also like