Professional Documents
Culture Documents
COMPUTER ETHICS
MADE BY:
KAIRA PEREZ
DANIELA MARIE CASTANARES
CONNIE CASANE
CONTENTS
• Netiquette
• Cybercrimes
• Internet threats
COMPUTER ETHICS AND
NETIQUETTE
WHAT ARE COMPUTER ETHICS?
• Netiquette is a made-up word from the words net and etiquette. Netiquette
thus describes the rules of conduct for respectful and appropriate
communication on the internet.
• Netiquette is often referred to as etiquette for the internet. These are not
legally binding rules, but recommended rules of etiquette.
WHAT’S THE DIFFERENCE?
• Firstly, the Internet has a global scope. This means that anyone who wants to
express his views can do so. While this is not bad in itself, the problem is that
the Internet also allows users to remain anonymous. This means that names,
identities, and/or sources do not have to be made known. Thus, while the
Internet gives some users a high degree of power, it also puts many people at
risk of abuse.
ANSWERS:
• The Computer Ethics Institute promotes a set of rules written by Dr. Ramon
C. Barquin in 1992 to serve as a guide to proper computing behavior. These
rules are not official but laws about computer use have been based on these.
These commandments are as follows on the next slide:
• Thou shalt not use a computer to • Thou shalt not copy or use proprietary software for
harm other people. which you have not paid.
• Thou shalt not interfere with other • Thou shalt not use other people's computer
resources without authorization or proper
people's computer work.
compensation.
• Thou shalt not snoop around in other
• Thou shalt not appropriate other people's intellectual
people's computer files.
output.
• Thou shalt not use a computer to • Thou shalt think about the social consequences of
steal. the program you are writing or the system you are
• Thou shalt not use a computer to bear designing.
false witness. • Thou shalt always use a computer in ways that
ensure consideration and respect for your fellow
humans.
GENERAL NETIQUETTE RULES
• When communicating on the internet, you should always remember that you
are communicating with people and not simply with computers or
smartphones. As in the real world, rules of etiquette are necessary on the
internet. Netiquette is therefore important to avoid adverse consequences.
GENERAL NETIQUETTE RULES
• 1. Stick to the rules of conduct online that • 2. Netiquette: Think of the person
you follow in real life: Think of the person behind the computer
When communicating online, remember the when you compose your messages. You are
rules of etiquette that you follow in your not communicating with a machine, but with
everyday life. Refrain from insulting, real people. Also, consider what and how
provoking, threatening, or insulting others. you write. Because the internet doesn't
Respect the opinions of your chat forget anything! A screenshot or a copy of
counterparts and express constructive your messages is quickly made and still
criticism. Remember that you can be exists even if you delete your messages
prosecuted for insulting people online. afterward.
GENERAL NETIQUETTE RULES
• 3. Present your best side online • A tip: You should generally refrain
Communication on the internet comes with
from writing messages or individual
a certain anonymity that does not exist in
words entirely in capital letters –
real life when you are talking to someone
face to face. Often this anonymity leads to even if you want to give these
a lower inhibition threshold for many users sections more expression. After all,
and they behave rudely online if, for capital letters on the internet mean
example, you disagree with them. shouting and are generally
• Make sure that you show your best side considered impolite.
online. Remain friendly and respectful,
even if you disagree. Good netiquette is
characterized by respect, politeness and
professionalism.
GENERAL NETIQUETTE RULES
• 4. Read first, then ask • If you write an answer similar to someone
else's, it shows the other chat participants
Do you have a question about
that you have paid little attention to the
something? Then take the time to conversation so far.
carefully read the answers in the
previous discussion posts first.
• Remember that conversations online can
There is a good chance that happen very quickly. It is therefore
someone has already answered your important to gather all the information
question. before responding or asking questions.
GENERAL NETIQUETTE RULES
• 5. Netiquette: Pay attention to • It can be very frustrating for the other person if
grammar and punctuation they have to decipher poorly written sentences in
• Take time to read through your order grasp the meaning behind them. In addition,
answers again. Check them for faulty grammar distracts from the goal of your
grammar, punctuation and correct message.
spelling. • Grammar, spelling and punctuation become
especially important when composing emails or
other correspondence that you submit to colleagues
or superiors. If you have a weakness in grammar
and spelling, don't be discouraged. Use spelling
aids before you send messages.
GENERAL NETIQUETTE RULES
• 6. Respect the privacy of others • When sending private emails to multiple recipients, use
BCC (blind carbon copy) instead of CC (carbon copy).
• This rule should be followed not only in Many people do not like their names and email
everyday use of online communication, but addresses being passed on to people they do not know
also at work. Do not simply forward themselves.
information that has been sent to you
• This rule on the internet also applies to uploading and
without first obtaining permission from the sharing photos or videos that show other people. Before
original sender. circulating such private files, be sure to check with the
people concerned before doing so.
• Generally, cybercrime is on the rise. According to • Javelin Strategy & Research published an
Accenture’s State of Cybersecurity Resilience 2021
Identity Fraud Study in 2021 which found
report, security attacks increased 31% from 2020 to
2021. The number of attacks per company increased that identity fraud losses for the year
from 206 to 270 year on year. Attacks on companies totalled $56 billion.
affect individuals too since many of them store
sensitive data and personal information from
customers. • For both individuals and companies, the
• A single attack – whether it’s a data breach, malware, impact of cybercrime can be profound –
ransomware or DDoS attack - costs companies of all primarily financial damage, but also loss
sizes an average of $200,000, and many affected
of trust and reputational damage.
companies go out of business within six months of the
attack, according to insurance company Hiscox.
HOW TO PROTECT YOURSELF AGAINST
CYBERCRIME?
KEEP SOFTWARE AND USE ANTI-VIRUS SOFTWARE
OPERATING SYSTEM UPDATED AND KEEP IT UPDATED
• Keeping your software and • Using anti-virus or a comprehensive internet
security solution like Kaspersky Total Security
operating system up to date ensures is a smart way to protect your system from
that you benefit from the latest attacks. Anti-virus software allows you to scan,
security patches to protect your detect and remove threats before they become a
problem. Having this protection in place helps
computer. to protect your computer and your data from
cybercrime, giving you piece of mind. Keep
your antivirus updated to receive the best level
of protection.
HOW TO PROTECT YOURSELF AGAINST
CYBERCRIME?
NEVER OPEN ATTACHMENTS
USE STRONG PASSWORDS IN SPAM EMAILS
• Be sure to use strong passwords that • A classic way that computers get
people will not guess and do not infected by malware attacks and
record them anywhere. Or use a other forms of cybercrime is via
reputable password manager to email attachments in spam emails.
generate strong passwords Never open an attachment from a
randomly to make this easier. sender you do not know.
HOW TO PROTECT YOURSELF AGAINST
CYBERCRIME?
DO NOT CLICK ON LINKS IN DO NOT GIVE OUT PERSONAL
SPAM EMAILS OR UNTRUSTED INFORMATION UNLESS
WEBSITES SECURE
• Another way people become • Never give out personal data over
victims of cybercrime is by clicking the phone or via email unless you
on links in spam emails or other are completely sure the line or
messages, or unfamiliar websites. email is secure. Make certain that
Avoid doing this to stay safe online. you are speaking to the person you
think you are.
HOW TO PROTECT YOURSELF AGAINST
CYBERCRIME?
CONTACT COMPANIES
DIRECTLY ABOUT SUSPICIOUS BE MINDFUL OF WHICH
REQUESTS WEBSITE URLS YOU VISIT
• If you are asked for personal information or data • Keep an eye on the URLs you are
from a company who has called you, hang up.
Call them back using the number on their
clicking on. Do they look legitimate?
official website to ensure you are speaking to Avoid clicking on links with unfamiliar
them and not a cybercriminal. Ideally, use a or URLs that look like spam. If your
different phone because cybercriminals can hold
the line open. When you think you’ve re-dialed,
internet security product includes
they can pretend to be from the bank or other functionality to secure online
organization that you think you are speaking to. transactions, ensure it is enabled before
carrying out financial transactions online.
HOW TO PROTECT YOURSELF AGAINST
CYBERCRIME?
KEEP AN EYE ON YOUR BANK
STATEMENTS
• Spotting that you have become a victim of •.
cybercrime quickly is important. Keep an eye
on your bank statements and query any
unfamiliar transactions with the bank. The bank
can investigate whether they are fraudulent.
• Namely, there are a few basic 2. Threat agents are anything or anyone that can
negatively impact — with the internet either as a
components to any web threat: threat vector or a target itself.
3.Vulnerabilities include any human behavior
weakness, technology systems, or other resources
that can lead to a damaging exploit or incident.
• Cybercriminals will use almost any Java: Because Java is installed on over 3 billion
devices (that are running under various operating
vulnerability within an operating systems) exploits can be created to target specific
system (OS) or an application to Java vulnerabilities on several different
conduct an attack. However, most platforms/operating systems.
cybercriminals will develop web Adobe Reader: Although many attacks have
targeted Adobe Reader, Adobe has implemented
threats that deliberately target some
tools to protect the program against exploit
of the most common operating activity. However, Adobe Reader is still a
systems/applications, including: common target.
HOW DO WEB THREATS WORK?
• Users are affected when they engage with malicious URLs, downloads, or provide
sensitive info to websites and message senders. This engagement may also trigger
infection and spread of web threats to other users and networks. It’s not uncommon
for innocent users to unknowingly become threat agents themselves.
HOW TO SPOT WEB THREATS
• Here are some tips to guide you: • URLs: Harmful links can be masked
under decoy anchor text — the
visible text that’s displayed. You can
• Grammar: Malicious actors may not hover over a link to inspect its true
always carefully craft their
destination.
messages or web content when
assembling an attack. Look for • Poor quality images: The use of low-
typos, odd punctuation, and unusual resolution or unofficial images may
phrasing. indicate a malicious webpage or
message.
TYPES OF WEB SECURITY
THREATS
TYPES OF WEB SECURITY THREATS
Social engineering - involves deceiving users to
act unknowingly against their own best interests.
• As mentioned previously, web These threats usually involve gaining the trust of
users to deceive them. Manipulating users in this
threats typically include human and
way can include:
technical manipulation in order to
• Phishing: Posing as legitimate institutions or
attack. Be aware there tends to be people to get them to divulge personal details.
overlap between web threats, and • Watering hole attacks: Exploiting popular
some may occur simultaneously. websites to fool users into exposing themselves
Some of the most common web to harm.
threats may include the following. • Network spoofing: Fraudulent access points that
mimic legitimate ones.
TYPES OF WEB SECURITY THREATS
• Malicious code-Includes malware and • Botnet: Hijacking a user device for remote,
harmful scripts (lines of computer automated use in a network of similar
programming commands) to create or “zombies.” These are used to accelerate
exploit technical vulnerabilities. Where spam campaigns, malware attacks, and
social engineering is the human side of more.
web threats, malicious code is the technical • Spyware: Tracking programs that monitor
side. These threats can include but are not user actions on a computer device. The
limited to: most common examples are keyloggers.
• Injection attacks: Insertion of harmful • Computer worms: Scripts that run,
scripts into legitimate applications and replicate, and spread autonomously without
websites. Examples include SQL injection the help of a related program.
and cross-site scripting (XSS).
TYPES OF WEB SECURITY THREATS
• Exploits- • Spoofing: Masking a real identity to
manipulate legitimate computer systems.
• Exploits are intentional abuses of
vulnerabilities that may lead to an Examples include IP spoofing, DNS
undesirable incident. spoofing, and cache poisoning.