Академический Документы
Профессиональный Документы
Культура Документы
Class: - 10-A
Overview:-
Ethics, by definition, are a system by which acts are judged within their contexts
instead of by categorical principles also known as situational ethics. Cyber ethics is
different from cyber law. Laws are formal written information that applies to every
person, interpreted by judicial system, and forced by the police. Ethics is an open
rational concept that goes away from simple right and wrong, and look toward the
good life. Cyber ethics refers to the rules of responsible behaviour on the internet.
Issues
1) Copyrighting or Downloading
It happened with me that a download a movie from a site and when I opened it my
computer crashed.
Children do not believe that they will get into any real problem from neglecting the
use of cyber ethics. It has become easy to track the origin of wrong activity over the
internet to an individual user. There is not much anonymity as a child may trust.
The United States Department of Justice has a recent list of Federal Computer
Crime Cases teens this is a best way to show children the costly consequences of
their internet actions.
Someone also told me to promote his deals to others which was containing some
unfair information. So please do not believe on these criminals even if they provide
you money or any other mean for promoting them.
3) Internet Hacking
Hacking done by stealing classified information, stealing passwords to get into a site
and also recasting a website without permission. Since the world is run on
computers it is important that hackers are stopped. They could create viruses that
could shut down important websites or computer systems.
For being on a safer side, we have to make our society aware by telling its
importance.
4) Cyber bullying
Cyber bullying is increasing and people are becoming aware of its effects on
children. Cyber bullying is bullying that takes place carrying electronic technology.
Electronic technology carried by devices and equipment such as cell phones,
computers, and tablets as well as communication tools including social media sites,
text messages, website and chat.\
1) Scanning
Scanning is a technique that allows for a deep dive into a system to seek out
valuable data and services in an IP address range. This course investigates
discusses how to locate ports and services, and how to find weak spots to
enter a system.
2) Enumeration
This course reviews the concept of enumeration. Enumeration is the process
of identifying resources on a network, and extracting information from a
system.
3) System Hacking
System hacking is the method that hackers use to gain access to computers
on a network. This course will cover the process of gaining access to a
targeted system including password cracking, privilege escalation and
malware detection.
4) Malware Fundamentals
This course takes an in-depth look at the nature of malware and its many
different forms. Topics covered will include viruses, Trojans, rootkits, buffer
overflows and other related forms of malware.
5) Spreading Awareness
This is the most effective and common way by which we can educate people
how they can be safe over internet. This can include Aware camps,
gatherings, informative booklets etc. These methods could be practise on
large scale for promoting awareness.
Offences
Cyber offences are the illegitimate actions, which are carried out in a
classy manner where either the computer is the tool or target or both.
The person alleged of an offence under this Act may file an application
for compounding in the Court. The offence will then be pending for trial
and the provisions of Sections 265-B and 265-C of Cr. P.C. shall apply.
Tell a trusted adult, and keep telling them until they take action.
Avoid opening, reading or responding to messages from cyber bullies.
Always keep messages from bullies. They may be needed to take corrective
action.
Use software to block bullies if they encounter them through chat.
Message to my community
A blog such as this seeks to be a light at the end of the tunnel shinning on for all to
see and understand the Ethics and Issues that are to be discussed in the following
day to day posts on various Ethics and Issues topics that are of particular concern in
our world of technology that we are exposed to from day to day, be it at home,
school, places of work and many more.
You should also be reminded of the privacy and legal issues associated with cyber-
bullying, and respect the right to privacy in the cyber world. Read the following
publications and webpage to learn more about different forms of cyber-bullying, risks
in sharing information online, how you can be protected by law, and what you should
do when registering for social networks.
Quote
“Information and cyber security professionals must always aim following their own
along with their professional code of conduct. They must aim to stop crime, hackers
activities and of course they must always be aware of being at risk. This will help
society feel free and work free over internet.”