Вы находитесь на странице: 1из 6

Blog competition

Name: - Shivam Verma

Class: - 10-A

Branch: - Shivalik Public School, Phase-6, Mohali

Overview:-

 Introduction to cyber ethics


 Important issues through Cyber Ethics
 Solutions for Issues
 Offences and penalties
 Rules of cyber Ethics
 Message to my community

Introduction to Cyber Ethics

Ethics, by definition, are a system by which acts are judged within their contexts
instead of by categorical principles also known as situational ethics. Cyber ethics is
different from cyber law. Laws are formal written information that applies to every
person, interpreted by judicial system, and forced by the police. Ethics is an open
rational concept that goes away from simple right and wrong, and look toward the
good life. Cyber ethics refers to the rules of responsible behaviour on the internet.

Issues

1) Copyrighting or Downloading

Copyright or downloading is a major issue because children don’t know copyright


policies. They only try to search what they need from the web and download it for
their purpose. Their thinking is like “if everybody is doing it therefore it’s ok”, but an
understandable and an age appropriate lesson on Cyber Ethics could help children
to learn the risks involved in Internet downloading.

It happened with me that a download a movie from a site and when I opened it my
computer crashed.

2) Crime and Punishment

Children do not believe that they will get into any real problem from neglecting the
use of cyber ethics. It has become easy to track the origin of wrong activity over the
internet to an individual user. There is not much anonymity as a child may trust.
The United States Department of Justice has a recent list of Federal Computer
Crime Cases teens this is a best way to show children the costly consequences of
their internet actions.
Someone also told me to promote his deals to others which was containing some
unfair information. So please do not believe on these criminals even if they provide
you money or any other mean for promoting them.

3) Internet Hacking

Hacking done by stealing classified information, stealing passwords to get into a site
and also recasting a website without permission. Since the world is run on
computers it is important that hackers are stopped. They could create viruses that
could shut down important websites or computer systems.

For being on a safer side, we have to make our society aware by telling its
importance.

4) Cyber bullying

Cyber bullying is increasing and people are becoming aware of its effects on
children. Cyber bullying is bullying that takes place carrying electronic technology.
Electronic technology carried by devices and equipment such as cell phones,
computers, and tablets as well as communication tools including social media sites,
text messages, website and chat.\

Solutions for Issues

1) Scanning
Scanning is a technique that allows for a deep dive into a system to seek out
valuable data and services in an IP address range. This course investigates
discusses how to locate ports and services, and how to find weak spots to
enter a system.
2) Enumeration
This course reviews the concept of enumeration. Enumeration is the process
of identifying resources on a network, and extracting information from a
system.
3) System Hacking
System hacking is the method that hackers use to gain access to computers
on a network. This course will cover the process of gaining access to a
targeted system including password cracking, privilege escalation and
malware detection.
4) Malware Fundamentals
This course takes an in-depth look at the nature of malware and its many
different forms. Topics covered will include viruses, Trojans, rootkits, buffer
overflows and other related forms of malware.
5) Spreading Awareness
This is the most effective and common way by which we can educate people
how they can be safe over internet. This can include Aware camps,
gatherings, informative booklets etc. These methods could be practise on
large scale for promoting awareness.

Offences and penalties

Offences
Cyber offences are the illegitimate actions, which are carried out in a
classy manner where either the computer is the tool or target or both.

The offences included in the I.T. Act 2000 are as follows −

 Tampering with the computer source documents.


 Hacking with computer system.
 Publishing of information which is obscene in electronic form.
 Power of Controller to give directions.
 Directions of Controller to a subscriber to extend facilities to decrypt
information.
 Protected system.
 Penalty for misrepresentation.
 Penalty for breach of confidentiality and privacy.
 Penalty for publishing Digital Signature Certificate false in certain
particulars.
 Publication for fraudulent purpose.
 Act to apply for offence or contravention committed outside India
Confiscation.
 Penalties or confiscation not to interfere with other punishments.
 Power to investigate offences.
Compounding of Offences
As per Section 77-A of the I. T. Act, any Court of competent jurisdiction
may compound offences, other than offences for which the punishment
for life or imprisonment for a term exceeding three years has been
provided under the Act.

No offence shall be compounded if −

 The accused is, by reason of his previous conviction, is liable to


either enhanced punishment or to the punishment of different kind;
OR

 Offence affects the socio economic conditions of the country; OR

 Offence has been committed against a child below the age of 18


years; OR

 Offence has been committed against a woman.

The person alleged of an offence under this Act may file an application
for compounding in the Court. The offence will then be pending for trial
and the provisions of Sections 265-B and 265-C of Cr. P.C. shall apply.

Rules for Cyber Ethics

Considerations When Determining Responsible Behaviour

 Do not use rude or offensive language.


 Do not cyber bully.
 Do not plagiarize.
 Do not break into someone else's computer.
 Do not use someone else's password.
 Do not attempt to infect or in any way try to make someone else's computer unusable.
 Adhere to copyright restrictions when downloading material from the Internet,
including software, games, movies, or music.

When a child encounters cyber bullying then they should:

 Tell a trusted adult, and keep telling them until they take action.
 Avoid opening, reading or responding to messages from cyber bullies.
 Always keep messages from bullies. They may be needed to take corrective
action.
 Use software to block bullies if they encounter them through chat.

Message to my community

A blog such as this seeks to be a light at the end of the tunnel shinning on for all to
see and understand the Ethics and Issues that are to be discussed in the following
day to day posts on various Ethics and Issues topics that are of particular concern in
our world of technology that we are exposed to from day to day, be it at home,
school, places of work and many more.

You should also be reminded of the privacy and legal issues associated with cyber-
bullying, and respect the right to privacy in the cyber world. Read the following
publications and webpage to learn more about different forms of cyber-bullying, risks
in sharing information online, how you can be protected by law, and what you should
do when registering for social networks.

Quote

“Information and cyber security professionals must always aim following their own
along with their professional code of conduct. They must aim to stop crime, hackers
activities and of course they must always be aware of being at risk. This will help
society feel free and work free over internet.”

Вам также может понравиться