0% found this document useful (0 votes)
4 views

Ethics

The document provides an overview of ethics, digital footprints, data protection laws, and cybercrime. It explains the differences between active and passive digital footprints, the importance of protecting one's digital presence, and outlines various intellectual property rights including patents and copyrights. Additionally, it discusses types of cybercrime, methods of protection against cyber threats, and various forms of malware.

Uploaded by

faizalkhan1300
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Ethics

The document provides an overview of ethics, digital footprints, data protection laws, and cybercrime. It explains the differences between active and passive digital footprints, the importance of protecting one's digital presence, and outlines various intellectual property rights including patents and copyrights. Additionally, it discusses types of cybercrime, methods of protection against cyber threats, and various forms of malware.

Uploaded by

faizalkhan1300
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

ETHICS

What is ethics?

• Ethics is the study of morality and the principles that


guide people's actions.
• It also refers to the system of moral values that
people use to make decisions
Active Digital Footprint

• An active forrtprint is where the user has deliberately shared information about
themselves
• For example, through posting or participating on social networking sites or online
forums
• Other activities that contribute to active digital footprint include an online form-
such as subscribing to a newsletter- or agreeing to accept cookies on your browser.
Passive digital footprint

• A passive digital footprint is created when information is collected about the user
without them being aware that this is happening.
• For example, this occurs when websites collect info about how many times user
visit, where they come from and their IP address.
• This is a hidden process, which users may not realise is taking place
Why do digital footprint matter?

• They are relatively permanent, and once the data is public, as may be the case with
Facebook post. The owner has little control over others will use it.
• Words and photos which you post online can be misinterpreted or altered, causing
unintentional o ence.
• Cybercriminals can exploit your digital footprint- using it for purpose such as
phishing for account access or creating false identities based on your data
ff
How to protect your digital footprint?

• Use search engine to check your digital footprint


• Reduce the number of information sources that mention you
• Limit the amount of data you share
• Use VPN(Virtual Private Network)
• Double check your privacy setting
• Avoid oversharing on social media
• Avoid unsafe websites
• Practice cyber hygiene
What is Data Protection?

• Data protection law exists to ensure that everyone in every workplace is working
towards the same principles and practices.
• Intellectual property rights means the legal rights given to the inventors or creator
to protect his/her invention or creation for a certain period time.
• Trademarks, patents and copyrights are di erent types of intellectual property
rights.
• Department of Industrial Policy & Promation- Indian Patent O ce (IPO), Controller
General of Patent,Design and Trademark (CGPDTM)
ff
ffi
The Patent Act (1970)

• Protects any new inventions.


• Prevents other people to unauthorisedly use and misappropriate the registered
patent.
• A patent can only be registered only if the invention is ‘original’
• Once registered, this Act prevents third parties from using, selling, o ering the
product obtained from that process, without the prior consent of the original
inventors.

ff
The Copyrights Act, 1957

• This act protects the expression of an idea rather than the idea itself.
• It is a legal entitlement given to the originators of creative works, including
literature, art, music, drama, lms, audio & software.
• The creators can have exclusive rights to control and use their creations and
prevents others from copying, distributing, exploiting their work without
permission
fi
Why we need copyrights?

• Legal evidence
• Public Notice
• Statutory Damages & Attorney’s fees
• Enforcement and Protection
• International Protection
The Trade Marks Acts (1999)

• A trademark provides protection for symbols, colours, shapes, words etc.


representing and relating to a good or service
Open Source So ware (OSS)

• Software available for public


• Freely distributed along with their source code, therefore making it available for use,
modi cation and distribution with its original rights
• Examples: Linux, VLC player, Mozilla Firefox etc.
• No warranty
• User Friendly

fi
ft
Licensing
Creative Commons Licence

• Creative Commons (CC) licenses are public licenses. You can use them to indicate
what other people are allowed to do with your work. Each work is automatically
protected by copyright, which means that others will need to ask permission from
you as the copyright owner.
GPL(General Public Licence)

• It is a free software license that gives users the right to run, study, share, and modify
software. It's a type of copyleft license, which means that any derivative work must
be distributed under the same or similar license terms.
Apache

• The Apache License is a free, open-source license that allows users to use, modify,
distribute, and sell software without paying royalties. It's written by the Apache
Software Foundation (ASF)
CYBERCRIME
What is cybercrime?

• Cybercrime is criminal activity that


uses computers and the internet.
• The illegal usage of any
communication device to commit or
facilitate in committing any illegal act.
Cybercriminals

• A person who uses his/her skills in technology to do malicious acts


and illegal activities (cybercrimes) is called cybercriminals.
• They are widely available in the “dark web”
• Hacking is treated as a cybercrime when it has a malicious purpose of
conducting any harmful activities . They are called as “black hat
hacker”
• Cybercriminals: black hat hackers, cyberstalkers, cyber terrorists,
scammers.
Hacking

• Infringement in the privacy of others or damage to computer based property ( les,


web pages, s/w etc.)
• Types of Hackers:
• White Hat or Ethical Hackers
• Black Hat Hackers
• Grey Hat Hackers

fi
Eavesdropping

• Secretly listening to the private conversations of


others without consent
Phishing and Email fraud

• Tricking someone into providing sensitive information


(login details, banking details, passwords etc.)
• Phishing can be done by email spoo ng.

fi
Ransomware

• A malicious software which threatens to publish the


con dential information or block it permanently so that it
cannot be used in the future unless a ransom is paid.
• Mostly carried out by Trojan, disguised as a legitimate le that
user is tricked into opening any email attachment or
downloading any le.
fi
fi
fi
Cyber Trolls

• Users who deliberately post inammatory, controversial,


abusive, o ensive and irrelevant or provocative messages or
comments or contents
• Main purpose is to seek attention, amusement, revenge or
carry on some agenda.
ff
fl
Cyber Bullying

• Form of bullying done over a digital devices


• Sharing personal or private information about someone else causing
embarrassment or humiliation
• Common Platforms: Twitter, Facebook, Instagram, snapchat, Tik Tok
• Messaging apps
• Online games
Cyberbully tactics and threats

• Flooding email inbox with messages


• Attempt to infect the victims computer with virus
• Threatening messages of physical harm or suggesting victims to commit suicide
• Making duplicate accounts and posting o ensive and unwanted content (fake
accounts)
• Online attacks on victims based on race, ethnicity, religion, sexual orientation,
gender identity, economic background or other personal traits or circumstances
ff
Cyber safety

• Create strong passwords


• Frequent changing of passwords
• Do not share passwords with others
• Do not use common, easily guessable passwords
Safe Browsing of Web
• Update web browser
• Strict privacy & security settings
• Stop visiting websites without HTTPS
• Be careful of the les and software you download
• Delete browser cookies
• Use ad- blocker
• Do not save password in your browser
• Two- factor authentication
• Use VPN
fi
Why do we need Identity Protection?

• Privacy Concerns- can lead to stalking, harassment,


blackmail etc.
• Financial loss
• Security concers- data theft, malware infection, ect
• Reputational Harm
Types of Identity The

• Financial identity theft


• Drivers license theft
• Medical Identity theft
• Synthetic Identity theft
• Criminal Identity theft
• Child identity theft
• Tax identity theft
f
Malware : Virus

• Malicious software
• Harmful to the computer
• Slow-down the system
• Malfunctioning of applications
• Threat to security
Types of Computer Virus

• Boot Sector Virus


• File Virus
• Trojan Horse Virus
• Browser Hijacker
• Polymorphic Virus
• Multiparite Virus
Spyware

• Malicious program which monitors all activities and


collects small pieces of information about users
Computer Worms

• Self - replicating malicious software that


duplicates itself to spread to infect computers in
the network
• Can be attached with downloaded les or s/w

fi
Trojan Horse

• Non - self replicating malicious software designed to remain hidden.


• Pretends to be harmless but once triggered can cause loss or theft of data or even
slow down the computer and give unauthorised access to the hackers
Adware

• Advertising - supported software- displays advertising banners when a program


runs without permission
• Example: pop-up windows

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy