Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

Ethical Dilemmas:

1. I n v a s i o n o f P r i v a c y
The wrongful intrusion into a person's private activities by other individuals or by the
government.
The legal concept of the right to privacy has four aspect:
1. Protection from unreasonable intrusion upon’s once isolation – gathering of
details about individual’s web surfing habit.
2. Protection from appropriation of one’s name or likeness – identity theft that
involves stealing one’s credit card or social security number.
3. Protection from unreasonable publicity given to one’s private life – revealing of
details about one’s medical condition.
4. Protection from publicity that unreasonably places one is a false light before the
public – publishing the force information.

2. T h e f t
In common usage, theft is the taking of another person's property without that person's
permission or consent with the intent to deprive the rightful owner of it.
Two methods used by old-age identity thieves were:

Shoulder surfing involves keeping a watch on you as you enter your personal
information, such as your password or credit card number or eavesdropping on your
personal conversation.

Dumpster diving involves going through your trash bins and garbage to retrieve copies
of your checks, credit card or bank statements, or other sensitive records that you have
not properly disposed of, e.g. by shredding.

Identity Theft in Cyber World:

 Identity theft via Hacking This is a direct and straightforward method of identity
theft. The perpetrator intrudes your system illegally and steals your files.
 Identity theft via Phishing The perpetrator sets up a bogus website that tries to
imitate a well-known website to steal information such as credit card numbers...
 Identity theft via Spyware and Trojan Horses A spyware program or a Trojan
horse monitors your activities on your computer and sends this information back
to the perpetrator.

3. Hacking
Illegal access into another party’s computer or internet site carried out for malevolent or
fraudulent purpose or to make unauthorized amendments or just for fun.

Kinds of Hacker
 CRACKERS (or Black Hat Hackers): those who will enter your computer just for
the fun of it, or to prove their technical skills, which are usually mid to high level.
 BLUE HAT HACKERS: It is someone outside computer security consulting firms
that are used to bug test a system prior to its launch, looking for exploits so they
can be closed.
 GRAY HAT HACKERS: It is a hacker of ambiguous ethics and/or borderline
legality, often frankly admitted (the color itself stands somewhere in between
'black' and 'white', the 'bad' and the 'good' guys).
 WHITE HAT HACKER: A white hat hacker (sometimes referred to as 'ethical
hacker') is someone who breaks security but who does so for altruistic or at least
non-malicious reasons.
 SCRIPT KIDDIES: It is a pejorative term for a computer intruder with little or no
skill; a person who simply follows directions or uses a cook-book approach --
typically using other people's scripts and shell codes -- without fully
understanding the meaning of the steps they are performing.
 HACKTIVIST (rare): A hacktivist is a hacker who utilizes technology to announce
a political message.

Ethical hacking is also known as penetration testing, intrusion testing and red
teaming. An ethical hacker is sometimes called a white hat, a term that comes
from old Western movies, where the "good guy" wore a white hat and the "bad
guy" wore a black hat.

 Hackers build things, crackers break them.

4. S e c u r i t y
Computer security (Also known as cybersecurity or IT Security) is information security
as applied to computers and networks. The field covers all the processes and
mechanisms by which computer-based equipment, information and services are
protected from unintended or unauthorized access, change or destruction. The
protection resulting from all measures to deny unauthorized access and exploitation of
friendly computer system.

5. C o p y r i g h t i n f r i n g e m e n t
Copyright infringement (or copyright violation) is the unauthorized or prohibited use of
works covered by copyright law, in a way that violates one of the copyright owner's
exclusive rights, such as the right to reproduce or perform the copyrighted work, or to
make derivative works.
Infringement - includes the unauthorized or unlicensed copying of a work
subject to copyright.
 Copyleft - general method for making a program free, requiring all modified and
extended version of the program to be free as well.
 Free software - is software that comes with permission for anyone to use, copy
and distribute, either verbatim or with modifications either gratis or for a fee. In
particular this means that source code must be available.
- It is software that is available for use at no cost or for an optional fee.
 Open Source Software – “open source” software is used by some people to
mean more or less the same category as free software. They accept some
licenses that we consider too restrictive and there are free software licenses they
have not accepted.
 Public domain software - software that is not copyrighted: used in legal term,
anything written down is automatically copyrighted
 Copylefted software – free software whose distribution terms ensure that all
copies of all versions carry more or less the same distribution terms.
 Non copylefted free software – comes from the author with permission to
redistribute and modify, and also to add additional restrictions to it.
 GPL covered software – GNU GPL(general public license)is one specific set of
distribution terms for copylefting a program. The GNU project uses it as the
distribution terms for most GNU software.
 Non free software – any software that is not free. Its use, redistribution or
modification is prohibited or requires you to ask for permission or restricted so
much that you effectively can’t do it freely.
 Shareware – software which comes with permission for people to redistribute
copies. It is not free software or even semi free.
- No payment in trial base. (Trialware or Demoware) – propriety software
 Freeware – it is commonly used for packages which permit redistribution but not
modification(refer to free software)
 Private software – or custom software is software developed for one user. A
free software in trivial sense if its sole user has full rights to it.
 Commercial software - software being developed by a business which aims to
make money from the use of the software.
 Proprietary software – another name for non free software “semifree software”-
which could be modified and redistributed non commercially “proprietary
software” (proprietary software=non free software).
 Warez – refers primarily to copyrighted works traded in violation of copyright law,
refers to illegal releases by organized group as opposed to file sharing between
friends or large groups of people with similar interest using darknet.

6. U n f a i r c o m p e t i t i o n
A branch of intellectual property law, unfair competition is a term applied to all dishonest
or fraudulent rivalry in trade and commerce. This term is particularly applied to the
practice of endeavoring to substitute one’s own goods or products in the market for
those of another for the purpose of deceiving the public.

7. V i r u s
A small software program that spreads from one computer to another computer and that
interferes with computer operation.

How to protect your computer?


 Turn on the firewall
 Update computer system
 Use updated computer anti-virus
 Use updated antispyware software
A computer virus infection may cause:
 Computer runs very slowly.
 Receive out of memory error message.
 New programs are installed incorrectly
 Windows spontaneously restart
 Programs that used to run stop responding
Symptoms of a computer virus:
 Computer runs slower than usual
 Computer stops responding
 Computer crushes and restart every minutes
 Computer restarts on its own
 Applications in computer do not work correctly
 Disk are inaccessible
 Cannot print items correctly

9 types of Viruses:

1. Boot Sector Virus


The term “boot sector” is a generic name that seems to originally come from MS-DOS but is
now applied generally to the boot information used by any operating system. In modern
computers this is usually called the “master boot record,” and it is the first sector on a partitioned
storage device.

Boot sector viruses became popular because of the use of floppy disks to boot a computer. The
widespread usage of the Internet and the death of the floppy has made other means of virus
transmission more effective.

2. Browser Hijacker
This type of virus, which can spread itself in numerous ways including voluntary download,
effectively hijacks certain browser functions, usually in the form of re-directing the user
automatically to particular sites. It’s usually assumed that this tactic is designed to increase
revenue from web advertisements.

There are a lot of such viruses, and they usually have “search” included somewhere in their
description. CoolWebSearch may be the most well known example, but others are nearly as
common.

3. Direct Action Virus

This type of virus, unlike most, only comes into action when the file containing the virus is
executed. The payload is delivered and then the virus essentially becomes dormant – it takes
no other action unless an infected file is executed again.

Most viruses do not use the direct action method of reproduction simply because it is not prolific,
but viruses of this type have done damage in the past. The Vienna virus, which briefly
threatened computers in 1988, is one such example of a direct action virus.

4. File Infector Virus


Perhaps the most common type of virus, the file infector takes root in a host file and then begins
its operation when the file is executed. The virus may completely overwrite the file that it infects,
or may only replace parts of the file, or may not replace anything but instead re-write the file so
that the virus is executed rather than the program the user intended.

Although called a “file virus” the definition doesn’t apply to all viruses in all files generally – for
example, the macro virus below is not referred to by the file virus. Instead, the definition is
usually meant to refer only to viruses which use an executable file format, such as .exe, as their
host.

5. Macro Virus

A wide variety of programs, including productivity applications like Microsoft Excel, provide
support for Macros – special actions programmed into the document using a specific macro
programming language. Unfortunately, this makes it possible for a virus to be hidden inside a
seemingly benign document.

Macro viruses very widely in terms of payload. The most well known macro virus is probably
Melissa, a Word document supposedly containing the passwords to pornographic websites. The
virus also exploited Word’s link to Microsoft Outlook in order to automatically email copies of
itself.

6. Multipartite Virus

While some viruses are happy to spread via one method or deliver a single payload, Multipartite
viruses want it all. A virus of this type may spread in multiple ways, and it may take different
actions on an infected computer depending on variables, such as the operating system installed
or the existence of certain files.

7. Polymorphic Virus
Another jack-of-all-trades, the Polymorphic virus actually mutates over time or after every
execution, changing the code used to deliver its payload. Alternatively, or in addition, a
Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself
when certain conditions are met.

The goal of this trickery is evasion. Antivirus programs often find viruses by the specific code
used. Obscuring or changing the code of a virus can help it avoid detection.

8. Resident Virus

This broad virus definition applies to any virus that inserts itself into a system’s memory. It then
may take any number of actions and run independently of the file that was originally infected.

A resident virus can be compared to a direct payload virus, which does not insert itself into the
system’s memory and therefore only takes action when an infected file is executed.

9. Web Scripting Virus


Many websites execute complex code in order to provide interesting content. Displaying online
video in your browser, for example, requires the execution of a specific code language that
provides both the video itself and the player interface.

Of course, this code can sometimes be exploited, making it possible for a virus to infect a
computer or take actions on a computer through a website. Although malicious sites are
sometimes created with purposely infected code, many such cases of virus exist because of
code inserted into a site without the webmaster’s knowledge.

8. V i d e o c o n f e r e n c i n g
It is when people who can’t meet in the one location will use cameras and TVs to see
each other and have their meeting, although they could be anywhere.

9. P i r a c y
Cyber piracy involves various deceptive practices that companies or
individuals engage in to profit from online users. Within the legal aid
community, these deceptive practices result in confusion for the
public (particularly clients and potential clients) as well as take
advantage of the good-will and reputation of legal aid organizations.
Without a system to address cyber piracy, legal aid programs risk the
chance that the public, especially unsophisticated online users, will
not reach legitimate legal aid website and will be confused and
possibly extorted on websites posing as legal aid.

10. O n l i n e D e f a m a t i o n
Legal terms, any false statement made in a public way that can damage the image or
reputation of an individual, specific product, or entity is an act of defamation.

11. F r a u d
- Any technique aimed at manipulating information within a computer system
for the purpose of illicit, usually financial gain.

Computer Fraud Examples:

 Sending HOAX(an act to deceive or trick) emails intend to scare people.


 Illegally using someone else’s computer or “posing” as someone else on the
internet.
 Using “SPYWARE” to gather information
 Email requesting money
 Pyramid Schemes or Investment Schemes

Avoid Computer fraud by:

 Don’t download attachment from people you don’t know.


 Teach children about safe communication on the internet.
 Do not pay attention to get rich quick schemes.

You might also like