Professional Documents
Culture Documents
Lecture - 8
Lecture - 8
Business Ethics
• Business ethics is the written and unwritten principles and
values that govern decisions and actions within
companies.
Computer Crime
• Computer crime includes
• Unauthorized use, access, modification, or destruction of hardware,
software, data, or network resources
Hacking
• Hacking is
• The obsessive use of computers
• The unauthorized access and use of networked computer systems
• Cracker
• A malicious or criminal hacker who maintains knowledge of the
vulnerabilities found for private advantage
Chapter 13 Security and Ethical
7
Challenges
Cyber Theft
• Many computer crimes involve the theft of money
• Licensing
• Purchasing software is really a payment for a license for fair use
• Site license allows a certain number of copies
Chapter 13 Security and Ethical
9
Challenges
• Sniffers
• Used to monitor network traffic or capacity
• Find evidence of improper use
Chapter 13 Security and Ethical
10
Challenges
Spyware Problems
• Spyware can steal private information and also
• Add advertising links to Web pages
• Redirect affiliate payments
• Change a users home page and search settings
• Make a modem randomly call premium-rate phone numbers
• Leave security holes that let Trojans in
• Degrade system performance
Chapter 13 Security and Ethical
15
Challenges
Privacy Issues
• The power of information technology to store and retrieve
information can have a negative effect on every
individual’s right to privacy.
• Violation of Privacy
• Accessing individuals’ private email conversations and
computer records
Questions
1. Define ethics, business ethics and social responsibility.
2. What are the four parameters of business ethics, explain with
examples.
3. Define Computer Crime, Hacking, Cyber Theft, Software Piracy
4. List a Common Hacking Tactics with their meaning.
5. Give a list of Internet Abuses in the Workplace.
6. How do you define the Theft of Intellectual Property
7. Define Viruses and Worms how they spread to computer.
8. Define Adware and Spyware, and what the difference between them
is.
9. Define Opt-in and Opt-out, and what the difference between them
are.
10. What is Privacy – what are the different issues of Privacy?
11. Explain Computer Libel and Censorship in regards to Flaming and
Spamming.