مهم
مهم
مهم
1. What is Ethics?
• Ethics refers to a set of beliefs about what is right and wrong behavior.
• Ethics are guided by virtues (habits that incline people to act in an acceptable
manner) and vices (habits of unacceptable behavior), which together form a
personal value system.
• Morality can vary depending on factors like age, culture, religion, and life
experiences, which makes ethical decision-making context-dependent.
2. Importance of Integrity
• Integrity is essential to ethical behavior. It means acting according to a consistent
set of principles, treating others with respect, and applying the same standards to all
situations.
• Ethical dilemmas often involve conflicts that aren’t just about right versus wrong
but may be about conflicting principles or interests.
3. Business Ethics
• Business ethics are increasingly important as organizations face complex global
environments and pressure to maintain profitability.
• Fostering good business ethics benefits companies by building goodwill, ensuring
consistent operations, improving business practices, protecting the company from
legal risks, and avoiding unfavorable publicity.
Fill-in-the-Blank Questions
1. Virtue ethics is an approach to ethical decision-making that emphasizes ___ over
rigid principles.
• Answer: character and virtues
2. Integrity requires applying the same moral standards in all situations, rather than
changing them based on ___ or ___.
• Answer: people, circumstances
3. Social audits are conducted to review how well an organization is meeting its ___
and ___ responsibility goals.
• Answer: ethical, social
4. An effective code of ethics helps employees recognize and deal with ___ issues
and provides mechanisms for reporting ___ conduct.
• Answer: ethical, unethical
3. Codes of Ethics
• Professional codes of ethics outline the principles and core values that guide IT
workers in their responsibilities.
• These codes provide guidelines for decision-making, promote high standards, and
help professionals gain trust and respect from the public.
5. Compliance
• Compliance refers to adhering to established policies, guidelines, and laws. This is
critical in IT, where failure to comply can result in penalties, legal action, and loss of
trust.
• Organizations often hire compliance officers and create internal audit committees
to ensure compliance with various regulations and ethical standards.
Multiple Choice Questions
1. Which of the following is a characteristic of an IT professional?
a. Their work is always standardized
b. They exercise discretion and judgment in their work
c. They require minimal training and education
d. They do not need to follow a code of ethics
Answer: b. They exercise discretion and judgment in their work
2. What is one ethical issue that IT workers must manage in their relationship with
employers?
a. Avoiding fraudulent transactions
b. Following software piracy policies
c. Delivering services for free to reduce costs
d. Maintaining a friendship with all coworkers
Answer: b. Following software piracy policies
3. Which of the following is a key ethical issue in the relationship between IT
workers and clients?
a. Providing free software upgrades
b. Ensuring client data is publicly accessible
c. Avoiding conflicts of interest
d. Making decisions without client input
Answer: c. Avoiding conflicts of interest
4. What is a major concern related to professional certification for IT workers?
a. It always increases salaries significantly
b. It is legally required for all IT roles
c. It may lag behind the latest technologies
d. It is only valuable for industry associations
Answer: c. It may lag behind the latest technologies
Fill-in-the-Blank Questions
1. IT workers are expected to manage relationships with employers, clients,
suppliers, and ___.
• Answer: IT users
2. Professional codes of ethics guide IT workers in making ___ decisions and
promote high standards of conduct.
• Answer: ethical
3. Compliance is the process of ensuring that an organization adheres to established
policies, ___ and legal requirements.
• Answer: guidelines
4. One challenge in licensing IT workers is the lack of a universally accepted ___ of
knowledge for the profession.
• Answer: core body
4. Types of Perpetrators
• Hackers and Crackers: Hackers test system limits, while crackers engage in clearly
criminal activities.
• Malicious Insiders: Employees or contractors who abuse their access to systems,
often causing significant harm.
• Industrial Spies: Engage in illegal activities to steal trade secrets from competitors.
• Cybercriminals: Hack into systems for fraud, theft, or other criminal activities.
• Hacktivists and Cyberterrorists: Use hacking to promote political or social goals or
to cause harm to governments and society.
6. Computer Forensics
• Computer forensics involves collecting and preserving digital evidence in a way
that ensures it can be used in court. This process requires specialized training and
adherence to legal standards for evidence collection.
Multiple Choice Questions
1. Which of the following is a common type of computer exploit?
a. Firewall
b. Rootkit
c. VPN
d. Data encryption
Answer: b. Rootkit
2. What is a Distributed Denial-of-Service (DDoS) attack?
a. An attack that installs malware on a target system
b. An attack that floods a system with requests, making it unavailable to legitimate
users
c. A method of encrypting data before it is transmitted
d. A phishing attempt conducted via text messages
Answer: b. An attack that floods a system with requests, making it unavailable to
legitimate users
3. Which of the following is a reason why computer incidents are so prevalent?
a. Widespread use of zero-day patches
b. Simple and standardized IT environments
c. Increasing complexity of IT systems and reliance on commercial software
d. Constant updates of all security software by users
Answer: c. Increasing complexity of IT systems and reliance on commercial software
4. Who are malicious insiders?
a. External hackers attempting to break into systems
b. Employees or contractors who abuse their authorized access to cause harm
c. Industrial spies using legal means to gather intelligence
d. Users who download malicious software unknowingly
Answer: b. Employees or contractors who abuse their authorized access to cause
harm
Fill-in-the-Blank Questions
1. Phishing is a fraudulent attempt to obtain sensitive information by disguising as a
legitimate entity through ___.
• Answer: email
2. Rootkits are programs that allow an attacker to gain control of a system without
the user’s ___ or ___.
• Answer: consent, knowledge
3. Computer forensics involves collecting and preserving data so that it can be used
as ___ in court.
• Answer: evidence
4. Zero-day attacks exploit vulnerabilities before they are ___ or ___.
• Answer: discovered, patched
2. Identity Theft
• Identity theft involves the theft of personal information (e.g., Social Security
numbers, credit card information) to impersonate someone. It is one of the fastest-
growing forms of fraud.
• Common techniques used by identity thieves include:
• Phishing: Trick individuals into providing personal data through fake websites or
emails.
• Spyware: Keystroke logging software that records sensitive information like
usernames and passwords.
• Data breaches: Hackers or poor security procedures can lead to the exposure of
personal information.
3. Consumer Profiling
• Companies collect and analyze personal information (e.g., through cookies and
tracking software) to better understand consumer behavior and deliver targeted
advertising.
• Ethical concerns include transparency and control over personal data. Consumers
may not always be aware that their information is being collected or how it is being
used.
5. Workplace Monitoring
• Employers monitor employee activities to ensure productivity and protect against
potential abuses, such as the inappropriate use of company resources.
• Ethical concerns include balancing productivity monitoring with respect for
employee privacy. In private companies, employees often have fewer privacy
protections compared to public-sector employees.