Rules of Netiquette
Rules of Netiquette
Rules of Netiquette
COMPUTER ETHICS
Comput-is a system of moral standards or
values used as a guideline for computer
users. It is needed to stop the current
technology products from being
exploited.
Ethi-cs -is a moral philosophy where a
person makes a specific moral choice and
sticks to it. Code of ethics in computing
means moral guidelines to refer to when
using the computer and the Internet.
INTELLECTUAL
PROPERTY
property refers to any
product of human intellect
that is unique and has
value in the market place.
This covers ideas,
inventions, unique name,
computer program codes
PRIVACY
Privacy in IT refers to data and
information privacy. In general, data
include texts, numbers, sounds,
images and video. Information
privacy is described as the rights of
individuals and companies to deny
or restrict the collection and use of
information about them.
CYBER LAW
Cyber law refers to any laws relating
to protecting the Internet and other
LAW
standards.
Immoral: Not honouring computer ethics means Depends On Country: Depends on country and
ignoring the moral elements (immoral).
misuse of computers.
1.2.2.1
Privacy
law
Utilities
software
There are two commonly used authentication methods, which are biometric
device and callback system. Biometric device is a device that translates personal
characteristics into a digital code that is compared with a digital code stored in
the database. Biometric devices include Fingerprint Recognition, Facial
Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition
and Signature Verification. Callback system
Methods of Verification
refers to the checking system that authenticates the user.
There are two methods used in verification, which are user identification
and processed object. User identification refers to the process of
validating the user. Processed object refers to something the user has
such as identification card, security token and cell phone.
Fraud
Copyright
Infringement
Attacks
Theft
Natural
disaster
Shared
Not
Shared
Promote business
Gain new friends
Stay in touch with old ones
Entertainment-games, online communities
Be Mindful
Read the terms of consditions
Check the privacy policy
Know the security features of the Social Net
Do not share PW
Avoid logging in public networks
Do not talk to strangers
Never post about future vacation
Add friends you know in real life
Avoid visiting untrusted site
Install and update an antivirus
Make your wifi private
Buy orig software
SKILL EXPLORATION
Visit a social networking site and look
for the sites privacy policy. The link is
typically found at the bottom of the
passage and sometimes labeled only
as Privacy. Write a summary on
how the web handles both your
private and public information
INTERNET THREATS
1. MALWARE- malicious software
a. VIRUS- replicate itself & transferable
b. WORM- ILOVEYOU (Lovebug) worm
c. TROJAN- disguised as useful program
d. SPYWARE- monitor your actions
Keyloggers-record keystroke by user
e. ADWARE pop-ups advertisements
INTERNET THREATS
2. SPAM- unwanted emails from bots or
advertisers
3. PHISHING- acquiring sensitive information
e.g. pw, credit card details
COPY INFRINGEMENT
1. Understand
2. Be Responsible
3. Be creative
4. Know the law
ONLINE RESEARCH
How to use credible source
TIPS:
1.Have a question in mind
2.Narrow it down
3.Advanced search
4.Look for credible sources5.Give credit
ONLINE RESEARCH
How to use credible source
TIPS:
1.Have a question in mind- focus on a
question you want to answer
2. Narrow it down- Search engine have
filters but in case it fails you need to
narrow down what you are looking for
ONLINE RESEARCH
How to use
credible source
TIP:
3. Advanced
search- best way
ONLINE RESEARCH
How to use
credible source
TIP:
4. Look for
credible sources-
ONLINE RESEARCH
ow to use
edible
urce
P:
Give
edit