SlideShare a Scribd company logo
CYBER ETHICS & INTERNET
SECURITY
Did
You
Know
2 in 5Kids have been bullied online
1 in 4have been bullied more than once
9 in 10have had their feelings hard online
2 in 5kids have had their password stolen
1 in 5had received a threatening e-mail
&sometimes
the
consequence
is
TAGIC
 MMS Scandal Rocks Delhi Business
School
 NOIDA Girl Refuses to Marry, Boy
Uploads Nude Picture in social networking
site
 MMS scandal involving Namitha,
Malavika, South Indian Actresses
 Mumbai teen arrested for sending
threat mail & many more………..
It’s a full blown
EPIDEMIC
What sites your child frequents?
Who are his online friends?
What do they discuss?
What do they do online?
Ifanyansweris
You
need
be
Learn to use the Internet
RESPONSIBILY
CYBER ETHICS
It means moral principles that govern a
person's behavior or the conducting of an activity.
Set of moral principles that regulate the use of
computers.
Three main types of Ethical issues
A. Privacy
IT enables exchange of information on a large scale enables
increased potential for disclosing information and violating the
privacy
B. Access Right
The topic of computer security and access right has moved quickly
from being a low priority for corporations to high priority for
government agencies.
C. Harmful Actions
Harm to any of users, the general public, employees, and employers .
Harmful actions include intentional destruction or modification of
files and programs leading to serious loss of resources or
unnecessary expenditure of human resources.
Ten commandments issued by Cyber Ethics
Institute are as follows:
1.Do not use a computer to harm other people.
2.Do not interfere with other people's computer work.
3.Do not snoop around in other people's computer files.
4.Do not use a computer to steal.
5.Do not use a computer to bear false witness.
6.Do not copy or use proprietary software for which you have
not paid (without permission).
7. Do not use other people's computer resources without
authorization or proper compensation.
8. Do not appropriate other people's intellectual output
9. Always think about the social consequences of the
program you are writing or the system you are designing.
10. Always use a computer in ways that ensure
consideration and respect for your fellow humans.
CYBER CRIME
The Department of Justice classifies computer crime in
three ways………
……….computers as a target
……….computers as a weapon
………computers as an accessory
Refers to the use of computer technology for
illegal purposes or for unauthorized access of the
computer system with intention of damaging,
deleting or altering the data present in the
computer without the permission of the actual
user.
CYBER CRIME
Cyber Stalking: using internet or other electronic means
to stalk or harass individual, group or a company
Cyber Contraband: transferring illegal items through the
internet that are banned in some countries like drugs,
animal skin, etc.
Cyber laundering: electronic transfer of illegally
obtained money so as to hide its source or destination
Cyber terrorism: terrorist activity intended to damage or
disrupt vital computer systems, personal or public
property etc.
TYPES OF CYBER CRIME
Cyber theft: act of using the internet to steal any
property or to interfere with someone’s use and
enjoyment of property
Hacking: activity of breaking into some other’s
computer system or entering into some other’s personal
account without the consent of the actual user
Phishing: activity of getting sensitive information like
passwords of online account, pin numbers of ATM
cards, Debit Cards, Credit Cards by showing some kind
of greed by sending e-mails, text messages etc.
TYPES OF CYBER CRIME
Virus: computer program that can harm the computer
system and replicate without the knowledge of the system
users.
Identity theft: activity of bearing other peoples’ identity
and obtaining their personal or financial information to
make transaction or purchases.
Piracy: illegal copying, distribution or use of the
software, audio or video
TYPES OF CYBER CRIME
INTERNET SECURITY
 90% of all companies with more than 1,000 employees
currently use e-mail. currently use e-mail.
 Sixty billion messages are sent annually.
 Employees are under the impression that their messages
are private.
 Old and deleted messages are archived and easily
accessible by the management.
 no comprehensive, uniform legal standard protecting
privacy.
INTERNET SECURITY
What Cyberspace Knows About You
 If you go to If you go to http://www.cdt.org you
will learn how much government and employers can
discover about you.
Go to http://www.aclu.org/privacy and a you will
find that a lot of information about you could be
available to anyone.
Spy Technology has become increasingly
sophisticated.
check out some of the sites that retail surveillance
technology:
http://www.intercept-spytech.com
http://eaglevision1.com
INTERNET SECURITY
Internet security is the body of technologies,
processes and practices.
Designed to protect networks, computers,
programs and data from attack, damage or
unauthorized access
INTERNET SECURITY
 Don't use passwords that are based on personal
information that can be easily accessed or guessed such
as birthdays, address, abbreviated names, initials, zip
code, etc. Examples: bobjackson, 01091964 (birthday
in ANY forms), becky1963, rlthomas, becky.thomas
 Don't use words that can be found in any dictionary of
any language.
 Develop a mnemonic for remembering complex
passwords (Iluv3dogs=I love 3 dogs) • Use both
lowercase and capital letters .
 Use a combination of letters, numbers, and special
characters .
INTERNET SECURITY
 Don’t use the same password for every password
protected account. This can be easily traced by a
professional.
What are some specific rules regarding Internet
safety ?
 Never give out personal information (including
your name, home address, phone number, age,
race, family income, school name or location, or
friends' names) or use a credit card online without
your permission.
INTERNET SECURITY
 Never share a password, even with friends.
 Never arrange a face-to-face meeting with
someone you meet online.
 Never respond to messages that make you feel
confused or uncomfortable.
 You should ignore the sender, end the
communication, and tell your authority/trusted
adult right away.
INTERNET SECURITY
Use always antivirus………….
INTERNET SECURITY
 cyber ethics
 cyber ethics
 cyber ethics

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
SultanaShaikh7
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Krishnav Ray Baruah
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
Tushar Bisen
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
Erdo Deshiant Garnaby
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Similar to cyber ethics

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain777
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
Syangba132
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Ayush Chopra
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 

Similar to cyber ethics (20)

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

cyber ethics

  • 1. CYBER ETHICS & INTERNET SECURITY
  • 3. 2 in 5Kids have been bullied online
  • 4. 1 in 4have been bullied more than once
  • 5. 9 in 10have had their feelings hard online
  • 6. 2 in 5kids have had their password stolen
  • 7. 1 in 5had received a threatening e-mail
  • 10. TAGIC
  • 11.
  • 12.
  • 13.  MMS Scandal Rocks Delhi Business School  NOIDA Girl Refuses to Marry, Boy Uploads Nude Picture in social networking site  MMS scandal involving Namitha, Malavika, South Indian Actresses  Mumbai teen arrested for sending threat mail & many more………..
  • 14. It’s a full blown EPIDEMIC
  • 15. What sites your child frequents? Who are his online friends? What do they discuss? What do they do online?
  • 18. Learn to use the Internet RESPONSIBILY
  • 19.
  • 21. It means moral principles that govern a person's behavior or the conducting of an activity. Set of moral principles that regulate the use of computers.
  • 22. Three main types of Ethical issues A. Privacy IT enables exchange of information on a large scale enables increased potential for disclosing information and violating the privacy B. Access Right The topic of computer security and access right has moved quickly from being a low priority for corporations to high priority for government agencies. C. Harmful Actions Harm to any of users, the general public, employees, and employers . Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources.
  • 23. Ten commandments issued by Cyber Ethics Institute are as follows: 1.Do not use a computer to harm other people. 2.Do not interfere with other people's computer work. 3.Do not snoop around in other people's computer files. 4.Do not use a computer to steal. 5.Do not use a computer to bear false witness. 6.Do not copy or use proprietary software for which you have not paid (without permission).
  • 24. 7. Do not use other people's computer resources without authorization or proper compensation. 8. Do not appropriate other people's intellectual output 9. Always think about the social consequences of the program you are writing or the system you are designing. 10. Always use a computer in ways that ensure consideration and respect for your fellow humans.
  • 26. The Department of Justice classifies computer crime in three ways……… ……….computers as a target ……….computers as a weapon ………computers as an accessory
  • 27. Refers to the use of computer technology for illegal purposes or for unauthorized access of the computer system with intention of damaging, deleting or altering the data present in the computer without the permission of the actual user. CYBER CRIME
  • 28. Cyber Stalking: using internet or other electronic means to stalk or harass individual, group or a company Cyber Contraband: transferring illegal items through the internet that are banned in some countries like drugs, animal skin, etc. Cyber laundering: electronic transfer of illegally obtained money so as to hide its source or destination Cyber terrorism: terrorist activity intended to damage or disrupt vital computer systems, personal or public property etc. TYPES OF CYBER CRIME
  • 29. Cyber theft: act of using the internet to steal any property or to interfere with someone’s use and enjoyment of property Hacking: activity of breaking into some other’s computer system or entering into some other’s personal account without the consent of the actual user Phishing: activity of getting sensitive information like passwords of online account, pin numbers of ATM cards, Debit Cards, Credit Cards by showing some kind of greed by sending e-mails, text messages etc. TYPES OF CYBER CRIME
  • 30. Virus: computer program that can harm the computer system and replicate without the knowledge of the system users. Identity theft: activity of bearing other peoples’ identity and obtaining their personal or financial information to make transaction or purchases. Piracy: illegal copying, distribution or use of the software, audio or video TYPES OF CYBER CRIME
  • 32.  90% of all companies with more than 1,000 employees currently use e-mail. currently use e-mail.  Sixty billion messages are sent annually.  Employees are under the impression that their messages are private.  Old and deleted messages are archived and easily accessible by the management.  no comprehensive, uniform legal standard protecting privacy. INTERNET SECURITY
  • 33. What Cyberspace Knows About You  If you go to If you go to http://www.cdt.org you will learn how much government and employers can discover about you. Go to http://www.aclu.org/privacy and a you will find that a lot of information about you could be available to anyone. Spy Technology has become increasingly sophisticated. check out some of the sites that retail surveillance technology: http://www.intercept-spytech.com http://eaglevision1.com INTERNET SECURITY
  • 34. Internet security is the body of technologies, processes and practices. Designed to protect networks, computers, programs and data from attack, damage or unauthorized access INTERNET SECURITY
  • 35.  Don't use passwords that are based on personal information that can be easily accessed or guessed such as birthdays, address, abbreviated names, initials, zip code, etc. Examples: bobjackson, 01091964 (birthday in ANY forms), becky1963, rlthomas, becky.thomas  Don't use words that can be found in any dictionary of any language.  Develop a mnemonic for remembering complex passwords (Iluv3dogs=I love 3 dogs) • Use both lowercase and capital letters .  Use a combination of letters, numbers, and special characters . INTERNET SECURITY
  • 36.  Don’t use the same password for every password protected account. This can be easily traced by a professional. What are some specific rules regarding Internet safety ?  Never give out personal information (including your name, home address, phone number, age, race, family income, school name or location, or friends' names) or use a credit card online without your permission. INTERNET SECURITY
  • 37.  Never share a password, even with friends.  Never arrange a face-to-face meeting with someone you meet online.  Never respond to messages that make you feel confused or uncomfortable.  You should ignore the sender, end the communication, and tell your authority/trusted adult right away. INTERNET SECURITY