SlideShare a Scribd company logo
1 of 14
ETHICS
AND SAFETY
measures
in
computing
COMPUTER ETHICS
Computer ethics are a set of moral standards
that govern the use of computers. It is
society’s views about the use of computers
of both hardware and software.
Some of them are -
• Respect the privacy of others on the Internet
and never access their information without
their permission.
• Posting wrong or unethical information on the
Internet can harm others.
• Always use original software.
• Be respectful while communicating with
others on Internet.
The Ten Commandments of Computer Ethics
The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute.[1] The
commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by
Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of
computers."
They are as follows -
1) One should not use a computer to harm other people.
2) One should not interfere with other people's computer work.
3) One should not snoop around in other people's computer files.
4) One should not use a computer to steal.
5) One should not use a computer to bear false witness.
6) One should not copy or use proprietary software for which you have not paid (without permission).
7) One should not use other people's computer resources without authorization or proper compensation.
8) One should not appropriate other people's intellectual output.
9) One should think about the social consequences of the program you are writing or the system you are
designing.
10) One should always use a computer in ways that ensure consideration and respect for other humans.
SPAMMING
PHISHING
HACKING
CYBERBULLYING
UNETHICAL PRACTICES
PLAGIARISM
PLAGIARISM
Plagiarism is an act of presenting
someone’s work, ideas, thoughts or
creativity as your own, with or
without their permission. Even
accidentally using another’s ideas or
words without proper citation, due
to carelessness, falls under
plagiarism.
It is considered as Cyber-Crime and is
a punishable act.
• Take permission of the author whose contents
you are using.
• Write the content in your own language.
• Always acknowledge the source from where
the content is taken.
• Put cotents in quotes.
PREVENTING PLAGIARISM
SPAMMING
Spam is any kind of unwanted,
unsolicited digital communication,
often an email, that gets sent out
in bulk.
They exhaust the storage space
and make it difficult for us to find
important mails received.
It is also known as mail bombing.
• Never provide your email address
unnecessarily anywhere.
• Never open or reply to spam messages.
• Use Spam filtering tools.
PREVENTING SPAMMING
PHISHING
Phishing is a cyber attack that
uses disguised emails, phone calls
or messages as a weapon. The
goal is to trick the recipient into
believing that the message is
something they want or need — a
request from their bank or to click
a link or download an attachment
so to get account details,
passwords etc. • Never access a bank's website from the
link provided.
• Never respond to unknown emails
received.
• Never share your credentials to anyone.
PREVENTING PHISHING
HACKING
Hacking means gaining the access to a
remote computer to control its
information without any authorisation
from the owner.
Computer hackers are unauthorized
users who break into computer
systems in order to steal, change or
destroy information, often by
installing dangerous malware without
your knowledge or consent.
• Always keep an up-to-date antivirus
software in your system.
• Never download pirated software.
• Never share your passwords and
frequently change them.
PREVENTING HACKING
CYBERBULLYING
Cyberbullying is the use of technology
to intimidate, harass, threaten,
torment, or humiliate a target via
social media, email, messaging apps,
text messages, forums, games, and
more.
Examples of cyberbullying including
sending mean texts, posting false
information about a person online, or
sharing embarrassing photos or videos.
• While using social media, check the
privacy settings and keep them accessible
to known people only.
• Never share your information or photos
publically on Internet.
PREVENTING CYBERBULLYNG
RIGHT TO PRIVACY
Right to Privacy is an individual's fundamental right to
keep his/her personal information secret from others and
reveal only selective information. Accessing search
information without the consent of the owner is unethical
and illegal.
Protecting Privacy -
• Never Share your Account details like ID or passwords
with others.
• Avoid keeping any confidential information in your
system and delete it, if it is no longer required.
• Cookies stored in your system by other websites cause
leakage of information. Delete them on regualar basis.
INTELLECTUAL PROPERTY RIGHT
Intellectual property Right (IPR) is the product of the
human intellect including creativity concepts, inventions,
industrial models, trademarks, songs, literature, symbols,
names, brands,....etc. Intellectual Property Rights do not
differ from other property rights. They allow their owner
to completely benefit from his/her product which was
initially an idea that developed and crystallized. They also
entitle him/her to prevent others from using, dealing or
tampering with his/her product without prior permission
from him/her.
DIGITAL FOOTPRINTS
A digital footprint is a trail of data you create while using the
Internet. It includes the websites you visit, emails you send, and
information you submit to online services.
There are two types of digital footprints -
1. A "passive digital footprint" is a data trail you unintentionally
leave online. For example, when you visit a website, the
web server may log your IP address, which identifies your
Internet service provider and your approximate location.
2. An "active digital footprint" includes data that you
intentionally submit online. Sending an email contributes to
your active digital footprint, since you expect the data be seen
and/or saved by another person.
SAFETY MEASURES
• Install protected software: Install protected (Antivirus) software and set it to scan your
files and folders for viruses on a regular basis.
• Choose Strong Password: Use a combiantion of letters, numbers and special characters to
create a strong password. Create a different password for each important account and update it
regualarly.
• Back up on regular basis: Make a practise to take regualr back ups of the important data
• Control Access to your machine: Do not leave your computer unattended or locked on,
especially at public places.
• Use e-mail and Internet safety: Do not open the e-mail with an attachment or link from
the people you don't know.
• Protect sensitive data: Remove all the sensitive data files from the hard disks especially
when recycling or repurposing your computer.
• Use Firewall: Firewall is the easiest way to safeguard your computer from being accessed by
a burglar, especially via Internet.
THANK YOU
Name - Darshil Malviya
Class - VIII
Roll no. - 04

More Related Content

What's hot

Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
computer ethics
computer ethicscomputer ethics
computer ethicsHoney jose
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Evolution of computer
Evolution of computerEvolution of computer
Evolution of computerAnkit Yadav
 
CAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICTCAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICTGaytri Vyas
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course OutlineSaqib Raza
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Application of the internet
Application of the internetApplication of the internet
Application of the internetLayani Malsha
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 

What's hot (20)

Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Windows operating system presentation
Windows operating system presentationWindows operating system presentation
Windows operating system presentation
 
Evolution of computer
Evolution of computerEvolution of computer
Evolution of computer
 
CAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICTCAIE - IGCSE - Computer Science and ICT
CAIE - IGCSE - Computer Science and ICT
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Application of the internet
Application of the internetApplication of the internet
Application of the internet
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Similar to Ethics and safety measures in Computing

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessShwetaSingh713663
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 

Similar to Ethics and safety measures in Computing (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

Recently uploaded

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 

Recently uploaded (20)

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 

Ethics and safety measures in Computing

  • 2. COMPUTER ETHICS Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use of computers of both hardware and software. Some of them are - • Respect the privacy of others on the Internet and never access their information without their permission. • Posting wrong or unethical information on the Internet can harm others. • Always use original software. • Be respectful while communicating with others on Internet.
  • 3. The Ten Commandments of Computer Ethics The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute.[1] The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers." They are as follows - 1) One should not use a computer to harm other people. 2) One should not interfere with other people's computer work. 3) One should not snoop around in other people's computer files. 4) One should not use a computer to steal. 5) One should not use a computer to bear false witness. 6) One should not copy or use proprietary software for which you have not paid (without permission). 7) One should not use other people's computer resources without authorization or proper compensation. 8) One should not appropriate other people's intellectual output. 9) One should think about the social consequences of the program you are writing or the system you are designing. 10) One should always use a computer in ways that ensure consideration and respect for other humans.
  • 5. PLAGIARISM Plagiarism is an act of presenting someone’s work, ideas, thoughts or creativity as your own, with or without their permission. Even accidentally using another’s ideas or words without proper citation, due to carelessness, falls under plagiarism. It is considered as Cyber-Crime and is a punishable act. • Take permission of the author whose contents you are using. • Write the content in your own language. • Always acknowledge the source from where the content is taken. • Put cotents in quotes. PREVENTING PLAGIARISM
  • 6. SPAMMING Spam is any kind of unwanted, unsolicited digital communication, often an email, that gets sent out in bulk. They exhaust the storage space and make it difficult for us to find important mails received. It is also known as mail bombing. • Never provide your email address unnecessarily anywhere. • Never open or reply to spam messages. • Use Spam filtering tools. PREVENTING SPAMMING
  • 7. PHISHING Phishing is a cyber attack that uses disguised emails, phone calls or messages as a weapon. The goal is to trick the recipient into believing that the message is something they want or need — a request from their bank or to click a link or download an attachment so to get account details, passwords etc. • Never access a bank's website from the link provided. • Never respond to unknown emails received. • Never share your credentials to anyone. PREVENTING PHISHING
  • 8. HACKING Hacking means gaining the access to a remote computer to control its information without any authorisation from the owner. Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. • Always keep an up-to-date antivirus software in your system. • Never download pirated software. • Never share your passwords and frequently change them. PREVENTING HACKING
  • 9. CYBERBULLYING Cyberbullying is the use of technology to intimidate, harass, threaten, torment, or humiliate a target via social media, email, messaging apps, text messages, forums, games, and more. Examples of cyberbullying including sending mean texts, posting false information about a person online, or sharing embarrassing photos or videos. • While using social media, check the privacy settings and keep them accessible to known people only. • Never share your information or photos publically on Internet. PREVENTING CYBERBULLYNG
  • 10. RIGHT TO PRIVACY Right to Privacy is an individual's fundamental right to keep his/her personal information secret from others and reveal only selective information. Accessing search information without the consent of the owner is unethical and illegal. Protecting Privacy - • Never Share your Account details like ID or passwords with others. • Avoid keeping any confidential information in your system and delete it, if it is no longer required. • Cookies stored in your system by other websites cause leakage of information. Delete them on regualar basis.
  • 11. INTELLECTUAL PROPERTY RIGHT Intellectual property Right (IPR) is the product of the human intellect including creativity concepts, inventions, industrial models, trademarks, songs, literature, symbols, names, brands,....etc. Intellectual Property Rights do not differ from other property rights. They allow their owner to completely benefit from his/her product which was initially an idea that developed and crystallized. They also entitle him/her to prevent others from using, dealing or tampering with his/her product without prior permission from him/her.
  • 12. DIGITAL FOOTPRINTS A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. There are two types of digital footprints - 1. A "passive digital footprint" is a data trail you unintentionally leave online. For example, when you visit a website, the web server may log your IP address, which identifies your Internet service provider and your approximate location. 2. An "active digital footprint" includes data that you intentionally submit online. Sending an email contributes to your active digital footprint, since you expect the data be seen and/or saved by another person.
  • 13. SAFETY MEASURES • Install protected software: Install protected (Antivirus) software and set it to scan your files and folders for viruses on a regular basis. • Choose Strong Password: Use a combiantion of letters, numbers and special characters to create a strong password. Create a different password for each important account and update it regualarly. • Back up on regular basis: Make a practise to take regualr back ups of the important data • Control Access to your machine: Do not leave your computer unattended or locked on, especially at public places. • Use e-mail and Internet safety: Do not open the e-mail with an attachment or link from the people you don't know. • Protect sensitive data: Remove all the sensitive data files from the hard disks especially when recycling or repurposing your computer. • Use Firewall: Firewall is the easiest way to safeguard your computer from being accessed by a burglar, especially via Internet.
  • 14. THANK YOU Name - Darshil Malviya Class - VIII Roll no. - 04