SlideShare a Scribd company logo
1 of 15
Privacy is the protection of personal information given
online. In e-commerce especially, it is related to a
company’s policies on the use of user data. Ethically,
both the buyer and the seller must provide the correct
information to each other, pertaining to the transaction
that is taking place.
:i) The merchant must state how the data will be used.
ii) Make sure the user has gone through terms and
conditions iii) Merchant must assure about data safety.
iv) User must go through terms and condition before
providing personal details.
Fraud committed using the internet is called online fraud.
Online fraud may occur in many forms such as:
• Non-delivered goods
• Non-existent companies
• Stealing information
• Fraudulent payment etc
In this type, the credit card details of user are stolen
from his/her online activities and then some payment
frauds are carried out with this stolen information.
In this type, by stealing someone else online identity (such as his/her social media
handle, email-id etc.), fraudulent posts are posted or some other malicious activity
(such as rumour mongering/riots fueling etc,) is carried out. Ensure safe site while
entering crucial information; While entering the personal details online, make sure you
are in the right website.
• Type the name of the website in the address bar of the browser on your own.
• Do not click on a link that takes to this website.
• Do not copy paste a link.
• Ensure the address contain http and a pad lick sign.
• A safe site’s URL starts with https:// and not http://. (it shows a closed pad lock).
Applying enough technical safeguards so that data travels
safely to its target, without being compromised or
eavesdropped.
Technologies used to ensure secure of data:
• SSL secure data transmission: Secure Socket Layer
• Data encryption: Encrypted data sent over internet
• Use safe protocols: use secure FTP for data transmission
Intellectual property rights are the rights of the owner of
information to decide how much information is to be
exchanged, shared or distributed. It gives the owner a
right to decide the price for doing
(exchanging/sharing/distributing)
● Plagiarism is stealing someone else’s intellectual work and representing it as
your own work without citing the source of information. Any of the following acts
would be term as plagiarism.
i) Using some other author’s work without giving credit to author.
ii) Using someone else’s work in incorrect form than intended originally by the
author/creator.
iii) Modifying/lifting someone’s production such as music-composition etc. without
attributing it to the creator of the work.
iv) Giving incorrect source of information.
v) Failing in giving credit or acknowledging the contribution of others in a
collaborative effort.
Plagiarism involves copying not only ideas but also a substantial
portion of a copyrighted work without attribution and without
permission, it would amount to both copyright infringement and
the violation of the ‘special right’ of the author to be credited. A
civil suit may be instituted, and criminal charges may also be
filed.
● Digital refers to any information about you or created by you that
exists in digital form, either online or on an electronic storage
device. All digital property comprises by you is known as digital
estate.
● Digital property lies with the owner: Legally a person who has
created it or the owner who has got it developed by paying
legally is the legal owner of a digital property. Only the owner
can use and decide who all and in what form can his/her digital
asset may be used by other whether by making payments or by
buying it or by obtaining its license or usage rights etc.
1. Digital software penetration tools: There are many software
penetration tools such as cracks and keygens, tools created by
hackers to penetrate your software’s registration system and
enable unauthorized users to freely access the software without
paying or it.
2. Stealing and plagiarizing codes of your digital properties:
Sometimes other developers somehow get hold of your software’s
source code and then create plagiarized versions of your code
and use it in their own software
1. Anti-Temper Solutions: Anti temper solutions use a host of
advanced technologies to prevent hackers from hacking, reverse-
engineering or manipulating the digital properties such as utility
tools, software, apps, video games etc.
2. Legal Clauses: you an include a transparent clause in software’s
terms of service that prohibits the scraping of the software’s source
code for reuse.
3. Limit the sharing of software code: share your software code only
with trusted individuals who are part of development team. We can
also use a digital rights management (DRM) solution to protect the
software from being scraped for source code using decompiles etc.
Cyber ethics(CBSE Class X), Computer Application

More Related Content

What's hot

Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...7A34PratyushKumarBar
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 
Class 10th FIT Practical File(HTML)
Class 10th FIT Practical File(HTML)Class 10th FIT Practical File(HTML)
Class 10th FIT Practical File(HTML)Anushka Rai
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber EthicsHimanshu Pathak
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

What's hot (20)

Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...
Information technology art INTEGRATION project on cyber crime , Smruti Rekha ...
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Class 10th FIT Practical File(HTML)
Class 10th FIT Practical File(HTML)Class 10th FIT Practical File(HTML)
Class 10th FIT Practical File(HTML)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Internet security
Internet securityInternet security
Internet security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similar to Cyber ethics(CBSE Class X), Computer Application

Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptxakshobdhira
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 
Introduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber SecurityIntroduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber Securitypivisoc989
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 

Similar to Cyber ethics(CBSE Class X), Computer Application (20)

Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptx
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Chapter5.ppt
Chapter5.pptChapter5.ppt
Chapter5.ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Introduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber SecurityIntroduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber Security
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 

More from TENZING LHADON

NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSETENZING LHADON
 
Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402TENZING LHADON
 
ONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdfONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdfTENZING LHADON
 
Data Base Management System.pdf
Data Base Management System.pdfData Base Management System.pdf
Data Base Management System.pdfTENZING LHADON
 
COMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptxCOMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptxTENZING LHADON
 
Communication channels
Communication channelsCommunication channels
Communication channelsTENZING LHADON
 
Components of computer
Components of computerComponents of computer
Components of computerTENZING LHADON
 

More from TENZING LHADON (15)

NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402Entrepreneurship Skill, Class X, CBSE 402
Entrepreneurship Skill, Class X, CBSE 402
 
WEB SECURITY.pdf
WEB SECURITY.pdfWEB SECURITY.pdf
WEB SECURITY.pdf
 
ONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdfONLINE TRANSACTION & Blogging.pdf
ONLINE TRANSACTION & Blogging.pdf
 
Data Base Management System.pdf
Data Base Management System.pdfData Base Management System.pdf
Data Base Management System.pdf
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
Entrepreneurship.pdf
Entrepreneurship.pdfEntrepreneurship.pdf
Entrepreneurship.pdf
 
EXcel_Hyperlink.pdf
EXcel_Hyperlink.pdfEXcel_Hyperlink.pdf
EXcel_Hyperlink.pdf
 
GREEN SKILLS.pptx
GREEN SKILLS.pptxGREEN SKILLS.pptx
GREEN SKILLS.pptx
 
self management.pptx
self management.pptxself management.pptx
self management.pptx
 
COMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptxCOMMUNICATION SKILLS.pptx
COMMUNICATION SKILLS.pptx
 
Devices
DevicesDevices
Devices
 
Network
NetworkNetwork
Network
 
Communication channels
Communication channelsCommunication channels
Communication channels
 
Components of computer
Components of computerComponents of computer
Components of computer
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

Cyber ethics(CBSE Class X), Computer Application

  • 1.
  • 2. Privacy is the protection of personal information given online. In e-commerce especially, it is related to a company’s policies on the use of user data. Ethically, both the buyer and the seller must provide the correct information to each other, pertaining to the transaction that is taking place.
  • 3. :i) The merchant must state how the data will be used. ii) Make sure the user has gone through terms and conditions iii) Merchant must assure about data safety. iv) User must go through terms and condition before providing personal details.
  • 4. Fraud committed using the internet is called online fraud. Online fraud may occur in many forms such as: • Non-delivered goods • Non-existent companies • Stealing information • Fraudulent payment etc
  • 5. In this type, the credit card details of user are stolen from his/her online activities and then some payment frauds are carried out with this stolen information.
  • 6. In this type, by stealing someone else online identity (such as his/her social media handle, email-id etc.), fraudulent posts are posted or some other malicious activity (such as rumour mongering/riots fueling etc,) is carried out. Ensure safe site while entering crucial information; While entering the personal details online, make sure you are in the right website. • Type the name of the website in the address bar of the browser on your own. • Do not click on a link that takes to this website. • Do not copy paste a link. • Ensure the address contain http and a pad lick sign. • A safe site’s URL starts with https:// and not http://. (it shows a closed pad lock).
  • 7. Applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped. Technologies used to ensure secure of data: • SSL secure data transmission: Secure Socket Layer • Data encryption: Encrypted data sent over internet • Use safe protocols: use secure FTP for data transmission
  • 8.
  • 9. Intellectual property rights are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. It gives the owner a right to decide the price for doing (exchanging/sharing/distributing)
  • 10. ● Plagiarism is stealing someone else’s intellectual work and representing it as your own work without citing the source of information. Any of the following acts would be term as plagiarism. i) Using some other author’s work without giving credit to author. ii) Using someone else’s work in incorrect form than intended originally by the author/creator. iii) Modifying/lifting someone’s production such as music-composition etc. without attributing it to the creator of the work. iv) Giving incorrect source of information. v) Failing in giving credit or acknowledging the contribution of others in a collaborative effort.
  • 11. Plagiarism involves copying not only ideas but also a substantial portion of a copyrighted work without attribution and without permission, it would amount to both copyright infringement and the violation of the ‘special right’ of the author to be credited. A civil suit may be instituted, and criminal charges may also be filed.
  • 12. ● Digital refers to any information about you or created by you that exists in digital form, either online or on an electronic storage device. All digital property comprises by you is known as digital estate. ● Digital property lies with the owner: Legally a person who has created it or the owner who has got it developed by paying legally is the legal owner of a digital property. Only the owner can use and decide who all and in what form can his/her digital asset may be used by other whether by making payments or by buying it or by obtaining its license or usage rights etc.
  • 13. 1. Digital software penetration tools: There are many software penetration tools such as cracks and keygens, tools created by hackers to penetrate your software’s registration system and enable unauthorized users to freely access the software without paying or it. 2. Stealing and plagiarizing codes of your digital properties: Sometimes other developers somehow get hold of your software’s source code and then create plagiarized versions of your code and use it in their own software
  • 14. 1. Anti-Temper Solutions: Anti temper solutions use a host of advanced technologies to prevent hackers from hacking, reverse- engineering or manipulating the digital properties such as utility tools, software, apps, video games etc. 2. Legal Clauses: you an include a transparent clause in software’s terms of service that prohibits the scraping of the software’s source code for reuse. 3. Limit the sharing of software code: share your software code only with trusted individuals who are part of development team. We can also use a digital rights management (DRM) solution to protect the software from being scraped for source code using decompiles etc.