SlideShare a Scribd company logo
1 of 23
COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
1
COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
4.1 COMPUTER ETHICS
4.1.1. NETIQUETTE
2
At the end of this topic, students should be able to:
*Identify the rules of Netiquette
NETIQUETTENETIQUETTE
3
 Definition of Netiquette (or Internet
Netiquette):The code of acceptable behaviors that
users should follow while on the internet
NETIQUETTENETIQUETTE
4
 NETIQUETTENETIQUETTE-- GoldenGolden Rule:Rule: Treat others as youTreat others as you
would like them treat you…would like them treat you…
NETIQUETTENETIQUETTE
5
 Netiquette includes rules for all aspects of the
Internet Services,including:
Internet Services: WWWInternet Services: WWW
6
 What is WWW?
• The World Wide Web (WWW), or Web,
consists of a worldwide collection of electronic
documents.
Internet Services: E-MailInternet Services: E-Mail
7
 What is an E-Mail?
• E-mail (short for electronic mail ) is the
transmission of messages and files via a
computer network.
• Email was one of the original services on the
Internet, enabling scientist to communicate
with other scientist at other locations.
Internet Services: E-MailInternet Services: E-Mail
8
Internet Services: E-MailInternet Services: E-Mail
9
 An e-mail program is used to create, send, receive,
forward, store, print, and delete e-mail messages.
• Example: Gmail, Yahoo! Mail
 An e-mail address is a combination of a user name and a
domain name that identifies a user so that he or she can
receive Internet e-mail.
• Example: fidaanuar@gmail.com
 A user name is a unique combination of characters, such
as letters of the alphabet and/or numbers, that identifies
a specific user.
Internet Services: E-MailInternet Services: E-Mail
10
 An address book, or contacts folder, contains a
list of names and e-mail addresses.
 An attachment in e-mail message, is a file to
supplement the body of the e-mail message.
Internet Services:Internet Services:
Instant MessagingInstant Messaging
11
 What is an Instant Messaging?
Real-time Internet communication
services that notify you when one or more connected
users are online & allows you to exchange messages,
photos, videos, and other content.
*Real time means that you and the people with whom
you are conversing are online at the same time.
Internet Services:Internet Services:
Instant MessagingInstant Messaging
12
• Instant Messaging services support voice, video
conversations, allow you to send photos, listen to
streaming music, and play games with another online
contact.
• For real time Instant Messaging to work, both parties
must be online at the same time. Also, the receiver
of a message must be willing to accept messages.
Internet Services:Internet Services:
Instant MessagingInstant Messaging
13
 Examples of popular Instant Messaging:
• Google Talk
• MySpace IM
• Windows Live Messenger
• Yahoo! Messenger
• Whatsapp
• WeChat
14
 What is a Message Board?
• A message board is a Web-based type of
discussion group where users have
written discussions about particulars
(uses web browser)
• Example : Yahoo!Message Boards
Internet Services : Message
Board
COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY
4.1 COMPUTER ETHICS
4.1.2. Areas of computer ethic
15
At the end of this topic, students should be able to:
*Define computer ethics
*Describe areas of computer ethics
COMPUTER ETHICSCOMPUTER ETHICS
16
 Definition of Computer Ethics :The moral
guidelines that oversee the use of computers and
information systems.
AREAS OF COMPUTERAREAS OF COMPUTER
ETHICSETHICS
17
 There are four (4) types of Areas of Computer Ethics:
INFORMATIONINFORMATION
ACCURACYACCURACY
18
 What is a Information Accuracy?
• A measure of the reliability of information held
within an IT system.
 Information Accuracy today is a concern because
many users access information mainly from the
Internet.
 DO NOT assume all the information on the web is
correct, we should evaluate the value of a web before
relying on its content.
GREEN COMPUTINGGREEN COMPUTING
19
 What is a Green Computing?
• Involves reducing the electricity and environmental
waste while using computers.
GREEN COMPUTING SUGGESTIONS
• Do not leave the computer running overnight.
• Use computers and devices that comply with the Energy Star
program.
• Use LCD monitors instead of CRT monitors.
• Recycle paper
• Recycle toner cartridges.
CODES OF CONDUCTCODES OF CONDUCT
20
• Is a written guideline that helps determine whether a
specific computer action is ethical or unethical.
IT Code of Conduct
1.Computers may not be used to harm other people
2.Employees may not interfere with others computer
work
3.Computers may not be used to steal
4. Computers may not be used to bear false witness
5.Computers may not copy or use software illegally
INFORMATION PRIVACYINFORMATION PRIVACY
21
 What is a Information Privacy?
• Companies to deny or restrict the collection and use
of information about them.
INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY
22
 What is a Intellectual Property?
• Refers to unique and original works such as logos,
brands, ideas, inventions, art, writings, process,
company, and product names and logos.
Web Site:Web Site:
Online Social NetworkOnline Social Network
23
• TYPES OF INTELLECTED PROPERTIES
TYPES OF INTELLECTED
PROPERTIES
IMPORTANCE OF EACH IP
TRADEMARK To protect image, logo from being used
by any other business entity
PATENT To protect product ideas, manufacturing
process improvements, and technological
developments from being used by other
business entity
COPYRIGHT To protect any material form of
expression (written words, music, dance,
art) from being used by others.

More Related Content

What's hot

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethicsbadak sumbu
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is usedgracepm28
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 

What's hot (20)

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
System failure
System  failureSystem  failure
System failure
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
cyber_security
cyber_securitycyber_security
cyber_security
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 

Similar to COMPUTER ETHICS AND SECURITY

Internet and intranet
Internet and intranetInternet and intranet
Internet and intranetAnil Pokhrel
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
technologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdftechnologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdfJinx33
 
Discovering the internet
Discovering the internetDiscovering the internet
Discovering the internetIris Hershenson
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSSVigneshkumar Ponnusamy
 
Internet tech lessons
Internet tech lessonsInternet tech lessons
Internet tech lessonslearnt
 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfSuriyaMahendran2
 
presentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptxpresentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptxAnmolThakur67
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEUsama ahmad
 
Digi comms ass. 1 p1
Digi comms ass. 1 p1Digi comms ass. 1 p1
Digi comms ass. 1 p1Louise Reed
 
DIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information onlineDIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information onlineGoutham B
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
A Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxA Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxdexdexjoyjoy
 

Similar to COMPUTER ETHICS AND SECURITY (20)

Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Internet Technology-I.pdf
Internet Technology-I.pdfInternet Technology-I.pdf
Internet Technology-I.pdf
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
technologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdftechnologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdf
 
Discovering the internet
Discovering the internetDiscovering the internet
Discovering the internet
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Internet
Internet Internet
Internet
 
Internet tech lessons
Internet tech lessonsInternet tech lessons
Internet tech lessons
 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdf
 
presentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptxpresentation_class_iv_internet_1593465556_82291_095339.pptx
presentation_class_iv_internet_1593465556_82291_095339.pptx
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
 
Digi comms ass. 1 p1
Digi comms ass. 1 p1Digi comms ass. 1 p1
Digi comms ass. 1 p1
 
Social network
Social networkSocial network
Social network
 
DIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information onlineDIGITAL SKILLS MODULE on Access Information online
DIGITAL SKILLS MODULE on Access Information online
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
A Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxA Fundamental elements of a network.pptx
A Fundamental elements of a network.pptx
 
amaha internet course
amaha internet courseamaha internet course
amaha internet course
 
The Internet
The InternetThe Internet
The Internet
 

Recently uploaded

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 

COMPUTER ETHICS AND SECURITY

  • 1. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY 1
  • 2. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY 4.1 COMPUTER ETHICS 4.1.1. NETIQUETTE 2 At the end of this topic, students should be able to: *Identify the rules of Netiquette
  • 3. NETIQUETTENETIQUETTE 3  Definition of Netiquette (or Internet Netiquette):The code of acceptable behaviors that users should follow while on the internet
  • 4. NETIQUETTENETIQUETTE 4  NETIQUETTENETIQUETTE-- GoldenGolden Rule:Rule: Treat others as youTreat others as you would like them treat you…would like them treat you…
  • 5. NETIQUETTENETIQUETTE 5  Netiquette includes rules for all aspects of the Internet Services,including:
  • 6. Internet Services: WWWInternet Services: WWW 6  What is WWW? • The World Wide Web (WWW), or Web, consists of a worldwide collection of electronic documents.
  • 7. Internet Services: E-MailInternet Services: E-Mail 7  What is an E-Mail? • E-mail (short for electronic mail ) is the transmission of messages and files via a computer network. • Email was one of the original services on the Internet, enabling scientist to communicate with other scientist at other locations.
  • 9. Internet Services: E-MailInternet Services: E-Mail 9  An e-mail program is used to create, send, receive, forward, store, print, and delete e-mail messages. • Example: Gmail, Yahoo! Mail  An e-mail address is a combination of a user name and a domain name that identifies a user so that he or she can receive Internet e-mail. • Example: fidaanuar@gmail.com  A user name is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
  • 10. Internet Services: E-MailInternet Services: E-Mail 10  An address book, or contacts folder, contains a list of names and e-mail addresses.  An attachment in e-mail message, is a file to supplement the body of the e-mail message.
  • 11. Internet Services:Internet Services: Instant MessagingInstant Messaging 11  What is an Instant Messaging? Real-time Internet communication services that notify you when one or more connected users are online & allows you to exchange messages, photos, videos, and other content. *Real time means that you and the people with whom you are conversing are online at the same time.
  • 12. Internet Services:Internet Services: Instant MessagingInstant Messaging 12 • Instant Messaging services support voice, video conversations, allow you to send photos, listen to streaming music, and play games with another online contact. • For real time Instant Messaging to work, both parties must be online at the same time. Also, the receiver of a message must be willing to accept messages.
  • 13. Internet Services:Internet Services: Instant MessagingInstant Messaging 13  Examples of popular Instant Messaging: • Google Talk • MySpace IM • Windows Live Messenger • Yahoo! Messenger • Whatsapp • WeChat
  • 14. 14  What is a Message Board? • A message board is a Web-based type of discussion group where users have written discussions about particulars (uses web browser) • Example : Yahoo!Message Boards Internet Services : Message Board
  • 15. COMPUTERCOMPUTER ETHICS AND SECURITYETHICS AND SECURITY 4.1 COMPUTER ETHICS 4.1.2. Areas of computer ethic 15 At the end of this topic, students should be able to: *Define computer ethics *Describe areas of computer ethics
  • 16. COMPUTER ETHICSCOMPUTER ETHICS 16  Definition of Computer Ethics :The moral guidelines that oversee the use of computers and information systems.
  • 17. AREAS OF COMPUTERAREAS OF COMPUTER ETHICSETHICS 17  There are four (4) types of Areas of Computer Ethics:
  • 18. INFORMATIONINFORMATION ACCURACYACCURACY 18  What is a Information Accuracy? • A measure of the reliability of information held within an IT system.  Information Accuracy today is a concern because many users access information mainly from the Internet.  DO NOT assume all the information on the web is correct, we should evaluate the value of a web before relying on its content.
  • 19. GREEN COMPUTINGGREEN COMPUTING 19  What is a Green Computing? • Involves reducing the electricity and environmental waste while using computers. GREEN COMPUTING SUGGESTIONS • Do not leave the computer running overnight. • Use computers and devices that comply with the Energy Star program. • Use LCD monitors instead of CRT monitors. • Recycle paper • Recycle toner cartridges.
  • 20. CODES OF CONDUCTCODES OF CONDUCT 20 • Is a written guideline that helps determine whether a specific computer action is ethical or unethical. IT Code of Conduct 1.Computers may not be used to harm other people 2.Employees may not interfere with others computer work 3.Computers may not be used to steal 4. Computers may not be used to bear false witness 5.Computers may not copy or use software illegally
  • 21. INFORMATION PRIVACYINFORMATION PRIVACY 21  What is a Information Privacy? • Companies to deny or restrict the collection and use of information about them.
  • 22. INTELLECTUAL PROPERTYINTELLECTUAL PROPERTY 22  What is a Intellectual Property? • Refers to unique and original works such as logos, brands, ideas, inventions, art, writings, process, company, and product names and logos.
  • 23. Web Site:Web Site: Online Social NetworkOnline Social Network 23 • TYPES OF INTELLECTED PROPERTIES TYPES OF INTELLECTED PROPERTIES IMPORTANCE OF EACH IP TRADEMARK To protect image, logo from being used by any other business entity PATENT To protect product ideas, manufacturing process improvements, and technological developments from being used by other business entity COPYRIGHT To protect any material form of expression (written words, music, dance, art) from being used by others.