Ethics and safety measures in Computing

10,613 views 14 slides Jul 30, 2020
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

Ethics and safety measures in Computing


Slide Content

ETHICS AND SAFETY measures in computing

COMPUTER ETHICS Computer ethics are a set of moral standards that govern the use of computers. It is society’s views about the use of computers of both hardware and software. Some of them are - Respect the privacy of others on the Internet and never access their information without their permission. Posting wrong or unethical information on the Internet can harm others. Always use original software. Be respectful while communicating with others on Internet.

The Ten Commandments of Computer Ethics The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute.[1] The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers." They are as follows - One should not use a computer to harm other people. One should not interfere with other people's computer work. One should not snoop around in other people's computer files. One should not use a computer to steal. One should not use a computer to bear false witness. One should not copy or use proprietary software for which you have not paid (without permission). One should not use other people's computer resources without authorization or proper compensation. One should not appropriate other people's intellectual output. One should think about the social consequences of the program you are writing or the system you are designing. One should always use a computer in ways that ensure consideration and respect for other humans.

SPAMMING PHISHING HACKING CYBERBULLYING UNETHICAL PRACTICES PLAGIARISM

PLAGIARISM Plagiarism is an act of presenting someone’s work, ideas, thoughts or creativity as your own, with or without their permission. Even accidentally using another’s ideas or words without proper citation, due to carelessness, falls under plagiarism. It is considered as Cyber-Crime and is a punishable act. Take permission of the author whose contents you are using. Write the content in your own language. Always acknowledge the source from where the content is taken. Put cotents in quotes. PREVENTING PLAGIARISM

SPAMMING Spam is any kind of unwanted, unsolicited digital communication, often an email, that gets sent out in bulk. They exhaust the storage space and make it difficult for us to find important mails received. It is also known as mail bombing. Never provide your email address unnecessarily anywhere. Never open or reply to spam messages. Use Spam filtering tools. PREVENTING SPAMMING

PHISHING Phishing is a cyber attack that uses disguised emails, phone calls or messages as a weapon. The goal is to trick the recipient into believing that the message is something they want or need — a request from their bank or to click a link or download an attachment so to get account details, passwords etc. Never access a bank's website from the link provided. Never respond to unknown emails received. Never share your credentials to anyone. PREVENTING PHISHING

HACKING Hacking means gaining the access to a remote computer to control its information without any authorisation from the owner. Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. Always keep an up-to-date antivirus software in your system. Never download pirated software. Never share your passwords and frequently change them. PREVENTING HACKING

CYBERBULLYING Cyberbullying is the use of technology to intimidate, harass, threaten, torment, or humiliate a target via social media, email, messaging apps, text messages, forums, games, and more. Examples of cyberbullying including sending mean texts, posting false information about a person online, or sharing embarrassing photos or videos. While using social media, check the privacy settings and keep them accessible to known people only. Never share your information or photos publically on Internet. PREVENTING CYBERBULLYNG

RIGHT TO PRIVACY Right to Privacy is an individual's fundamental right to keep his/her personal information secret from others and reveal only selective information. Accessing search information without the consent of the owner is unethical and illegal. Protecting Privacy - Never Share your Account details like ID or passwords with others. Avoid keeping any confidential information in your system and delete it, if it is no longer required. Cookies stored in your system by other websites cause leakage of information. Delete them on regualar basis.

intellectual property right Intellectual property Right (IPR) is the product of the human intellect including creativity concepts, inventions, industrial models, trademarks, songs, literature, symbols, names, brands,....etc. Intellectual Property Rights do not differ from other property rights. They allow their owner to completely benefit from his/her product which was initially an idea that developed and crystallized. They also entitle him/her to prevent others from using, dealing or tampering with his/her product without prior permission from him/her.

digital footprints A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. There are two types of digital footprints - A "passive digital footprint" is a data trail you unintentionally leave online. For example, when you visit a website, the web server may log your IP address, which identifies your Internet service provider and your approximate location. An "active digital footprint" includes data that you intentionally submit online. Sending an email contributes to your active digital footprint, since you expect the data be seen and/or saved by another person.

safety measures Install protected software : Install protected (Antivirus) software and set it to scan your files and folders for viruses on a regular basis. Choose Strong Password : Use a combiantion of letters, numbers and special characters to create a strong password. Create a different password for each important account and update it regualarly. Back up on regular basis : Make a practise to take regualr back ups of the important data Control Access to your machine : Do not leave your computer unattended or locked on, especially at public places. Use e-mail and Internet safety : Do not open the e-mail with an attachment or link from the people you don't know. Protect sensitive data : Remove all the sensitive data files from the hard disks especially when recycling or repurposing your computer. Use Firewall : Firewall is the easiest way to safeguard your computer from being accessed by a burglar, especially via Internet.

THANK YOU Name - Darshil Malviya Class - VIII Roll no. - 04