0% found this document useful (0 votes)
872 views9 pages

CYBER ETHICS CBSE Class 10 Computer Applications Notes.

This document discusses various topics related to cyber ethics, including privacy, fraud, secure data transmission, intellectual property rights, digital property rights, open source software, free software, and licenses for open source tech. It provides guidelines for acceptable online behavior and protecting personal information and security in electronic commerce. Key points include respecting privacy and terms of use, using HTTPS, verifying website legitimacy to avoid fraud, applying encryption and authentication, and giving proper attribution to avoid plagiarism.

Uploaded by

Eshal Inayah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
872 views9 pages

CYBER ETHICS CBSE Class 10 Computer Applications Notes.

This document discusses various topics related to cyber ethics, including privacy, fraud, secure data transmission, intellectual property rights, digital property rights, open source software, free software, and licenses for open source tech. It provides guidelines for acceptable online behavior and protecting personal information and security in electronic commerce. Key points include respecting privacy and terms of use, using HTTPS, verifying website legitimacy to avoid fraud, applying encryption and authentication, and giving proper attribution to avoid plagiarism.

Uploaded by

Eshal Inayah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CYBER ETHICS

Created @December 4, 2023 4:02 AM

Class IT

Type Lecture

Reviewed

⟹ Cyber Ethics
ideal pattern of behavior for users, guidelines
of what is acceptable in an online media for
professional or personal use is known as cyber
ethics.

what are a few things to follow?


1. be forgiving

2. don’t abuse power

3. be human

4. be ethical

CYBER ETHICS 1
5. know where you are

6. respect peoples time and data limit

7. make yourself look good

8. share expert knowledge

9. keep disagreements healthy

10. respect peoples privacy.

⟹ In E-Commerce
PRIVACY: Protection of personal data while
carrying out some activity or transaction .

can be safeguarded by:

reading terms and conditions.

making sure https protocol is found on address bar before


making transactions.

merchant must clearly state how they're gon use the data.

merchant must make sure the buyer has read terms and
conditions

merchant must use https sites for transactions

FRAUD: wrongful or criminal deception intended


to result in financial or personal gain.

Examples:

undelivered goods

non existent companies

stealing information/theft identity

fraudulent payments/credit card frauds.

CYBER ETHICS 2
Stop frauds by:

an official body which sees whether the site is legit or


not.

security mechanisms + payment gateways

guidelines + safeguards when giving information to 3rd party


apps.

type the URL of given website on your own.

ensure the HTTP and padlock sign.

allowing valid users only:

SECURE DATA TRANSMISSION: applying enough


technical safeguards so data travels safely
without any compromise

(i) SSL : standard security protocol which gives encryption


b/w web server and browser.

(ii) Data encryption : encrypts data

(iii) use secure protocol: for files —>SFTP , for sites —> SSH
and HTTPS

valid users only:

authentication: verifying legal user through login.

authorization: Checking permission to access data

⟹ IPR
They ate the rights of an owner of how much
information is to be exchanged, shared and

CYBER ETHICS 3
distributed. right to monetize information as
well.

💡 Information means to acquire knowledge


intellectual capital.
and forms an

PLAIGARISM: unauthorized usage or imitation of


the language and thoughts of another person and
representation of it as one’s own original
work.

Usually are:

using another persons work without credit.

using another's work in the wrong way

modifying someone’s work without attribution.

wrong citation

failure of giving credit in a collaborative project.

HOW TO NOT PLAGARIZE:

1. give credit when using someone’s work.

2. quote whatever was spoken by the person

3. paraphrase.

⟹ DPR
Digital property rights: rights to any
information about you or created by you in
digital form.

THREATS

Digital software penetration tools.

CYBER ETHICS 4
plagiarism

PROTECTION

Anti temper solutions

legal clauses

limit software sharing codes

⟹OSS
Can be freely used.

doesn't need to be free of charge

free redistribution

open source code

Integrity of authors course code must be maintained

No discrimination against endeavor or group

rights must be maintained when distributing liscence

no restriction of rights in the program

mustnt restrict other programs

must be tech neutral

⟹FREE SOFTWARE
IT IS:

freely accessable

freely used

changed

improved

distributed

+ no payments.

CYBER ETHICS 5
⟹DEFINITIONS
⭆GNU
Genuinely not UNIX

initiated by Richard M Stallman

offers wide range of software

⭆FSF
non profit organization

founded in 1985

works for legal + structural issues of Free Software


Community

⭆OSI
promotes OSS

founders —> Perens , Raymond

specifies criteria + defines specifications for OSS

distribution terms of OSS must comply with OSD by OSI

⭆Freeware
no course code

copy and redistribute

no modification whatsoever

distributed in binary form

no licensing fee

only used for private + commercial purpose

CYBER ETHICS 6
⭆ W3C
World wide web consortium

created in Oct 1994

developed common protocols for full potential of the web

⭆ Proprietary software
neither open nor free

redistribution + modification is prohibited/requires special


permission

no course code

⭆ Shareware
right to redistribute copies

after a certain period license fee must be paid

no souse code + modification.

used for letting many people try out software and pay after
certain time.

⭆Copylefted software
copies of all versions carry same distribution terms

disallow others to add additional requirements

require making course code available.

⟹LICENSES OF OPEN SOURSE TECH


⇛ GPL
Copy software

distribute however ya like

charge a fee

make whatever modifications desired.

CYBER ETHICS 7
requirement to release software extension

⇛LGPL
Lesser rights to work

license free + proprietary software

requirement to release software extension has been removed.

used usually in libraries

⇛ BSD
fewer restrictions than GPL and LGPL

vers

⭆ new BSD

3 clause license

unlimited redistribution as long as copyright notices and


warranty are maintained

contains clause restricting use of names of contributors


and endorsement without permission

⭆Free BSD

omits non endorsement clause

⭆MIT
Least restrictive

copy + modify in anyway. No one gives a damn

give new software for free or sell it

I has to be accompanied by an MIT Liscence agreement

⇛ Apache
Right are perpetual (use them forever)

are worldwide

no fee/ royalty

non-exclusive

CYBER ETHICS 8
irrevocable

⟹ FREEDOM OF INFORMATION AND


DIGITAL DIVIDE
Digital divide is the economic and social inequality with
regard to use etc of ICT.

⟹The major reasons are:

Tech reach (not every place has technology)

Digital Literacy

CYBER ETHICS 9

You might also like