0% found this document useful (0 votes)
22 views1 page

Ethics 1

Ans

Uploaded by

tarun19042011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views1 page

Ethics 1

Ans

Uploaded by

tarun19042011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Software Piracy: It is an act of making and distributing copies of software without buying the required

licence or copyright. To Run a software on the computer system, the user needs to purchase a licensed
copy of the software.

To avoid piracy one must always buy software from a reputed organization and make sure that it comes
with original disk and authentic packaging.

Spam : Spams are unwanted junk mails sent out in bulk. Usually they are promotional material, get rich
quick schemes etc sent by companies. Spams from unauthorised sources have a link that attracts the
user into clicking it and confirms the email ID.

Phishing: Phishing is a kind of cybercrime whereby sensitive information like password, credit/debit card
details etc are acquired fraudulently.

It is usually done through attractive looking spam mails or calls posing as a trustworthy communication.
It’s a method of committing online financial frauds.

Hacking : Its an act of gaining unauthorised excess to computer or network resources targetting
confidential information such as passwords credit-debit Card details, personal pictures, documents etc.s

Hacking challenges the security system of a computer and network. Hacking is a punishable cyber crime.

Cyber bullying : bullying is using aggressive behaviour to hurt, threaten or frighten someone by passing
negative comments on social networking sights, spreading rumours or distorting someone's social
image. Bullying has negative effects on the person being bullied. They show mental health issues,
decline in their self confidence, anxiety and depression.

Plagiarism: the act of copying other's creation and producing it as own creation in the same form or the
other is known as plagiarism.

People create content and upload it on the Internet for example a painting, a piece of audio or video, a
software or an app etc. Others might copy the same content and present it as their own this is an act of
plagiarism which is a punishable cyber crime.

Firewall: it is defined as a network security device that allows or rejects network access between an
untrusted zone (Internet) and a trusted zone (a private network). It is designed to track incoming and
outgoing data to protect unauthorised access from an unknown network into our system.

Digital Footprints: These are the information of various activities performed by an individual on the
internet. The websights visited, emails sent, information submitted online, videos watched, the type of
purchases made etc. Make upto our footprints on internet. It is advantageous to make the detection of
fradulent activities but can prove harmful if it goes to unauthorised hands.

You might also like