ECS - Ethics and Cyber Security Overview

Ethics and Cyber Security

Introduction

Your best friend informed you about a piracy website that will allow you to download movies. What do you do? This unit will instruct you on how to make ethical decisions. You will also discover what could occur if you commit plagiarism, violate copyright, and computer laws. You will also be able to describe the various copyright licenses used in the creation and distribution of software.

Essential Questions

  • What steps are involved in making ethical decisions?
  • What are the consequences for violating copyright?
  • Under what circumstances can software be copied?

Key Terms

  • Code of Ethics - A set of guidelines to help individuals make on-the-job ethical decisions.
  • Commercial Software – software that is sold in computer stores or websites.
  • Computer Worm - A software program designed to replicate itself after entering a computer system through a network or security hole.
  • Encryption - The process of scrambling or hiding information so that it cannot be understood without the key to change it back.
  • End User Piracy - when an individual reproduces copies of software without authorization.
  • Internet Piracy - the practice of downloading and distributing copyrighted content digitally without permission.
  • Jailbreak - Making unauthorized changes to an iPod, iPhone, or iPad to get apps from a source other than the official iTunes App Store.
  • Keylogger - A program that records a person's keystrokes, saves them, and then sends them to a system administer or remote hacker.
  • Malware - Programs such as viruses, worms, and bots designed to disrupt computer operations.
  • Pharming - An exploit that redirects users to fake websites.
  • Proprietary Software – software that has restrictions on its use that are defined by copyright, patents, or license agreements.
  • Public Domain Software – software not protected by copyright because the copyright has expired, or the author has placed the software in public domain.
  • Softlifting - a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.
  • Software Piracy - the illegal copying, distribution, or use of software.
  • Spam - Unsolicited e-mail typically sent as a bulk or mass-mailing and often used for fraudulent or deceptive marketing.
  • Whistleblowing - The disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace.
  • Zombie - A computer that has been compromised by malware that allows it to be controlled be a remote user.

 [CC BY 4.0] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION