Professional Ethics - Davis School District Ethics Its not all about right & wrong . Computer Ethics...

27
Professional Ethics Its not all about right & wrong

Transcript of Professional Ethics - Davis School District Ethics Its not all about right & wrong . Computer Ethics...

Professional EthicsIts not all about right & wrong

Code of Conduct

• A set of rules to guide behavior and

decisions.

• A code of conduct can outline Professional

behavior

– Doctor, Lawyer, Military, etc.

Acceptable Use Policies

• AUP = Acceptable use policy

– Guidelines that outline what an organization

finds acceptable or unacceptable for use of

the Internet

– Can apply to internet, computer, or network

usage

• Look at the school AUP

opyright and Licensing Laws

• The right to control how your art, literature or other work is used.

• Intent: to advance the progress of knowledge by giving the creator an economic incentive to create new works.

• It has to be tangible to be copyrighted.

• A document may be copyrighted even if it doesn’t state that it is.

Fair Use Laws

User must weigh four factors:• The purpose and character

of the use

• The amount and substantiality of the portion used.

• The effect on the potential market for the copyrighted work.

• The nature of the copyrighted work

Trade secrets and Piracy

• Loss of Intellectual Property in a business.

• Includes formulas, patterns, programs, data, technique, and processes.

• Customer Lists

• How can all this be protected?

Plagiarism & Internet Cheating

• Taking the work of

someone else and

submitting it as your own.

• Many view work on the

Internet as public domain.

• There are lots of

programs on the web to

detect plagiarism. http://www.members.optusnet.com.au/mattnrae/pic18%20copyright.jpg

Evaluating Information

Accuracy

WWW offers information from around the world.

• Information can appear fairly anonymous.

When you use an electronic library the information has already been evaluated by experts.

Consider the following:

• authorship,

• point of view or bias,

• verifiability,

• currency of information.

• How do you do this?

Professional EthicsIts not all about right & wrong

Computer Ethics

MALWARE

• Malware, short for malicious software, is

any software used to disrupt computer

operation, gather sensitive information, or

gain access to private computer systems

• 'Malware' is applied to both true (malicious)

malware and unintentionally harmful

software

Malware - Computer Virus

• A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the user

• Viruses can either be considered a Nuisance or Destructive

• Some viruses replicate themselves when they attach to a computer program. When a computer runs the infected program, the virus launches and embeds itself in the computer’s memory. It then looks for other programs or files to which it can attach. This process repeats each time an infected program launches.

• A trigger event may activate the virus. This can be a date or a specific set of input.

Examples of Viruses

• Email– E-mail viruses may find an individual’s address book and send copies of an

infected document to everyone listed.

• Trojan Horse– Named after the wooden horse the Greeks used to infiltrate Troy, a Trojan

Horse is a program that appears to be useful software, but instead it compromises your security and causes a lot of damage. Once it is downloaded and executed, the malicious code begins to work. The difference between Trojan Horses and viruses is that Trojan Horses do not replicate or spread on their own. They can only be transmitted intentionally via email or disk, or downloaded directly onto a PC. Many Trojan Horses are designed to steal your login ID and password and then email them to someone else who can make use of the account at your expense. Other Trojan Horses can display obscene messages or delete the contents of your hard drive.

• Worms– Worms are very similar to viruses in that they are computer programs that

replicate functional copies of themselves and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. The difference is that, unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs.

– Citation: http://ittraining.iu.edu/workshops/win_security/virus.html

Prevention

• Steps to help prevent or detect a virus.

– Be careful about what you open or download

from the internet

– Use a virus protection software

– Use a firewall and turn your computer off

when not in use

Computer Theft & Privacy

• The most popular item to steal are Laptops

so they can be sold of the data

• To keep your files and information safe and

to keep most people out of your files

– Use passwords

Hacking

• Hacking

– Unauthorized use of computer and network

resource

• The penalty for hacking

– It is a felony

• Hackers cost business money because of

Downtime and loss of data

Internet Controls

• Types of controls for internet safety

– Firewalls: form a barrier

– between two networks

– Filters: control what can be viewed on

Internet

– Parental Control: parents control what kids

do on Internet

Freeware & Shareware

• Freeware

– is copyrighted computer software which is made available

for use free of charge, for an unlimited time

• Shareware software

– typically obtained free of charge, either by downloading

from the Internet or other source. A user tries out the

program, and thus shareware has also been known as "try

before you buy". A shareware program is accompanied by

a request for payment, and the software's distribution

license often requires such a payment.

Public Domain

• This is non-copyrighted material available to

everyone, free-of-charge.

• Those works whose intellectual property

rights have expired, been forfeited, or are

inapplicable. Examples include the works of

Shakespeare and Beethoven.

– www.librivox.org

Trigger Events

• An event that activates a task often associated

with a computer virus.

– Time Bomb

• Watches for the PC clock to reach a certain date to

activate the virus.

– Example

» Michelangelo virus

» Damages files on March 6 the artist’s birthday

– Logic Bomb

• Watches for a specific set of input to activate the virus.

File Virus

• Virus that attaches to an application program.

– Example

• Chernobyl

• Notorious for overwriting a section of the hard

disk, making it impossible to access data.

Boot Sector Virus

• Infects the system files that your computer

uses every time it is turned on.

• Cause widespread damage and recurring

problems.

• Example

• Stoned Virus

• Every time you turn on your computer the

virus is activated and infects any non-write-

protected files including your hard disk.

Trojan Horse Virus

• Computer program that seems to perform

one function while actually doing something

else.

– Different from a virus because it does not make

copies of itself.

– Different tasks can be affected

– Stealing passwords

– Deleting files

Trojan Horse Example

Worm

• Software program designed to enter a

computer system usually through a network,

through security holes and then replicateS

itself.

– Spreads from computer to computer.

Worm Example

Resources

• Parsons, June Jamrich, and Dan Oja.

Computer Concepts. Boston: Course

Technology - Thompson Learning, 2002.