Presentation on theme: "LESSON 2: Internet, Computer Ethics and Security"— Presentation transcript:
1 LESSON 2: Internet, Computer Ethics and Security OBJECTIVESReview the basics Internet Concepts and its typesDetermine the computer ethics and netiquetteDiscuss different kinds of computer risksName some computer and internet crimesList ways how to secure computer and Internet security measuresWHAT IS INTERNET?Is the Worldwide collection of networks, cooperating with each other to exchange data using a common software standard, on which end –user services.
2 The Internet provides following main facilities: WHAT IS WEBSITE?Is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide some kind of useful information.ChatSearching JobsAdvertising for BusinessE-commerceSearching Information
3 TYPES OF WEBSITE Advocacy Website Blogs Website Wiki Website Portal websiteNews WebsiteInformational WebsiteBusiness / Marketing WebsiteSmall Business WebsitesLarge Business WebsitesEducational WebsiteEntertainment WebsiteAdvocacy WebsiteBlogs WebsiteWiki WebsiteContent Aggregator WebsiteSocial Network websiteSearch Engine , Directories, Yellow pages and Portals Website
4 COMPUTER ETHICS Real People Exist Behind The Computers It is the RESPONSIBLE USE of computers and computer networks.NETIQUETTEOr net etiquette, refers to etiquette on the Internet. GOOD NETIQUETTE INVOLVES RESPECTING OTHER’S PRIVACY AND NOT DOING ANYTHING ONLINE THAT WILL ANNOY OR FRUSTRATE OTHER PEOPLE.It is about proper ways in which to use a network and to determine whether information reliable, while emphasizing 3 important Points.Real People Exist Behind The ComputersProtect your PrivacyAvoid Spamming
5 Day-to-Day EthicsAll of us must know these already, because their modified forms of ethics today told by us by our grandparents/parents, like don’t open letters of others, don’t copy the home work from others, don’t listen to any conversation secretly etc.the following discusses the basic day-today ethics to observe when using computers.Software PiracyComputer Viruses/WormsPlagiarismHackingFile privacyIntellectual Property RightsCopyrightInformation Privacy
6 THE REPUBLIC ACT 10175: ANTI-CYBERCRIME LAW the Law defines cybercrime offenses with definitive punishments.Illegal AccessIllegal InterceptionData InterferenceSystem InterferenceMisuse of DevicesCyber squattingComputer –Related ForgeryComputer –Related FraudComputer –Related Identity TheftCybersexChild PornographyUnsolicited CommercialLibelCOMPUTER SECURITY RISKSThis is a very general statement because many things are in fact, computer security risks. A RISKS is a vulnerability that could allow lost of confidentiality , integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited.THE REPUBLIC ACT 10175: ANTI-CYBERCRIME LAW- The purpose of this act define, provide for the prevention , investigation , suppression and penalties therefore and other purpose.
7 Facebook is spying on your mom, your relationship and your Political Views Facebook has been spying on user’s ethnicities, political views, romantic and partners, and even how they talk to their children. ( Unlike the mood study, the facebook studies listed below are observational; they don’t attempt to change user’s behavior. )
8 It’s unlikely Facebook users have heard about most these studies, they’ve consented to them; the social network’s Data Use Policy states. “We may use the information we receive about you…for internal operations, including troubleshooting, data analysis, testing, research and service improvement.”
9 How to Prevent Cyber Crime Prevention will always be your best Line of defense against cyber criminals. Like any other criminal activity, those vulnerable tend to be first targeted.Ideally, you’ll want to work with a IT security expert to assess your specific needs and vulnerabilities, but there are certainly some universal steps you can take that will greatly reduce your likelihood of attack.