IT - Computer Ethics
Home > Flashcards > Print Preview
The flashcards below were created by user
on FreezingBlue Flashcards
. What would you like to do?
Refers to any crime that involves a computer and a network.
Computer crime, or Cybercrime
Refers, more precisely, to criminal exploitation of the Internet.
Examples of crimes that primarily target computer networks or devices would include:
- Computer viruses
- Denial-of-service attacks
- Malware (malicious code)
Examples of crimes that merely use computer networks or devices would include:
- Fraud and identity theft
- Information warfare
- Phishing scams
Consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.
Malware, short for malicious software
____ is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.
Normally involves mass mailing a large number of email accounts with an email that fraudulently attempts to instruct the receiver to verify sensitive account information by logging on to a site or including it in a return email link to the sender to authenticate that they are the authorized user of that account.
A deviant program that attaches itself to computer systems and destroys or corrupts data.
Are computer programs, developed by (unethical) programmers, that destroy or later data stored on disk or that otherwise interfere with the operation of your computer.
A program that copies itself repeatedly into memory or onto a disk drive until no more space is left.
___ is that part of the system software containing most of the instructions for booting, or powering up, the system.
___ replaces these boot instructions with some of its own.
___ attach themselves to executable files – those that actually begin a program.
In DOS, these files caused by File Virus have the extensions :
___ covertly places illegal, destructive instructions in the middle of a legitimate program, such as a computer game.
___ differ from other viruses in that they are set to go off at a certain date and time.
Logic bombs, or simply bombs
____ of which there are several kinds, can mutate and change form just as human viruses can. These are especially troublesome because they can change their profile, making existing antiviral technology ineffective.
These viruses take advantage of a procedure in which miniature programs, known as macros, are embedded inside common data files, such as those created by e-mail or spreadsheets, which are sent over computer networks. Such documents are typically ignored by anti-virus software.
___ is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware, or that installs other malware
Rogue security software (or rogueware)
The two main categories of Rogue security software :
- FALSE ALARM Rogueware
- BAD COP Rogueware
This type dupes you into believing that your system is infected by scanning your hard drive and detecting threats that do not exist or sometimes identifying cookies as security threats.
FALSE ALARM Rogueware
This type of rogueware encourages you to run a system scan which in actual fact downloads some malware onto your system, which is then detected and can only be removed by purchasing the Removal software from the same company.
BAD COP Rogueware
___ refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but the degree of enforcement varies.
Copyright infringement of software (often referred to as software piracy)
“ AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY CODE AND ESTABLISHING THE INTELLECTUAL PROPERTY OFFICE, PROVIDING FOR ITS POWERS AND FUNCTIONS, AND FOR OTHER PURPOSES”.
- INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES
- [Republic Act No. 8293]
___ (which protects music, movies, computer programs, and video games) is an example of such (INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES).
Optical Media Act
AN ACT REGULATING THE ISSUANCE AND USE OF ACCESS DEVICES, PROHIBITING FRAUDULENT ACTS COMMITTED RELATIVE THERETO, PROVIDING PENALTIES AND FOR OTHER PURPOSES.
REPUBLIC ACT NO. 8484
A secret word or string of characters that is used for authentication, to prove identity or gain access to a resource
___ is a type of password.
an access code
A device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
The process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
The result of the process is encrypted information (in cryptography, referred to as ________)
Five common-sense techniques and strategies to solve common computer hardware problems:
- "It's the cable, s-----."
- Don't be frustrated!
- Take notes!
- Take a look?
Here are some rules which should help you to avoid shock hazards:
- Always turn off the equipment and unplug it before you begin to work.
- Be especially careful when working with those parts of the equipment that carry high voltage
- Don’t work when you’re tired or rushed.
- Try to do the work with one hand. This “one-hand rule” reduces the chance that a current will flow through the main part of your body.
What would you like to do?
Home > Flashcards > Print Preview