You are on page 1of 2

*(whistle-blowing) A whistleblower (whistle-blower or whistle blower)[1] is a person who tells the public or someone in authority about alleged dishonest

or illegal activities (misconduct) occurring in a government department, a public or private organization, or a company. *(Competitive Intelligence and industrial espionage) 1-Competitive Intelligence is the process of obtaining and analyzing competitive information from publicly available sources to help achieve the objectives of an organization. 2-Industrial espionage is the practice of obtaining information about an organization or a society that is considered secret or confidential (spying) without the permission of the holder of the information. What differentiates espionage from other forms of intelligence work is that espionage involves obtaining the information by accessing the place where the information is stored or accessing the people who know the information and will divulge it through some kind of subterfuge. *(Cyber terrorism): is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. *(Identity theft): is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. *(Techniques Used by Identity) Thieves Identity this can be broadly defined as the unlawful acquisition and use of a persons personal identifying information. This can include a persons name, address, and social security number, date of birth, mothers maiden name, or drivers license information. Identity thieves use a number of techniques to acquire information; *(Cryptography): Cryptography defined as "the science and study of secret writing," concerns the ways in which communications and data can be encoded to prevent disclosure of their contents through eavesdropping or message interception, using codes (2), ciphers (3), and other methods. *(Cybersquatting): (also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price. *(strategy protect cybersquatting): 1. Have a registered trademark. 2. Record the proper domain ownership. 3. Buy up variations of your domain name. *(Professional Relationships That Must Be Managed): Employers clients suppliers other professionals IT users society at large. *(Relationships Between IT Professionals and Employers) 1.Trade secret 2. Whistle-blowing *(Relationships Between IT Professionals and Clients) *(Corporate ethics): Business ethics (also known as corporate ethics) is a form of applied ethics or professional ethics that examines ethical principles and moral or ethical problems that arise in a business environment. It applies to all aspects of business conduct and is relevant to the conduct of individuals and entire organizations. *(Logics lotion): Written and approved laws. Also known as statutes, acts or lex script, it also takes shape when a proposed law is set out before a formal assembly, such as the House of Representatives or Parliament. *(Hacker): it is the penetration or breaking into a system illegal authorization to explore vital information, and this exportation are to edit, delete, copy or comply any files. *(Types of hacking) 1.Website hacking, email hacking 2.Network hacking, password hacking. 3.Online hacking, computer hacking. *(Cracking): Breaking into a computer unauthorized to do damage, steal information, credit card and plant virus. *(Encryption): is a process that takes information and transcribes it into a different form that is unable to read by anyone who does not have the encryption code. *(Types of Encryption): 1.Symmetric Encryption: A singlets used for both encryption and decryption. 2.Asymmetric Encryption: A pair of key is used for encryption and another for decryption. *(Cause of errors in networks): trouble network in not trivial task but when we discuss of errors in network we talk and look into the main aspect of it. *(FCS) or (file check sequence):

It occurs when a packets are transmitted and received with FCS examine with involvement of bits. *(Alignment errors): Caused then a file has as even number of bits bot divisible by eight and FCS A faulty LAN driver could cause some of errors. *(Collision and late Collision): it occurs when more than one device try to use the same network at the same time. *(Discards): can be caused by a buffer being too full which prevented the network from getting the packet from a devices, or it may not be able to deliver an upper layer protocol. *(Common types computer security attacks organizations): 1. Data Attacks 2.Unauthorized Copying of Data 3.Traffic Analysis 4.Software Attacks 5.Trojan Horses. *(Computer Security): The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. Security is the degree of protection against danger, damage, loss, and criminal activity. *(Internet security): is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.[1] The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. *(Software & Hardware Security): The performance of your computer network, including software and hardware, is critical to your organizations ability to function on a daily basis. The security of your network environment, including software and hardware security, is even more essential; A data breach could cost your organization thousands (or millions of dollars) and tarnish its reputation. *(Consequentialism): refers to those moral theories which hold that the consequences of one's conduct are the true basis for any judgment about the morality of that conduct. Thus, from a consequentialist standpoint, a morally right act (or omission) is one that will produce a good outcome, or consequence. This view is often expressed as the aphorism The ends justify the means". *(Duty theories): which maintain that acts as inherently right or wrong, they also make ridged or straight low. *(Ethical issues of software professional): Whether to disclose a conflate of interest to a deant . *self-interest *(Computer Professional): ->particular kind of behavior of granted ->with dilemma people become 1. under stress. 2. May not have much time to consider arts. *(Professional Codes of Conduct): -> Obliges practitioners to maintain a high level of competence and to stay within area of expertise -> Set a common standard *(Issues Around Professional Codes of Conduct ): -> Professional Codes of Conduct are not without their critics. -> Ethical issues are complex but must be resolved by individuals making decisions. Micro-ethics: no justification for any code: dilemmas faced are no different from those encountered by people in general. Macro-ethics: specific codes of ethics serve little purpose. -> Only created to enhance the status of the profession. *(BSC Code of conduct): Public Interest 1. Regard for the public health, safety, and environment. 2. Regard legitimate rights of third parties. 3. Have knowledge of; comply with relevant legislation, regulations, standards

You might also like