Professional Documents
Culture Documents
ETHICS
Definitions
Ethics:
The science of morals; the department of study concerned
with the principles of human duty. The moral principles by
which a person is guided. Oxford English Dictionary
Moral:
Of or pertaining to character or disposition, considered as
good or bad, virtuous or vicious; of or pertaining to the
distinction between right and wrong, or good and evil, in
relation to the actions, volitions, or character of responsible
beings; ethical. Oxford English Dictionary
What is a hacker?
Hacker:
A person who uses his skill with computers to try to gain
unauthorized access to computer files or networks. Oxford
English Dictionary
The term is misleading and has been used to mean many
different things by computer professionals, cyber criminals and
the media.
Self-described hackers enjoy experimenting with technology
and writing code.
Media-labeled hackers (crackers) break into systems, cause
damage, and write malware.
Ethical hackers former hackers or crackers who have joined
the security industry to test network security and create
security products and services.
Goodies or Baddies?
Black Hats break into systems, develop
and share vulnerabilities, exploits,
malicious code, and attack tools.
Grey Hats are in hacker no-mans
land, may work as security
professionals by day and hack by night.
White Hats are part of the security
community, help find security flaws, but
share them with vendors so that
products can be made safer.
There is a fine line between the hats
and the distinction often becomes
blurred. Often a matter of perspective.
Hacker Ethics
Early hackers developed a
code of ethics, which has
been adopted in large part by
computer professionals today.
Code of ethics has evolved
based on technological and
societal changes.
Some hackers reject this code
for a variety of reasons.
Information Systems
Ethics
Computer Ethics
Privacy
Identity Theft
Information Systems
Ethics
Information Property
Deals with who owns information about
individuals and how information can be sold
and exchanged
Information Accessibility
Deals with what information a person has
the right to obtain about others and how the
information can be used
Information Systems
Ethics
The Need for a Code of Ethical Conduct
Business ethics
Plagiarism
HMR: Outsourcing HR
Cyber Law
INTRODUCTION
Growth of
cyber space
Onset of
internet
Cyber law or
law of internet
IT ACT PROVISIONS
Email would now be a valid and legal
form of communication in our country
that can be duly produced and approved
in a court of law.
Companies shall now be able to carry
out electronic commerce using the legal
infrastructure provided by the Act.
Digital signatures have been given legal
validity and sanction in the Act.
IT ACT PROVISIONS
The Act now allows Government to
issue notification on the web thus
heralding e-governance
Statutory remedy in case if
anyone breaks into companies
computer systems or network and
causes damages or copies data
CYBER CRIMES
CYBER CRIMES AGAINST
PERSONS
eg melissaand lovebug
virus
CYBER CRIMES AGAINST
PROPERTY
eg computer vandalism
CYBER CRIMES AGAINST
GOVERNMENT
eg Al-Qaeda
CYBER CRIMES
CRIME THROUGH
ORKUT
Specific marketing
strategies are being used to
attract children to Adult
sites.
CYBER LAWS
AMENDMENTS
CONCLUSION
CYBER LAWS_ ESSENTIAL
FEATURE IN TODAYS WORLD OF
INTERNET