CYBER ETHICS
1-Cyber ethics is the study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society.
2-In other words Cyber ethics refers to the code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life, with lessons such as “Don’t take what doesn’t belong to you,” and “Do not harm others,” -- we must act responsibly in the cyber world as well.
3-Cyberethics is distinct from cyber law. Laws are formal written directives that apply to everyone, interpreted by the judicial system, and enforced by the police. Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life.
4-Cyber ethics teaches you how to behave on internet. Responsible behavior on the Internet in many ways aligns with acceptable behavior in everyday life, but the consequences can be significantly different.
5-Some people try to hide behind a false sense of anonymity on the Internet, believing that it does not matter if they behave badly online because no one knows who they are or how to identify them. That is not always true. Computers, browsers, and Internet service providers may keep logs of their activities which can be used to identify illegal or inappropriate behavior.
6-When determining responsible behaviors, consider the following:
a-Do not use rude or offensive language.
b-Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.
c-Do not copy information from the Internet and claim it as yours. That is called plagiarism.
d-Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet.
e-Do not break into someone else’s computer.
f-Do not use someone else’s password.
g-Do not attempt to infect or in any way try to make someone else’s computer unusable.
a-Do not use rude or offensive language.
b-Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.
c-Do not copy information from the Internet and claim it as yours. That is called plagiarism.
d-Adhere to copyright restrictions when downloading material including software, games, movies, or music from the Internet.
e-Do not break into someone else’s computer.
f-Do not use someone else’s password.
g-Do not attempt to infect or in any way try to make someone else’s computer unusable.
7-Information Technology managers are required to establish a set of ethical standards common to their organization. There are many examples of ethical code currently published that can be tailored to fit any organization. Code of ethics is an instrument that establishes a common ethical framework for a large group of people.
In January 1989, the Internet Architecture Board (IAB) in RFC 1087 defines an activity as unethical and unacceptable if it:
1.Seeks to gain unauthorized access to the resources of the Internet.
2.Disrupts the intended use of the Internet.
3.Wastes resources (people, capacity, computer) through such actions.
4.Destroys the integrity of computer-based information, or
5.Compromises the privacy of users.
1.Seeks to gain unauthorized access to the resources of the Internet.
2.Disrupts the intended use of the Internet.
3.Wastes resources (people, capacity, computer) through such actions.
4.Destroys the integrity of computer-based information, or
5.Compromises the privacy of users.
8-The ethical values as defined in 1992 by the Computer Ethics Institute; a nonprofit organization whose mission is to advance technology by ethical means, lists these rules as a guide to computer ethics:
1.Do not use a computer to harm other people.
2.Do not interfere with other people's computer work.
3.Do not snoop around in other people's computer files.
4.Do not use a computer to steal.
5.Do not use a computer to bear false witness.
6.Do not copy or use proprietary software for which you have not paid.
7.Do not use other people's computer resources without authorization or proper compensation.
8.Do not appropriate other people's intellectual output.
9.Do think about the social consequences of the program you are writing or the system you are designing.
10.Always use a computer in ways that ensure consideration and respect for your fellow humans.
1.Do not use a computer to harm other people.
2.Do not interfere with other people's computer work.
3.Do not snoop around in other people's computer files.
4.Do not use a computer to steal.
5.Do not use a computer to bear false witness.
6.Do not copy or use proprietary software for which you have not paid.
7.Do not use other people's computer resources without authorization or proper compensation.
8.Do not appropriate other people's intellectual output.
9.Do think about the social consequences of the program you are writing or the system you are designing.
10.Always use a computer in ways that ensure consideration and respect for your fellow humans.
9-(ISC)2,an organization committed to certification of computer security professional has further defined its own Code of Ethics generally as:
1.Act honestly, justly, responsibly, and legally, and protecting the commonwealth.
2.Work diligently and provide competent services and advance the security profession.
3.Encourage the growth of research – teach, mentor, and value the certification.
4.Discourage unsafe practices, and preserve and strengthen the integrity of public infrastructures.
5.Observe and abide by all contracts, expressed or implied, and give prudent advice.
6.Avoid any conflict of interest, respect the trust that others put in you, and take on only those jobs you are qualified to perform.
7.Stay current on skills, and do not become involved with activities that could injure the reputation of other security professionals.
0 comments:
Post a Comment