SlideShare una empresa de Scribd logo
1 de 37
CYBER AND ETHICS
WHAT IS CYBER
• Cyber- is a prefix derived from "cybernetic,"
• Which comes from the greek adjective
κυβερνητικός meaning skilled in steering or
governing.
WORDS THAT USE THE CYBER PREFIX
•Cybercrime
•Cyberforensics
•Cybermonday
•Cyberbullying
•Cyberspace
•Cybersuicide
•Cybersecurity
•Cyberpunk
CYBERSPACE
• Cyberspace is a domain characterized by the
use of electronics and the electromagnetic
spectrum
• Used To
– Store data
– Modify data
– exchange data via networked systems
CYBERSUICIDE
• Also called social suicide
• cybersuicide is a slang term
used to describe a suicide or
suicide attempt that has been
influenced by Web sites on
the Internet
CYBERSECURITY
• Cybersecurity is the body of technologies,
processes and practices
• Designed to protect networks, computers,
programs and data from attack, damage or
unauthorized access
CYBERCRIME
• Cybercrime is criminal activity done using
computers and the Internet.
• This includes anything from downloading
illegal music files to stealing millions of dollars
from online bank accounts.
• According to a report 4,191 Indian websites
were defaced or hacked into in August alone,
much higher than the 2,380 in July, 2,858 in
June and 1,808 in May
DANGERS AHEAD
websense 2014 predictions
• Advanced malware volume will
increase
• Attackers will be more interested I
your cloud data then your network
• A major data destruction attack will
occur
CYBERBULLYING
• The use of information
technology to harm or harass
other people in a deliberate,
repeated, and hostile manner.
CYBERMONDAY
• A marketing term for the Monday after
Thanksgiving in the United States.
• The term "Cyber Monday" was created by marketing
companies to persuade people to shop online.
• The term made its debut on November 28, 2005,
in a Shop.org press release entitled "'Cyber
Monday Quickly Becoming One of the Biggest
Online Shopping Days of the Year".
CYBERPUNK
• Hacker, who represent the best kind of
cyberpunk
• Cracker, who attempt to break into computer
systems
• Phreak, who attempt to break into telephone
systems
• Cyber-punks, who attempt to break codes and
foil security systems
CYBERFORENSICS
• A branch of digital forensic science
pertaining to legal evidence found in
computers and digital storage media.
• The goal of computer forensics is to examine
digital media in a forensically sound manner
with the aim of identifying, preserving,
recovering, analysing and presenting facts
and opinions about the information.
ETHICS
• It means moral principles that govern a
person's behaviour or the conducting of an
activity.
CLASSIFICATION OF ETHICS
Meta-ethics, about the theoretical meaning and reference of
moral propositions and how their truth values (if any) may be
determined
Normative ethics, about the practical means of determining a
moral course of action
Applied ethics draws upon ethical theory in order to ask what a
person is obligated to do in some very specific situation, or
within some particular domain of action (such as business)
Descriptive ethics, also known as comparative ethics, is the
study of people's beliefs about morality
META-ETHICS
• The term “meta” means after or beyond
• The notion of meta-ethics involves a bird’s eye
view of the entire project of ethics
• May be defined as the study of the origin and
meaning of ethical concepts
• It involves arriving at moral standards that
regulate right and wrong conduct
• We should do to others what we would want
others to do to us. Since I do not want my
neighbour to steal my car, then it is wrong for me
to steal her car. Since I would want people to feed
me if I was starving, then I should help feed
starving people
Applied Ethics
• the branch of ethics which
consists of the analysis of
specific, controversial moral
issues
• Such as
– Abortion
– Animal Rights
– Euthanasia
Descriptive ethics
• also known as comparative ethics
• It is the study of people's beliefs about
morality
• Analysis of the nature and social impact of
computer technology
• Corresponding formulation and justification of
policies for the ethical use of such technology.
Did
you
know
Kids have been bullied online
have been bullied more than once
Have hurt their feelings online
kids have had their password stolen
received an threatening email
Sometimes
The
Consequences
TRAGIC
DPS MMS Scandal
MMS Scandal Rocks Jamshedpur Schools
NOIDA Girl Refuses to Marry, Boy Uploads Nude Pics
MMS Scandal Rocks Delhi Business School
MMS scandal involving Namitha, Malavika, South Indian
Actresses
Boyfriend posts Nude Pics on Social Networking Site
Mumbai teen arrested for sending threat mail
It’s a full blown
Epidemic
Do
you
know
What sites your child
frequents?
Who are his online friends?
What do they discuss?
What do they do online?
Ifanyansweris
You
Need
help
Learn to use the Internet
RESPONSIBILY

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Spamming
SpammingSpamming
Spamming
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 

Destacado

Destacado (6)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Blog
BlogBlog
Blog
 
Thesis writing using apa format
Thesis writing using apa formatThesis writing using apa format
Thesis writing using apa format
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 

Similar a Cyber and ethics(cyber crime and many more topics)

Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theoriesTobore Oshobe
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Othersnealbd
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxprincesskatemannag14
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsFaraz Ahmed
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to courseGC University Fsd
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsMEDEA Awards
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowermentnellykelly1663
 

Similar a Cyber and ethics(cyber crime and many more topics) (20)

Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Hacking
HackingHacking
Hacking
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital EthicsNatasha Whiteman - MEDEAnet webinar: Digital Ethics
Natasha Whiteman - MEDEAnet webinar: Digital Ethics
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
 
hacking
hackinghacking
hacking
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 

Último

哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 

Último (20)

哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

Cyber and ethics(cyber crime and many more topics)

  • 2. WHAT IS CYBER • Cyber- is a prefix derived from "cybernetic," • Which comes from the greek adjective κυβερνητικός meaning skilled in steering or governing.
  • 3. WORDS THAT USE THE CYBER PREFIX •Cybercrime •Cyberforensics •Cybermonday •Cyberbullying •Cyberspace •Cybersuicide •Cybersecurity •Cyberpunk
  • 4. CYBERSPACE • Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum • Used To – Store data – Modify data – exchange data via networked systems
  • 5. CYBERSUICIDE • Also called social suicide • cybersuicide is a slang term used to describe a suicide or suicide attempt that has been influenced by Web sites on the Internet
  • 6. CYBERSECURITY • Cybersecurity is the body of technologies, processes and practices • Designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  • 7. CYBERCRIME • Cybercrime is criminal activity done using computers and the Internet. • This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. • According to a report 4,191 Indian websites were defaced or hacked into in August alone, much higher than the 2,380 in July, 2,858 in June and 1,808 in May
  • 8.
  • 9. DANGERS AHEAD websense 2014 predictions • Advanced malware volume will increase • Attackers will be more interested I your cloud data then your network • A major data destruction attack will occur
  • 10. CYBERBULLYING • The use of information technology to harm or harass other people in a deliberate, repeated, and hostile manner.
  • 11. CYBERMONDAY • A marketing term for the Monday after Thanksgiving in the United States. • The term "Cyber Monday" was created by marketing companies to persuade people to shop online. • The term made its debut on November 28, 2005, in a Shop.org press release entitled "'Cyber Monday Quickly Becoming One of the Biggest Online Shopping Days of the Year".
  • 12. CYBERPUNK • Hacker, who represent the best kind of cyberpunk • Cracker, who attempt to break into computer systems • Phreak, who attempt to break into telephone systems • Cyber-punks, who attempt to break codes and foil security systems
  • 13. CYBERFORENSICS • A branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. • The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analysing and presenting facts and opinions about the information.
  • 14. ETHICS • It means moral principles that govern a person's behaviour or the conducting of an activity.
  • 15. CLASSIFICATION OF ETHICS Meta-ethics, about the theoretical meaning and reference of moral propositions and how their truth values (if any) may be determined Normative ethics, about the practical means of determining a moral course of action Applied ethics draws upon ethical theory in order to ask what a person is obligated to do in some very specific situation, or within some particular domain of action (such as business) Descriptive ethics, also known as comparative ethics, is the study of people's beliefs about morality
  • 16. META-ETHICS • The term “meta” means after or beyond • The notion of meta-ethics involves a bird’s eye view of the entire project of ethics • May be defined as the study of the origin and meaning of ethical concepts
  • 17. • It involves arriving at moral standards that regulate right and wrong conduct • We should do to others what we would want others to do to us. Since I do not want my neighbour to steal my car, then it is wrong for me to steal her car. Since I would want people to feed me if I was starving, then I should help feed starving people
  • 18. Applied Ethics • the branch of ethics which consists of the analysis of specific, controversial moral issues • Such as – Abortion – Animal Rights – Euthanasia
  • 19. Descriptive ethics • also known as comparative ethics • It is the study of people's beliefs about morality
  • 20. • Analysis of the nature and social impact of computer technology • Corresponding formulation and justification of policies for the ethical use of such technology.
  • 22. Kids have been bullied online
  • 23. have been bullied more than once
  • 24. Have hurt their feelings online
  • 25. kids have had their password stolen
  • 27.
  • 30.
  • 31. DPS MMS Scandal MMS Scandal Rocks Jamshedpur Schools NOIDA Girl Refuses to Marry, Boy Uploads Nude Pics MMS Scandal Rocks Delhi Business School MMS scandal involving Namitha, Malavika, South Indian Actresses Boyfriend posts Nude Pics on Social Networking Site Mumbai teen arrested for sending threat mail
  • 32. It’s a full blown Epidemic
  • 34. What sites your child frequents? Who are his online friends? What do they discuss? What do they do online?
  • 37. Learn to use the Internet RESPONSIBILY