Preview

Ethics

Good Essays
Open Document
Open Document
1351 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics
Ethics in Information Technology

Computer and Internet Crime

Types of Attacks * Most frequent attack is on a networked computer from an outside source

Types of attacks * Virus * Worm * Trojan horse * Denial of service

Viruses * Pieces of programming code * Usually disguised as something else * Cause unexpected and usually undesirable events * Often attached to files * Deliver a “payload” * Does not spread itself from computer to computer * Must be passed on to other users through * Infected e-mail document attachments * Programs on diskettes * Shared files * Macro viruses * Most common and easily created viruses * Created in an application macro language * Infect documents and templates

Worms * Harmful programs * Reside in active memory of a computer * Duplicate themselves * Can propagate without human intervention * Negative impact of virus or worm attack * Lost data and programs * Lost productivity * Effort for IT workers

Trojan Horses * Program that a hacker secretly installs * Users are tricked into installing it * Logic bomb * Executes under specific conditions

Denial-of-Service (DoS) Attacks * Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks * The computers that are taken over are called zombies * Does not involve a break-in at the target computer * Target machine is busy responding to a stream of automated requests * Legitimate users cannot get in * Spoofing generates a false return address on packets * Ingress filtering - When Internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on * Egress filtering - Ensuring spoofed packets don’t leave a network

Perpetrators *

You May Also Find These Documents Helpful

  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    Take Assessment: Midterm Exam Page 1 of 9 MGT220. INFORMATION TECHNOLOGY (MGT220) > TAKE ASSESSMENT: MIDTERM EXAM Take Assessment: Midterm Exam Name Midterm Exam Instructions Always pick the single best answer. Blank answers will be scored as incorrect.…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Ethics

    • 498 Words
    • 2 Pages

    The first skill set is learning how to use the four primary ethical perspectives that are used in decision making. These perspectives are called the Four Ethical Lenses. The second skill is learning to use a practical and repeatable decision-making method called the Baird Decision Model. As we become adults, one of our primary responsibilities is to decide what values and ethical priorities are the most important to us. The ethical game simulation assist with that.…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ethics

    • 1354 Words
    • 4 Pages

    How wrong is it to lie? Take the hypothetical situation where you are in charge of the software for the launch of a rocket that will put a satellite into space. The launch director requires that various people, including you and a meteorologist "sign off" on launching the rocket. The weather is very overcast, and lightning has been detected in the distance. The meteorologist gives the "OK" to launch the rocket. You, however, have serious doubts that the weather is suitable for a launch, but you are not a meteorologist. The software checks all complete successfully, and the software is in perfect working condition for launch. Do you make something up that says the software is not ready to delay for another day with better weather? Do you say yes the software is "OK" and go for launch? [Ward90]…

    • 1354 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ethics

    • 273 Words
    • 2 Pages

    This company strives to be the best at what they do focusing on business, product, customers, suppliers, profit for shareholders, and a assurance of a better future for their employees. Their mission is to provide a healthier living for people around the world through their product.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethics

    • 383 Words
    • 2 Pages

    1. Should the SEC mandate disclosure of pay ratios? Why or why not? And if so, how should the ratios be determined?…

    • 383 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ethics

    • 562 Words
    • 3 Pages

    1. The first one is the most powerful lesson learned from practicing ethical conduct during Boisjoly’s 27-year engineering career in the aerospace industry, is that them, as individuals, become the result-ant sum of each ethical confrontational event as experienced from the beginning of their careers.…

    • 562 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ethics

    • 1074 Words
    • 5 Pages

    The focus of this course is the reasoning process used when we are making decisions. Some reasoning processes are for individual decisions, while others are for social decisions. It is important to remember that the course (and these assignments) are NOT about opinions (your own or the expert’s), but rather about the reasoning process used in arriving at these opinions and decisions.…

    • 1074 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Ethics

    • 2384 Words
    • 10 Pages

    A recession is caused by many different factors, not just one. It is the coming together of many different problems, all at one time. Some factors that contributed to this last Great Recession include consumer indebtedness, income inequality, lax regulations and the housing bubble. In this paper we will discuss how the Housing Bubble exacerbated and what is its link to the Great Recession. It is necessary to note that because the bursting continues and because lessons have not been learned from previous recessions, nor this one, the problem may remain for a while, fueling this recession further.…

    • 2384 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Ethics

    • 1110 Words
    • 5 Pages

    There were many ethical violations that occurred in the Zimbardo Prison Study. The first violation was deception. Although Zimbardo got consent from the participant, he did not fully explain what the participant would be going through. They were told that they would be participating in a mock prison study. However, they were not told that they would be arrested at their homes and striped searched upon arrival at the prison site. It is very important that you inform participants with sufficient information about the study and get there agreement to participant. Also the prisoners were put in physical and psychological harm. For example, one of the prisoners had to be release after three days because he could no longer handle the conditions. After a couple of days of the study, the guards begin to be violent to the prisoners. It seems that the more the prisoner gave in, the more aggressive the guard became. They seem to feel that the guards had the mentality to do whatever they needed to do to keep the prisoners under control. The prisoners started to rebel and show a great deal of psychological stress. The guards were allowed to the leave the prison site, while the prisoners were required to stay 24/7. Even after the prisoners were harmed physically and psychological the study continued. It was not until Zimbardo’s graduate assistant and current wife, Christine Maslach, mentioned her worries about the events that were happening was the experiment terminated. I also felt that by Zimbardo because apart of the study was not a good idea. Zimbardo had a dual relationship with in the study, as the researcher and the prison warden. By becoming the prison warden, one can say that the guards felt that they needed the do whatever it took because there was a higher authority figure over them. This would cause the guards to do things that would humiliate the prisoners more.…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Antivirus 1

    • 353 Words
    • 2 Pages

    Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in user’s home or company premises. Thus, it is crucial that they take measures to protect their computer and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.…

    • 353 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ethics

    • 898 Words
    • 4 Pages

    problem today is that kids are unaware of their moral values and are unable to define what is…

    • 898 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files. The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails.…

    • 4910 Words
    • 20 Pages
    Better Essays
  • Satisfactory Essays

    Ethics

    • 526 Words
    • 3 Pages

    •The role of the historian and the problems of bias (are they influenced by upbringing (experiences) and backgrounds (culture/nationality etc).…

    • 526 Words
    • 3 Pages
    Satisfactory Essays