Preview

Ethics

Good Essays
Open Document
Open Document
1351 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics
Ethics in Information Technology

Computer and Internet Crime

Types of Attacks * Most frequent attack is on a networked computer from an outside source

Types of attacks * Virus * Worm * Trojan horse * Denial of service

Viruses * Pieces of programming code * Usually disguised as something else * Cause unexpected and usually undesirable events * Often attached to files * Deliver a “payload” * Does not spread itself from computer to computer * Must be passed on to other users through * Infected e-mail document attachments * Programs on diskettes * Shared files * Macro viruses * Most common and easily created viruses * Created in an application macro language * Infect documents and templates

Worms * Harmful programs * Reside in active memory of a computer * Duplicate themselves * Can propagate without human intervention * Negative impact of virus or worm attack * Lost data and programs * Lost productivity * Effort for IT workers

Trojan Horses * Program that a hacker secretly installs * Users are tricked into installing it * Logic bomb * Executes under specific conditions

Denial-of-Service (DoS) Attacks * Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks * The computers that are taken over are called zombies * Does not involve a break-in at the target computer * Target machine is busy responding to a stream of automated requests * Legitimate users cannot get in * Spoofing generates a false return address on packets * Ingress filtering - When Internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on * Egress filtering - Ensuring spoofed packets don’t leave a network

Perpetrators *

You May Also Find These Documents Helpful

  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    Take Assessment: Midterm Exam Page 1 of 9 MGT220. INFORMATION TECHNOLOGY (MGT220) > TAKE ASSESSMENT: MIDTERM EXAM Take Assessment: Midterm Exam Name Midterm Exam Instructions Always pick the single best answer. Blank answers will be scored as incorrect.…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Ethics

    • 498 Words
    • 2 Pages

    The first skill set is learning how to use the four primary ethical perspectives that are used in decision making. These perspectives are called the Four Ethical Lenses. The second skill is learning to use a practical and repeatable decision-making method called the Baird Decision Model. As we become adults, one of our primary responsibilities is to decide what values and ethical priorities are the most important to us. The ethical game simulation assist with that.…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    ethics

    • 1354 Words
    • 4 Pages

    How wrong is it to lie? Take the hypothetical situation where you are in charge of the software for the launch of a rocket that will put a satellite into space. The launch director requires that various people, including you and a meteorologist "sign off" on launching the rocket. The weather is very overcast, and lightning has been detected in the distance. The meteorologist gives the "OK" to launch the rocket. You, however, have serious doubts that the weather is suitable for a launch, but you are not a meteorologist. The software checks all complete successfully, and the software is in perfect working condition for launch. Do you make something up that says the software is not ready to delay for another day with better weather? Do you say yes the software is "OK" and go for launch? [Ward90]…

    • 1354 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ethics

    • 611 Words
    • 3 Pages

    Before any major changes are made in my company they are tested and theories are made. They are tried several different ways until they are made perfect or at least thought to be made perfect. They however take different staff members and make these changes and see how they effect various areas of our company. Some things that they try work better and others do not work. By giving the staff a say and a part in these changes they have an opportunity to have better quality workers who feel a sense of loyalty that they may not have had elsewhere.…

    • 611 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ethics

    • 562 Words
    • 3 Pages

    1. The first one is the most powerful lesson learned from practicing ethical conduct during Boisjoly’s 27-year engineering career in the aerospace industry, is that them, as individuals, become the result-ant sum of each ethical confrontational event as experienced from the beginning of their careers.…

    • 562 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Ethics

    • 1287 Words
    • 6 Pages

    The issue here is weather the conversation Stewart had with Mr. James Careful violated his rights. Also will filing a petition for a writ of habeas corpus be appropriate in this case?…

    • 1287 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    ethics

    • 1074 Words
    • 5 Pages

    The focus of this course is the reasoning process used when we are making decisions. Some reasoning processes are for individual decisions, while others are for social decisions. It is important to remember that the course (and these assignments) are NOT about opinions (your own or the expert’s), but rather about the reasoning process used in arriving at these opinions and decisions.…

    • 1074 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Ethics

    • 1383 Words
    • 6 Pages

    An ethical dilemma exists when the right thing to do is not clear or when members of the health care team cannot agree on the right thing to do (Potter, Perry, Stockert, & Hall, 2011). S.Z. is a 65-year-old Hispanic man who was admitted to the hospital for the third time in 6 months, for hyperglycemia. He is now scheduled to be discharged but his daughter pleads with the nurse that she does not want her father discharged because he is non-complaint with his medications and diet at home. She says she has small children at home and can’t be responsible for him, too. She is worried sick that he is doing this on purpose because he has been so depressed since her mother, who did everything for him, passed away. She says that her father has been seeing a curanderos, who treats him with traditional methods and that he refuses to take his medicine and only follows what the curanderos tells him to do. She does not agree with this and confides that she hopes to find a way to prevent her father from seeing this person and wants to know if the nurse can have her father’s discharge canceled and to ask the doctor to admit him to a nursing home where they can ensure he eats right and takes his medicine and not the herbs he has been using. Then she pleads, “Please just tell the doctor he won’t take his medicine.” Many years ago he was diagnosed with Diabetes Mellitus Type II and has been on insulin for two years. His blood sugar on admission was 589. He is retired and was widowed one year ago. He’s active in his church, gardens, and likes to work on small projects around the house. His medical history includes Diabetes Mellitus Type II, insulin dependent, Hyperlipidemia, and Osteoarthritis.…

    • 1383 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Ethics

    • 898 Words
    • 4 Pages

    problem today is that kids are unaware of their moral values and are unable to define what is…

    • 898 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Ethics

    • 2384 Words
    • 10 Pages

    A recession is caused by many different factors, not just one. It is the coming together of many different problems, all at one time. Some factors that contributed to this last Great Recession include consumer indebtedness, income inequality, lax regulations and the housing bubble. In this paper we will discuss how the Housing Bubble exacerbated and what is its link to the Great Recession. It is necessary to note that because the bursting continues and because lessons have not been learned from previous recessions, nor this one, the problem may remain for a while, fueling this recession further.…

    • 2384 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Antivirus 1

    • 353 Words
    • 2 Pages

    Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in user’s home or company premises. Thus, it is crucial that they take measures to protect their computer and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses.…

    • 353 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files. The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails.…

    • 4910 Words
    • 20 Pages
    Better Essays
  • Satisfactory Essays

    Ethics

    • 526 Words
    • 3 Pages

    •The role of the historian and the problems of bias (are they influenced by upbringing (experiences) and backgrounds (culture/nationality etc).…

    • 526 Words
    • 3 Pages
    Satisfactory Essays