• Actually, your parents are not entirely true, it is not entirely wrong. In conjunction with the cleanliness of the hair...
  • Wi-fi devices are spread in various kinds of gadgets. From small to large such as mobile phones such as laptops...
  • Tahukah kamu para wanita pengorbanan seorang pria yang kadang tidak anda ketahui? Ini adalah beberapa pengorbanan seorang pria untuk kalian para wanita...
  • Finally, Indonesia can boast one of its culture. That letter Java or Java script. This is because the Java script will soon...
  • Not long ago I found the software a unique, funny, but very useful, namely Ninja Pendisk. Pendisk Ninja is a...

Wednesday, October 5, 2011

Violations of Professional Ethics in Cyberspace

Examples of breach of professional ethics in cyberspace as follows:

a. Amongst the IT Professional Ethics Violation University
  • Using information technology resources without permission.
  • Someone about a personal password which is an account that can not be moved-handed.
  • To access and / or attempt to access the electronic file, disk, or network device other than one's own without a valid license.
  • Perform interference to systems or other uses of information technology and systems, including the resources consumed in very large amounts of data including storage space (disk storage), processing time, network capacity, etc., or intentionally caused the crash on the system computer through the mail bombs, spam, damaging the disk drive on a PC computer's University, and others).
  • Using University resources as a means (land) to crack (hack, break into) to other systems illegally.
  • Send message (message) containing threats or other materials which include insults category.
  • Theft, including making unauthorized duplication (illegal) of materials that have the copyright, or duplication, use, or possession of a copy (copy) the software or data illegally.
  • file, network, software or equipment.
  • one's identity (forgery), plagiarism, and violation of copyrights, patents, or regulatory legislation on corporate secrets.
  • Make deliberate, distribute, or use software designed for criminal intent to damage or destroy data and / or service computers (viruses, worms, mail bombs, etc.).

b. Type - type of cyber crime offenses
  • Malware
Virus: a program that aims to change the way computers work without the consent of the user
Worms: programs that duplicate themselves repeatedly on the computer so that the resources spent
Trojan: a program / something that resembles a program that hide in our computer program.
  • Denial Of Service Attack
An attack that aims to access a computer on the web or email services. Perpetrators will transmit useful data that can not be repeated so that the network will block the other visitors.
Backdoor: a program that allows unauthorized users can go to a specific computer.
Spoofing: techniques to forge the IP address of the computer so trusted by the network.
  • Use of unauthorized
Is the use of computers or data in it for illegal activity, or without consent
  • Phishing / Pharming
Is a trick that made criminals to obtain confidential information. If using e-mail phishing, pharming then go directly to a particular web.
  • Spam
Unsolicited emails sent to multiple recipients at once.
  • Spyware
Programs that are installed to transmit user information to other parties.

c. Cyber ​​Crime mode in Indonesia
  • Theft of credit card numbers
  • Piracy on the web site
  • Crimes related to domain name
  • Denial of Service (DoS) and Distributed DoS (DDos) attack
  • Theft of Internet access that is often experienced by ISPs

Jadilah yang pertama mengomentari

Post a Comment

Hottest News and Gossip ©Template Blogger Green by Dicas Blogger.

To Up