Violations of Professional Ethics in Cyberspace
Examples of breach of professional ethics in cyberspace as follows:
a. Amongst the IT Professional Ethics Violation University
b. Type - type of cyber crime offenses
Worms: programs that duplicate themselves repeatedly on the computer so that the resources spent
Trojan: a program / something that resembles a program that hide in our computer program.
Backdoor: a program that allows unauthorized users can go to a specific computer.
Spoofing: techniques to forge the IP address of the computer so trusted by the network.
c. Cyber Crime mode in Indonesia
a. Amongst the IT Professional Ethics Violation University
- Using information technology resources without permission.
- Someone about a personal password which is an account that can not be moved-handed.
- To access and / or attempt to access the electronic file, disk, or network device other than one's own without a valid license.
- Perform interference to systems or other uses of information technology and systems, including the resources consumed in very large amounts of data including storage space (disk storage), processing time, network capacity, etc., or intentionally caused the crash on the system computer through the mail bombs, spam, damaging the disk drive on a PC computer's University, and others).
- Using University resources as a means (land) to crack (hack, break into) to other systems illegally.
- Send message (message) containing threats or other materials which include insults category.
- Theft, including making unauthorized duplication (illegal) of materials that have the copyright, or duplication, use, or possession of a copy (copy) the software or data illegally.
- file, network, software or equipment.
- one's identity (forgery), plagiarism, and violation of copyrights, patents, or regulatory legislation on corporate secrets.
- Make deliberate, distribute, or use software designed for criminal intent to damage or destroy data and / or service computers (viruses, worms, mail bombs, etc.).
b. Type - type of cyber crime offenses
- Malware
Worms: programs that duplicate themselves repeatedly on the computer so that the resources spent
Trojan: a program / something that resembles a program that hide in our computer program.
- Denial Of Service Attack
Backdoor: a program that allows unauthorized users can go to a specific computer.
Spoofing: techniques to forge the IP address of the computer so trusted by the network.
- Use of unauthorized
- Phishing / Pharming
- Spam
- Spyware
c. Cyber Crime mode in Indonesia
- Theft of credit card numbers
- Piracy on the web site
- Crimes related to domain name
- Denial of Service (DoS) and Distributed DoS (DDos) attack
- Theft of Internet access that is often experienced by ISPs
Jadilah yang pertama mengomentari
Post a Comment