Skip to main content

What is Cyber Ethics ?


What is Cyber Ethics ?




Cyber ethics is the study of ethics related to computers, covering user's behavior and what computers are programmed to do, and how this affects individuals and society.
With the increase of young children using the internet, it is now very essential than ever to tell children about how to properly operate the internet and its dangers. It is especially hard to talk to teens because they do not want to be lectured about what is right and wrong. They seem to think they have it all sorts out. That is why is it is important to instill appropriate cyber etiquette at an early age but if you haven’t there is still time to tell to your child.


Issues in Cyber Ethics :-

  1. Copyrighting and downloading another's content:-  Downloading the copyright product from the internet is came into the cyber crime.We don't know that how much illegal is this product is that we only have to use it though it will present in any place .
  2. Hacking :- Stealing and harm someone's data is also came in Hacking.
  3. Trademarks :- Every company has his trademark or logo.This trademark or logo is only the product of this company or organization.If a unautorised person use this trademark for her profit then it will also comes in cyber crime.

Comments

Popular posts from this blog

what is a RSA encryption ??

what is a RSA encryption ?? RSA : - Rivest-Shamir-Adleman (these are the name of RSA inventors.) RSA is a encryption algorithm which is used to send message securely in the internet.RSA is a public key algorithm widely used for secure data transmission.In public key algorithm we used two keys for data transmission : one is public and another is private key.We use public key for data encryption and private key for data decryption .  RSA is based on the principle that it is easy to multiply large numbers, but factoring large numbers is very difficult. In RSA, the public key is generated by multiplying two large prime numbers and  together, and the private key is generated through a different process involving  and . A user can then distribute his public key , and anyone wishing to send the user a message would encrypt their message using the public key. Algorithm of RSA :- Choose two large prime numbers P and Q such that P is not equals of Q. Calculate ...