I. Question: As A Student of Computer Science Course, How Would You Apply The Professional Ethics in Your Environment As Well As Being A Human/user

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

3– CC317-Information Assurance and Security

Instdructions: Kindly fill-up with necessary information in the space provided.

BS5AA
Section
Student’s Name UNDAP EPRIEL JEAN T.
(Last Name First Name Middle Initial) School Year 2020-2021
 1st Year
Degree Program Bachelor of Science in Computer Science Year Level  2nd Year
CC317  3rd Year
Course Code  4th Year
INFORMATION ASSURANCE AND SECURITY  1st Semester
Course Title Semester
 2nd Semester
Instructor/Professo Mr. Glenn Arwin Bristol
Week(s) Covered
r
DO NOT FORGET TO SAVE YOUR FILE AS :
<Lastname_CourseCode_Section_WeekNo_Semester_ACTIVITYNo.docx> Example: Delacruz_CC111_BS1MA_Week1_1stSem_ACT1.docx
* You may write below this line.

Instruction: You May Answer based on your understanding, do not copy paste on any browser

I. Question: As a Student of Computer Science Course, how would you apply the professional ethics in
your environment as well as being a human/user

Not just as a student but as human being as a whole I can apply my proffesional ethics or MY ETHICS as a
human by respecting someone’sr rights to keep their privacy specially in the online platform. With my ethics
I should be able to make judgements between right and wrong, and posting someone’s information without
their consent is wrong and it crosses the bounderies of someone’s lives. Good ethics can left up someone’s
confidence knowing no one is judging based only to their appearance and its promoting our integrity of
doing the right things even when were not on the social media.

RUBRICS FOR GRADING


PERCENTAGE
CRITERIA Excellent Good Average Poor
Development of Ideas 5 4 3 2
Evidence of Critical Thinking 5 4 3 2
Clarity 5 4 3 2

II.
Kindly Give an Example of the following Cybercrime in organization

1. Identity Theft

BSCS Department Page 1 of 6 /mlcds


3– CC317-Information Assurance and Security

Ans: Identity Theft is a form of fraud where in the cybercriminals steal someone personal data such as
Name, address passwords, bank accounts bank pin password,etc.

2. Phishing

Ans: it is an act of using legitimate looking email spoofing to get the users personal information.

3. Pharming

Ans: it is an act of directing to some legitimate looking websites on order to obtain some personal
informations such as passwords, bank accounts, name and address.

4. Skimming

Ans: is an act of reading personal information having used is a normal transaction like withdrawing
money at the ATM machine and somebody at your back already reading important informations such as
PIN and credit card numbers other example is when you are scratching the back of your prepaid load
card in order to get your load and someone is already typing it unto thier mobile pohone and claim it.

Ex. Aman Future

Reported as a pyramid scheme by the National Bureau of Investigation (NBI) in 2012, Aman
Futures reportedly duped about 15, 000 people in Visayas and Mindanao of about 12-billion
pesos of their hard-earned cash. It was centered around commodities-trading investments and
promised an 80-percent return to investors within 20 days. According to the NBI, it affected
more than 100, 000 Filipino families. And among the victims were twenty-one police officers
and two fire officers, who filed syndicated estafa charges against the company.

III. Word Puzzle

BSCS Department Page 2 of 6 /mlcds


3– CC317-Information Assurance and Security

BSCS Department Page 3 of 6 /mlcds


3– CC317-Information Assurance and Security

Page 4 of 6 /mlcds
3– CC317-Information Assurance and Security

IV. What is the Implication to you as a user of the ten commandments of Computer ethics?

1. Thou Shalt Not Use A Computer To Harm Other People.

We should not use our social media to discredit someone’s credibility to live their own lives.
We should not post someone’s secret online for the sake of fame or for you look like your
existence is much more valuable than theirs. Because someone’s failure will not be your
success.

2. Thou Shalt Not Interfere With Other People’s Computer Work.

Each and everyone of us has own way of doing our responsibilities but it is never okay to
interfere other people’s work may it bey on their computer or personal businesses

3. Thou Shalt Not Snoop Around In Other People’s Computer Files.

We should respect someone’s privacy even if it’s your boyfriend or girlfriend. They should
have their own personal space to do their own thing. To do wahtever they want.

4. Thou Shalt Not Use A Computer To Steal.

We should not use the technology to steal someone’s informations may it be pictures,
pictures and names and used it to use it for doing bad things like pretending to be that
person ang steal some money etc.

5. Thou Shalt Not Use A Computer To Bear False Witness.

We should not use the technology to spread unverified news or statements that can cause
the people’s panic.

6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.

We should not copy someones hardwork building that software because it’s not very easy.
Purchasing their work is a simple way of respecting and recognizing their work.

7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper
Compensation.

It’s just a basic thing to do, we should asl permission to the owner we it’s okay to use or
borrow their work or their things.

8. Thou Shalt Not Appropriate Other People’s Intellectual Output.

We should not claim someone’s work as ours becasue we didn’t experience the
hardships they have to go through just to finish their work.

9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The
System You Are Designing.

If we are building a program or writing the system you should only do what your
costumers demands and needs.

Page 5 of 6 /mlcds
3– CC317-Information Assurance and Security

10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For
Your Fellow Humans.

When we coomunicate in the real worl we use communication ettiquette as a sign


of respect to ther others but we can use it also when we’re communication over the
internet. We should respect others even if we have different nationality and speaks a
different language but with respect we can build friendship.

Page 6 of 6 /mlcds

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy