I. Question: As A Student of Computer Science Course, How Would You Apply The Professional Ethics in Your Environment As Well As Being A Human/user
I. Question: As A Student of Computer Science Course, How Would You Apply The Professional Ethics in Your Environment As Well As Being A Human/user
I. Question: As A Student of Computer Science Course, How Would You Apply The Professional Ethics in Your Environment As Well As Being A Human/user
BS5AA
Section
Student’s Name UNDAP EPRIEL JEAN T.
(Last Name First Name Middle Initial) School Year 2020-2021
1st Year
Degree Program Bachelor of Science in Computer Science Year Level 2nd Year
CC317 3rd Year
Course Code 4th Year
INFORMATION ASSURANCE AND SECURITY 1st Semester
Course Title Semester
2nd Semester
Instructor/Professo Mr. Glenn Arwin Bristol
Week(s) Covered
r
DO NOT FORGET TO SAVE YOUR FILE AS :
<Lastname_CourseCode_Section_WeekNo_Semester_ACTIVITYNo.docx> Example: Delacruz_CC111_BS1MA_Week1_1stSem_ACT1.docx
* You may write below this line.
Instruction: You May Answer based on your understanding, do not copy paste on any browser
I. Question: As a Student of Computer Science Course, how would you apply the professional ethics in
your environment as well as being a human/user
Not just as a student but as human being as a whole I can apply my proffesional ethics or MY ETHICS as a
human by respecting someone’sr rights to keep their privacy specially in the online platform. With my ethics
I should be able to make judgements between right and wrong, and posting someone’s information without
their consent is wrong and it crosses the bounderies of someone’s lives. Good ethics can left up someone’s
confidence knowing no one is judging based only to their appearance and its promoting our integrity of
doing the right things even when were not on the social media.
II.
Kindly Give an Example of the following Cybercrime in organization
1. Identity Theft
Ans: Identity Theft is a form of fraud where in the cybercriminals steal someone personal data such as
Name, address passwords, bank accounts bank pin password,etc.
2. Phishing
Ans: it is an act of using legitimate looking email spoofing to get the users personal information.
3. Pharming
Ans: it is an act of directing to some legitimate looking websites on order to obtain some personal
informations such as passwords, bank accounts, name and address.
4. Skimming
Ans: is an act of reading personal information having used is a normal transaction like withdrawing
money at the ATM machine and somebody at your back already reading important informations such as
PIN and credit card numbers other example is when you are scratching the back of your prepaid load
card in order to get your load and someone is already typing it unto thier mobile pohone and claim it.
Reported as a pyramid scheme by the National Bureau of Investigation (NBI) in 2012, Aman
Futures reportedly duped about 15, 000 people in Visayas and Mindanao of about 12-billion
pesos of their hard-earned cash. It was centered around commodities-trading investments and
promised an 80-percent return to investors within 20 days. According to the NBI, it affected
more than 100, 000 Filipino families. And among the victims were twenty-one police officers
and two fire officers, who filed syndicated estafa charges against the company.
Page 4 of 6 /mlcds
3– CC317-Information Assurance and Security
IV. What is the Implication to you as a user of the ten commandments of Computer ethics?
We should not use our social media to discredit someone’s credibility to live their own lives.
We should not post someone’s secret online for the sake of fame or for you look like your
existence is much more valuable than theirs. Because someone’s failure will not be your
success.
Each and everyone of us has own way of doing our responsibilities but it is never okay to
interfere other people’s work may it bey on their computer or personal businesses
We should respect someone’s privacy even if it’s your boyfriend or girlfriend. They should
have their own personal space to do their own thing. To do wahtever they want.
We should not use the technology to steal someone’s informations may it be pictures,
pictures and names and used it to use it for doing bad things like pretending to be that
person ang steal some money etc.
We should not use the technology to spread unverified news or statements that can cause
the people’s panic.
6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.
We should not copy someones hardwork building that software because it’s not very easy.
Purchasing their work is a simple way of respecting and recognizing their work.
7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper
Compensation.
It’s just a basic thing to do, we should asl permission to the owner we it’s okay to use or
borrow their work or their things.
We should not claim someone’s work as ours becasue we didn’t experience the
hardships they have to go through just to finish their work.
9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The
System You Are Designing.
If we are building a program or writing the system you should only do what your
costumers demands and needs.
Page 5 of 6 /mlcds
3– CC317-Information Assurance and Security
10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For
Your Fellow Humans.
Page 6 of 6 /mlcds