Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Attribution (by)
All CC licenses require that others who use your work in any way must give you credit
the way you request, but not in a way that suggests you endorse them or their use. If they
want to use your work without giving you credit or for endorsement purposes, they must
get your permission first.
ShareAlike (sa)
You let others copy, distribute, display, perform, and modify your work, as long as they
distribute any modified work on the same terms. If they want to distribute modified
works under other terms, they must get your permission first.
NonCommercial (nc)
You let others copy, distribute, display, perform, and (unless you have chosen
NoDerivatives) modify and use your work for any purpose other than commercially
unless they get your permission first.
NoDerivatives (nd)
You let others copy, distribute, display and perform only original copies of your work. If
they want to modify your work, they must get your permission first.
License Types
Creative Commons offers six copyright licenses, based on combinations of the four
conditions outlined above.
Attribution (CC BY) This license lets others distribute, remix, tweak, and build upon
your work, even commercially, as long as they credit you for the original creation. This is
the most accommodating of licenses offered. Recommended for maximum dissemination
and use of licensed materials.
Attribution ShareAlike (CC BY-SA) This license lets others remix, tweak, and build
upon your work even for commercial purposes, as long as they credit you and license
their new creations under the identical terms. This license is often compared to “copyleft”
free and open source software licenses. All new works based on yours will carry the same
license, so any derivatives will also allow commercial use. This is the license used by
Wikipedia, and is recommended for materials that would benefit from incorporating
content from Wikipedia and similarly licensed projects.
Attribution-NoDerivs (CC BY-ND) This license lets others reuse the work for any
purpose, including commercially; however, it cannot be shared with others in adapted
form, and credit must be provided to you.
Attribution-NonCommercial (CC BY-NC) This license lets others remix, tweak, and
build upon your work non-commercially, and although their new works must also
acknowledge you and be non-commercial, they don‟t have to license their derivative
works on the same terms.
Cyber crime
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords
and credit card details by disguising as a trustworthy entity in an electronic communication.
Examples of phishing:
Phishing emails usually appear to come from a well-known organization and ask for your
personal information — such as credit card number, social security number, account number or
password. Often times phishing attempts appear to come from sites, services and companies with
which you do not even have an account.
Illegal downloads : While much of the content on the Internet is free to download, that does not
mean that downloading it is legal. Illegal downloading is obtaining files that you do not have the
right to use from the Internet. Copyright laws in the United States prohibit Internet users from
obtaining copies of media that they do not legally purchase. These laws exist to prevent digital
piracy, much of which is conducted through Internet file sharing.
What is a scam?
A scam is a fraudulent scheme generally involving money and some sort of business transaction.
Scams come in various forms. Maybe you have experienced someone telling you would win a
prize if you revealed your credit card details or asking you to donate money to a charity that does
not exist?
Scams reach us in various ways, via telephone, email, or even in person.
A person carrying out a scam is called a scammer.
What is fraud?
Fraud implies a deception. It is a breach of confidence or trust.
Fraud is a serious crime and a violation of civil law.
The motivations for fraud can be many. These include monetary gain, discrediting an opponent
or adversary. It can be to gain prestige as well as a financial advantage.
Cyber forensics
Cyberforensics is an electronic discovery technique used to determine and reveal technical
criminal evidence. It often involves electronic data storage extraction for legal purposes.
Although still in its infancy, cyberforensics is gaining traction as a viable way of interpreting
evidence.
Cyberforensics is also known as computer forensics.
Cybercrimes cover a broad spectrum, from email scams to downloading copyrighted works for
distribution, and are fueled by a desire to profit from another person's intellectual property or
private information. Cyberforensics can readily display a digital audit trail for analysis by experts
or law enforcement. Developers often build program applications to combat and capture online
criminals; these applications are the crux of cyberforensics.
Cyberforensic techniques include:
Cross-driven analysis that correlates data from multiple hard drives
Live analysis, which obtains data acquisitions before a PC is shut down
Deleted file recovery
Each of the above techniques is applied to cyber forensic investigations.
IT act 2000
The Information Technology Act, 2000 or ITA, 2000 or IT Act, was notified on October 17,
2000. It is the law that deals with cybercrime and electronic commerce in India. In this article,
we will look at the objectives and features of the Information Technology Act, 2000.
The I.T. Act, 2000 defines the terms −
Access in computer network in section 2(a)
Computer in section 2(i)
Computer network in section (2j)
Data in section 2(0)
Information in section 2(v).