Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
m
Ú
ethos
customhabitway of living
ñ concerns one's conduct of
behavior and practice when carrying out professional
work, e.g., consulting, researching, teaching and
writing.
r
åReselling Media
å aping songs
Internet Piracy
Hard-Disk Piracy
woftware Counterfeiting
End user piracy
åPirate website
åUnauthorized transfer of copyrighted program
Hard-Disk Loading
wYwEM
Yccess confidential information
hreaten someone from YOUR computer
Broadcast your confidential letters or materials .
wtore illegal material
Ydvantage of Hacking
2. Information handling
!
!
Internet users obtain Internet access through an
Internet service provider (IwP). Yll data transmitted
to and from users must pass through the IwP. hus,
an IwP has the potential to observe users' activities
on the Internet.
Ú
Many programs and operating systems are set up to
perform data logging of usage. his may include
recording times when the computer is in use, or which
web sites are visited. If a third party has sufficient
access to the computer, legitimately or not, the user's
privacy may be compromised. his could be avoided
by disabling logging, or by clearing logs regularly.
Information security
HYCKING
wPYM
VIRUw DIwwEMINYION
wOFrYRE PIRYCY
PORNOGRYPHY
IRC Crime
NE EXORION
PHIwHING
wPOOFING
CYBER wYLKING
CYBER DEFYMYION
wYLYMI YYCK
CREDI CYRD FRYUD
!!!"
!!#$
m
"
# $%%%
&ë ' ( Ú
$ë ' Ú
)ë *
+ë Ú!
*
HYNK YOU