Cyber Ethics class 10th CBSE Full Chapter

Reading Time: 8 minutes
“Computer Applications” Class 10th CBSE Chapters to Read

Netiquette

Netiquette is short for “Internet etiquette.” Just like etiquette is a code of polite behavior in society, netiquette is a code of good behavior on the Internet.

Some Rules for Good netiquette:

  • Avoid posting inflammatory or offensive comments online
  • Respect others’ privacy
  • Never spam others by sending large amounts of unsolicited email.
  • Don’t swear or use offensive language.
  • Avoid replying to negative comments with more negative comments. Instead, break the cycle with a positive post.
  • If someone asks a question and you know the answer, offer to help.
  • Thank others who help you online.

Software Licenses and the open source software movement

A software license dictates how the program or code can be used and distributed to the users.

Software license allow publisher to retain intellectual property rights of the software.

Free software – this movement was the idea of Richard stallman , in 1983 he launched GNU project.

GNU project – to create operating system in which users have freedom to view , change and share its source code.

  • In 1985 richard stallman founded FSF – free software foundation.
  • Acc to FSF – a free software is –
    • Freedom to run program for any purpose
    • Study how the program works and changes it does to our computing
    • Access to source code
    • Redistribute the program
    • Redistribute after modifying the program
  • In 1998 netscape released the source code of its browser (COMMUNICATOR) , which later formed the basis of MOZILLA FIREFOX 1.0.

Open source software – type of computer software in which source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose. Ex linux

Software licences

GNU GPL( GNU NOT UNIX General Public Licence) – The GNU General Public License (GNU GPL or GPL) is a widely-used free software license that guarantees end users the freedom to run, study, share, and modify the software. The license was originally written by Richard Stallman

LGPL (lesser General Public License) – THIS license published by the Free Software Foundation (FSF). The license allows developers and companies to use and integrate free open source software into their propriety software.

BSD licenses ( Berkeley Software Distribution ) – BSD licenses are a low restriction (fulfill minimal requirements ) type of license for open source software that does not put requirements on redistribution.

Massachusetts Institute of Technology (MIT) License – It is a free license software. The MIT License grants the software end user rights such as copying, modifying, merging, distributing, etc. It is notable for what it does not contain, such as clauses for advertising and prohibition of the use of the copyright owner’s name for promotional uses

Apache License – is a permissive free software license written by the Apache Software Foundation (ASF). It allows users to use the software for any purpose, to distribute it, to modify it, and to distribute modified versions of the software under the terms of the license, without any fee.

Proprietary license – it is the most restrictive license. Proprietary software refers to any software that has a copyright and has limits to use and distribution. These limits are imposed by the developer, publisher, or vendor. It is the property of the owner and can be used with specified conditions.

Copyleft License – it allows the end user to freely modify and distribute new works based on your work with the requirement that any new works of the original are bound by the same licensing agreement.

Intellectual Property Rights ( IPR )

Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images

Types of intellectual property

  • Trademarks – a symbol, word, or words legally registered or established by use as representing a company or product.
  • Copyrights – copyright range from books, music, paintings, sculpture, and films, to computer programs, databases, advertisements, maps, and technical drawings.
  • Patents – A patent is a form of intellectual property that gives its owner the legal right to exclude others from making, using, selling and importing an invention for a limited period of years.

Plagiarism

Plagiarism is taking someone else’s work and/or ideas and using them as your own, rather than giving credit to the rightful owner.

Plagiarism comes from LATIN word means kidnapping.

How to Avoid plagiarism :

Cite your source – When alluding to an idea or wording that’s not your own, add a citation in your writing that identifies the full name of the source, the date it was published.

Include quotations –  If you insert a source’s words into your writing, verbatim, one of the most simple yet obvious ways to avoid plagiarism is by using quotation marks around the text to denote that the words aren’t your own.

Paraphrase

Paraphrasing is rewriting a source’s ideas or information into your own words, without changing its meaning. But be careful—paraphrasing can slip into plagiarism if done incorrectly.

Types of plagiarism :

Collusion – means when one student produce a work and allows other student to copy it . and both students submit the work.

Complete plagiarism – when a person copy an entire work from one or more sources.

Partial plagiarism  – when a person copy some sections of his work from one or more sources.

Self plagiarism – when a person reuse his previously written work or data in a new assignment / work .

Digital Property Rights

  • Digital Property Rights are the rights that protect the ownership and use of digital content like music, videos, software, images, and documents on the internet.
  • Others cannot copy, share, or use it without permission
  • Digital property rights are protected under laws.

Freedom of Information

Freedom of Information means the right of people to access information held by the government or public authorities.

This right is provided under:

  • Right to Information Act, 2005

This law allows citizens to request government records, check how decisions are made, ensure transparency and accountability.

It promotes transparency, reduces corruption, empowers citizens, makes government accountable.

Digital Divide

A digital divide is an uneven distribution in the access to, use of, or impact of Information and Communication Technologies (ICT) such as internet, between people

Main challenges to digital divide –

  • Lack of telecommunication infrastructure
    • Lack of skill in using computer
    • Lack of understanding English language

To solve digital divide Indian government passed information technology act, 2000 to make e-commerce and e-governance a success story in India.

E-Commerce

Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet.

Privacy

Personal information about your habits, shopping, and location can be collected from your phone, GPS, and other devices—and eventually shared with third parties.

It is the  protection an individual has while connected to the Internet.

The way your personal information is used, collected, shared, and stored on your personal devices and while on the Internet.

How we can improve online privacy –

  •  Use strong passwords for your online accounts
  •  Use Secure Browser and Search Engine
  •  Pay attention to the links you click – some links can redirect you to a fake web location, controlled by online criminals and may encourage you to share your personal information.
  • Don’t post private information on your social media accounts.

Fraud

Online fraud is a type of fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property.

Fraudulent pop-up window – Fake pop-ups, like the “ransomware detected” pop-up, tell users that there is a security threat or technical problem with their computer. They instruct users to call a telephone number specified on the pop-up in order to pay for technical support to resolve this threat.

Phishing – Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy app, link or email.

Cryptography – It is the technique of encrypting data into an unreadable format, ( known as cypher text) to protect data, payment information or emails . Only those who posses a secure key or encryption key , can decrypt the messages into plain text.

E-commerce secure data transmission

E-commerce security is a set of protocols that safely guide e-commerce transactions.

Multilayer security – Platform host should have security on application level like forms , search tools , login fields.

PCI compliant ( payment card industry ) – host provider should be PCI compliant .

( PCI is data security standard that is required for all hosts that store , process and transmit cardholder data )

PCI scans and updates – Hosts should do frequent scans and for any possible threat.

Involve CVV (card verification value) – It make sure safer credit card or debit card transactions.

Use stronger passwords – Hackers use algorithms that can guess any simple password . so we should set a password that at least contain 1 lowercase, 1 uppercase , 1 number and 1 special character

SSL certificates – Secure socket layer validates the identity of a business also secure the data transmission.