COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Obtain confidential and sensitive information
|
|
Illegally obtain money from victims by deception
|
|
Take advantage of victims for malicious intent
|
|
All of the above
|
Detailed explanation-1: -Hacking-including of social media and email passwords. Phishing-bogus emails asking for security information and personal details. Malicious software – including ransomware through which criminals hijack files and hold them to ransom.
Detailed explanation-2: -Cybercriminals are known to access the cybercriminal underground markets found in the deep web to trade malicious goods and services, such as hacking tools and stolen data. Cybercriminal underground markets are known to specialize in certain products or services.
Detailed explanation-3: -Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. These could be political or personal.