"Thou shalt not use a computer to steal" (Computer Ethics 2)

"Thou shalt not use a computer to steal" is one of the rules which are included in computer ethic list. However, this rule is not only about stealing money. It is about intellectual property as well. Protecting from stealing is one of the biggest challenges for cybersecurity specialists.


Using a computer to steal is for example hacking into another computer to get credit card number, intellectual property or company trade secrets (Goldsborough, 2004). However, we can highlight easier to execute ways to break this rule. For example, one of the internet scams has been done by a group of three people, which created a story about a homeless veteran (Witman, 2019). Mentioned fraud allows them to extort over 400.000$. The next example shows nobody can feel completely safe on the Internet. In January 2019 famous YouTube creator, Philip DeFranco published the message about hack his account. However, it was too late, because the hacker responsible for this attack sent the messages to his over 6 millions subscribers with the scam link. The information in a message told about the gift, which will be collected after clicking in the link. However, if the user did it, the hacker was able to theft identify (Witman, 2019).


This rule is covered in the law of many countries. Stealing by using a computer is named as Computer Fraud. In the UK, computer fraud is covered by The Computer Misuse Act (CMA) 1990, Data Protection Act 1998 and GDPR (McCallion, 2020).



References:

Goldsborough, R., 2004. Personal Computing. [online] IndustryWeek. Available at: <https://www.industryweek.com/technology-and-iiot/information-technology/article/21932857/personal-computing> [Accessed 11 December 2020].

McCallion, J., 2020. What Is The Computer Misuse Act?. [online] Itpro.co.uk. Available at: <https://www.itpro.co.uk/it-legislation/28174/what-is-the-computer-misuse-act> [Accessed 11 December 2020].

Witman, E., 2019. The 11 Most Sophisticated Online Scams Right Now That The Average Person Falls For. [online] Business Insider. Available at: <https://www.businessinsider.com/online-scams-internet-phishing-2019-3?r=US&IR=T#gofundme-fake-outs-take-advantage-of-peoples-generosity-9> [Accessed 11 December 2020].

Comments

Popular posts from this blog

SSL Asymmetric Encryption (Diagram 2)

Opinion about safety (Survey Analysis)

How Ransomware attack works? (Models & Methodologies)