Chapter 10 Ethics Privacy and Security Copyright 2013
- Slides: 23
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1
Learning objectives 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 2
Wikipedia • Freedom of speech • Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 3
Ethical frameworks • Natural law and rights • Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 4
Ethics and the law • Ethical principles • Political pressures • Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 5
Ethical issues and ICT • New elements • Free speech • Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 6
Information ethics • • • Intellectual property rights Hacking Plagiarism Parasitic computing Spam Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 7
Intellectual property and plagiarism • Intellectual property rights • Digital rights management • Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 8
Privacy (1: 2) • Elusive • What is privacy? • Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 9
Privacy (2: 2) • Convenience • Anonymity • Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 10
Information security • Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 11
Identifying threats • • Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 12
Assessing vulnerability • Risk assessment • Controls • Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 13
Administrative security controls • Processes • Policies • Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 14
Technical security controls • Authentication strategies • Encryption • Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 15
Information security and cloud computing • Security considerations • Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 16
Human element (1: 2) • Cognitive issues • Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 17
Human element (2: 2) • Social engineering • Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 18
Ethical decision making • • • Sales rep Sixth grader University employee Co-worker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 19
Summary 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20
Criteo case • Retargeting • Privacy concerns • Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 21
Spamhaus • Mission • Block list • Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 22
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 23
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- What is the destructive event or prank the virus delivers
- Cvs privacy awareness and hipaa privacy training
- Microsoft azure security privacy and compliance
- Hipaa privacy and security awareness training
- Security private
- Mbti personal impact report
- Us digital millennium copyright act ethics
- Differentiate micro-ethics and macro-ethics.
- Professional issues in information security
- Ethique informatique
- Descriptive ethics
- Briefly recap
- Factual inquiry in ethics
- Meta ethics vs normative ethics
- Descriptive ethics vs normative ethics
- Discipline
- Metaethics vs normative ethics
- L
- Deontological ethics examples
- Teleological ethics vs deontological ethics
- Wireless security in cryptography and network security