Chapter 10 Ethics Privacy and Security Copyright 2013

  • Slides: 23
Download presentation
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as

Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1

Learning objectives 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright

Learning objectives 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 2

Wikipedia • Freedom of speech • Ethical dilemmas Copyright © 2013 Pearson Education, Inc.

Wikipedia • Freedom of speech • Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 3

Ethical frameworks • Natural law and rights • Utilitarianism Copyright © 2013 Pearson Education,

Ethical frameworks • Natural law and rights • Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 4

Ethics and the law • Ethical principles • Political pressures • Legality vs. ethics

Ethics and the law • Ethical principles • Political pressures • Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 5

Ethical issues and ICT • New elements • Free speech • Decision making Copyright

Ethical issues and ICT • New elements • Free speech • Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 6

Information ethics • • • Intellectual property rights Hacking Plagiarism Parasitic computing Spam Copyright

Information ethics • • • Intellectual property rights Hacking Plagiarism Parasitic computing Spam Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 7

Intellectual property and plagiarism • Intellectual property rights • Digital rights management • Plagiarism

Intellectual property and plagiarism • Intellectual property rights • Digital rights management • Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 8

Privacy (1: 2) • Elusive • What is privacy? • Information privacy Copyright ©

Privacy (1: 2) • Elusive • What is privacy? • Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 9

Privacy (2: 2) • Convenience • Anonymity • Surveillance Copyright © 2013 Pearson Education,

Privacy (2: 2) • Convenience • Anonymity • Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 10

Information security • Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice

Information security • Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 11

Identifying threats • • Malware and botnets Distributed denial of service Phishing Information leakage

Identifying threats • • Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 12

Assessing vulnerability • Risk assessment • Controls • Risk matrix Copyright © 2013 Pearson

Assessing vulnerability • Risk assessment • Controls • Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 13

Administrative security controls • Processes • Policies • Incidence response plan Copyright © 2013

Administrative security controls • Processes • Policies • Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 14

Technical security controls • Authentication strategies • Encryption • Intrusion prevention Copyright © 2013

Technical security controls • Authentication strategies • Encryption • Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 15

Information security and cloud computing • Security considerations • Standards and best practices Copyright

Information security and cloud computing • Security considerations • Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 16

Human element (1: 2) • Cognitive issues • Passwords Copyright © 2013 Pearson Education,

Human element (1: 2) • Cognitive issues • Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 17

Human element (2: 2) • Social engineering • Security awareness Copyright © 2013 Pearson

Human element (2: 2) • Social engineering • Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 18

Ethical decision making • • • Sales rep Sixth grader University employee Co-worker CFO

Ethical decision making • • • Sales rep Sixth grader University employee Co-worker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 19

Summary 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright ©

Summary 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20

Criteo case • Retargeting • Privacy concerns • Transparency Copyright © 2013 Pearson Education,

Criteo case • Retargeting • Privacy concerns • Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 21

Spamhaus • Mission • Block list • Legal issues Copyright © 2013 Pearson Education,

Spamhaus • Mission • Block list • Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 22

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 23

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 23