Chapter 10 Ethics Privacy and Security Copyright 2015
- Slides: 23
Chapter 10: Ethics, Privacy, and Security Copyright © 2015 Pearson Education, Inc. Chapter 10 - 1
Learning objectives 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2015 Pearson Education, Inc. Chapter 10 - 2
Wikipedia • Freedom of speech • Ethical dilemmas Copyright © 2015 Pearson Education, Inc. Chapter 10 - 3
Ethical frameworks • Natural law and rights • Utilitarianism Copyright © 2015 Pearson Education, Inc. Chapter 10 - 4
Ethics and the law • Ethical principles • Political pressures • Legality vs. ethics Copyright © 2015 Pearson Education, Inc. Chapter 10 - 5
Ethical issues and ICT • New elements • Free speech • Decision making Copyright © 2015 Pearson Education, Inc. Chapter 10 - 6
Information ethics Copyright © 2015 Pearson Education, Inc. Chapter 10 - 7
Intellectual property and plagiarism • Intellectual property • Digital rights management • Plagiarism Copyright © 2015 Pearson Education, Inc. Chapter 10 - 8
/ Privacy (1: 2) ? ? • Elusive • What is privacy? • Information privacy Copyright © 2015 Pearson Education, Inc. Chapter 10 - 9
Privacy (2: 2) • Convenience • Anonymity • Surveillance Copyright © 2015 Pearson Education, Inc. Chapter 10 - 10
Information security • Risk management Copyright © 2015 Pearson Education, Inc. Chapter 10 - 11
Identifying threats • Malware and botnets • Distributed denial of service • Phishing • Information leakage Copyright © 2015 Pearson Education, Inc. Chapter 10 - 12
Assessing vulnerability • Risk assessment • Controls • Risk matrix Copyright © 2015 Pearson Education, Inc. Chapter 10 - 13
Administrative security controls • Processes • Policies • Incidence response plan Copyright © 2015 Pearson Education, Inc. Chapter 10 - 14
Technical security controls • Authentication strategies • Encryption • Intrusion prevention Copyright © 2015 Pearson Education, Inc. Chapter 10 - 15
Information security and cloud computing • Security considerations • Standards and best practices Copyright © 2015 Pearson Education, Inc. Chapter 10 - 16
Human element (1: 2) • Cognitive issues • Passwords Copyright © 2015 Pearson Education, Inc. Chapter 10 - 17
Human element (2: 2) • Social engineering • Security awareness Copyright © 2015 Pearson Education, Inc. Chapter 10 - 18
Ethical decision making • • • Sales rep Sixth grader University employee Coworker CFO Chapter 10 - 19
Summary 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2015 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20
Zynga case • • Develops social games Ended Petville creating player firestorm Ethical questions Future of Zynga Copyright © 2015 Pearson Education, Inc. Chapter 10 - 21
Spamhaus case • Mission • Block list • Legal issues Copyright © 2015 Pearson Education, Inc. Chapter 10 - 22
Chapter 10 - 23
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- Computer security safety ethics and privacy
- Privacy awareness and hipaa awareness training cvs
- Microsoft from back doors gov active
- Hipaa privacy and security awareness training
- Private security
- Copyright 2015 all rights reserved
- Copyright © 2015 all rights reserved
- Cengage intro to business
- Us digital millennium copyright act autumn
- Micro and macro ethics difference
- Legal ethical and professional aspects of security
- Cyber ethics definition
- Descriptive ethics
- Normative ethical questions
- Factual inquiry in ethics
- Metaethics vs normative ethics
- Descriptive ethics vs normative ethics
- Beneficence
- Meta ethics vs normative ethics
- 3 branches of ethics
- Deontological ethics example situation