Chapter 10 Ethics Privacy and Security Copyright 2015

  • Slides: 23
Download presentation
Chapter 10: Ethics, Privacy, and Security Copyright © 2015 Pearson Education, Inc. Chapter 10

Chapter 10: Ethics, Privacy, and Security Copyright © 2015 Pearson Education, Inc. Chapter 10 - 1

Learning objectives 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright

Learning objectives 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2015 Pearson Education, Inc. Chapter 10 - 2

Wikipedia • Freedom of speech • Ethical dilemmas Copyright © 2015 Pearson Education, Inc.

Wikipedia • Freedom of speech • Ethical dilemmas Copyright © 2015 Pearson Education, Inc. Chapter 10 - 3

Ethical frameworks • Natural law and rights • Utilitarianism Copyright © 2015 Pearson Education,

Ethical frameworks • Natural law and rights • Utilitarianism Copyright © 2015 Pearson Education, Inc. Chapter 10 - 4

Ethics and the law • Ethical principles • Political pressures • Legality vs. ethics

Ethics and the law • Ethical principles • Political pressures • Legality vs. ethics Copyright © 2015 Pearson Education, Inc. Chapter 10 - 5

Ethical issues and ICT • New elements • Free speech • Decision making Copyright

Ethical issues and ICT • New elements • Free speech • Decision making Copyright © 2015 Pearson Education, Inc. Chapter 10 - 6

Information ethics Copyright © 2015 Pearson Education, Inc. Chapter 10 - 7

Information ethics Copyright © 2015 Pearson Education, Inc. Chapter 10 - 7

Intellectual property and plagiarism • Intellectual property • Digital rights management • Plagiarism Copyright

Intellectual property and plagiarism • Intellectual property • Digital rights management • Plagiarism Copyright © 2015 Pearson Education, Inc. Chapter 10 - 8

/ Privacy (1: 2) ? ? • Elusive • What is privacy? • Information

/ Privacy (1: 2) ? ? • Elusive • What is privacy? • Information privacy Copyright © 2015 Pearson Education, Inc. Chapter 10 - 9

Privacy (2: 2) • Convenience • Anonymity • Surveillance Copyright © 2015 Pearson Education,

Privacy (2: 2) • Convenience • Anonymity • Surveillance Copyright © 2015 Pearson Education, Inc. Chapter 10 - 10

Information security • Risk management Copyright © 2015 Pearson Education, Inc. Chapter 10 -

Information security • Risk management Copyright © 2015 Pearson Education, Inc. Chapter 10 - 11

Identifying threats • Malware and botnets • Distributed denial of service • Phishing •

Identifying threats • Malware and botnets • Distributed denial of service • Phishing • Information leakage Copyright © 2015 Pearson Education, Inc. Chapter 10 - 12

Assessing vulnerability • Risk assessment • Controls • Risk matrix Copyright © 2015 Pearson

Assessing vulnerability • Risk assessment • Controls • Risk matrix Copyright © 2015 Pearson Education, Inc. Chapter 10 - 13

Administrative security controls • Processes • Policies • Incidence response plan Copyright © 2015

Administrative security controls • Processes • Policies • Incidence response plan Copyright © 2015 Pearson Education, Inc. Chapter 10 - 14

Technical security controls • Authentication strategies • Encryption • Intrusion prevention Copyright © 2015

Technical security controls • Authentication strategies • Encryption • Intrusion prevention Copyright © 2015 Pearson Education, Inc. Chapter 10 - 15

Information security and cloud computing • Security considerations • Standards and best practices Copyright

Information security and cloud computing • Security considerations • Standards and best practices Copyright © 2015 Pearson Education, Inc. Chapter 10 - 16

Human element (1: 2) • Cognitive issues • Passwords Copyright © 2015 Pearson Education,

Human element (1: 2) • Cognitive issues • Passwords Copyright © 2015 Pearson Education, Inc. Chapter 10 - 17

Human element (2: 2) • Social engineering • Security awareness Copyright © 2015 Pearson

Human element (2: 2) • Social engineering • Security awareness Copyright © 2015 Pearson Education, Inc. Chapter 10 - 18

Ethical decision making • • • Sales rep Sixth grader University employee Coworker CFO

Ethical decision making • • • Sales rep Sixth grader University employee Coworker CFO Chapter 10 - 19

Summary 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright ©

Summary 1. 2. 3. 4. 5. Ethics Challenges Privacy Security Human behavior Copyright © 2015 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20

Zynga case • • Develops social games Ended Petville creating player firestorm Ethical questions

Zynga case • • Develops social games Ended Petville creating player firestorm Ethical questions Future of Zynga Copyright © 2015 Pearson Education, Inc. Chapter 10 - 21

Spamhaus case • Mission • Block list • Legal issues Copyright © 2015 Pearson

Spamhaus case • Mission • Block list • Legal issues Copyright © 2015 Pearson Education, Inc. Chapter 10 - 22

Chapter 10 - 23

Chapter 10 - 23