Date post: | 25-Dec-2015 |
Category: |
Documents |
Upload: | gilbert-melton |
View: | 229 times |
Download: | 2 times |
Chapter 10:Ethics, Privacy, and Security
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1
Learning objectives
1. Ethics
2. Challenges
3. Privacy
4. Security
5. Human behavior
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 2
Wikipedia
• Freedom of speech
• Ethical dilemmas
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 3
Ethical frameworks
• Natural law and rights
• Utilitarianism
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 4
Ethics and the law
• Ethical principles
• Political pressures
• Legality vs. ethics
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 5
Ethical issues and ICT
• New elements
• Free speech
• Decision making
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 6
Information ethics
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 7
Intellectual propertyand plagiarism
• Intellectual property
• Digital rights management
• Plagiarism
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 8
• Elusive
• What is privacy?
• Information privacy
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 9
Privacy (1:2)
Privacy (2:2)
• Convenience
• Anonymity
• Surveillance
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 10
Information security
• Risk management
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 11
• Malware and
botnets
• Distributed denial of
service
• Phishing
• Information leakage
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 12
Identifying threats
• Risk assessment
• Controls
• Risk matrix
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 13
Assessing vulnerability
• Processes
• Policies
• Incidence response
plan
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 14
Administrativesecurity controls
Technical security controls
• Authentication strategies
• Encryption
• Intrusion prevention
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 15
• Security considerations
• Standards and best practices
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 16
Information security andcloud computing
• Cognitive issues• Passwords
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 17
Human element (1:2)
Human element (2:2)
• Social engineering
• Security awareness
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 18
Ethical decision making
• Sales rep
• Sixth grader
• University employee
• Coworker
• CFO
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 19
Summary
1. Ethics
2. Challenges
3. Privacy
4. Security
5. Human behavior
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20
• Retargeting• Privacy concerns• Transparency
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 21
Criteo case
Spamhaus case
• Mission
• Block list
• Legal issues
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 22