File Name: security and ethics in computer science .zip
Skip to search form Skip to main content You are currently offline.
There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer. Phishing involves sending emails that appear to come from reliable sources such as banks and that try to get users to reveal confidential banking information, which is then used fraudulently. Denial of service attack is a cyber attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. It refers to hackers driving around with laptops or mobile devices connected to high-powered antennas, scanning for unlocked i. Keylogging is the use of a computer program to record every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Chapter 8 – Security and Ethics
Questions of ethics and legality are essential in many industries. Doctors, teachers, government officials and business people all have legal and ethical oversight to control how their professions function.
Information technology, by contrast, has no overarching standardization in place. However, as information technology becomes increasingly influential, the ethical and legal considerations become similarly relevant.
Here are the five most pressing ethical and legal issues confronting the industry today. Most people have their personal data spread throughout the digital world. Even things thought to be secure, such as email or private accounts, can be accessed by unintended sources.
Privacy has evolving legal implications, but there are also ethical considerations. Do people know how their accounts are monitored? To what extent is such monitoring occurring? Digital mediums have allowed information to flow more freely than before. This exchange of ideas comes with a legal and ethical backlash. How can ownership be established in the digital realm?
Things can be easily copied and pasted online, which makes intellectual property hard to control. Legal notions such as copyright have struggled to keep up with the digital era. Companies in the music and entertainment industries have pushed for greater legal protections for intellectual properties while other activists have sought to provide greater freedoms for the exchange of ideas in the digital realm. On some level, everyone knows that their online lives are monitored.
The United States has even passed legislation allowing the government to actively monitor private citizens in the name of national security. These measures have revived a debate about what information can be gathered and why.
This debate applies on a smaller scale as well because companies need to consider what information to collect from their employees. This issue invokes a question of consent. Do people know what information is being monitored?
Do they have a right to know how their data is being used? In the past, security issues were resolved by locking a door. Digital security is much more complicated. Security systems for digital networks are computerized in order to protect vital information and important assets. However, this increased security comes with increased surveillance.
All security systems have inherent risks, which means it is a question of what risks are acceptable and what freedoms can be forfeited. Ultimately, IT professionals need to balance risk with freedom to create a security system that is effective and ethical at the same time.
Net neutrality has become a trendy issue thanks to legislative efforts in the last few years. The issue of net neutrality is essentially a question of access. Proponents want the Internet to remain open to everyone while some businesses want to create tiered access for those who are willing to pay. The issue even extends to private Internet usage since the cost of service in some areas may be cost prohibitive.
The larger ethical question is whether or not digital exchange is now a universal right. The cost of access can impede business growth, entrepreneurial spirit and individual expression.
These issues are essential for everyone, but they carry extra weight for those who work with information technology. It is important to remember that working with technology is not separated from ethical contexts but can actually help define a legal and ethical code for generations to come.
Computer Security and Ethics
Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Maner noticed ethical concerns that were brought up during his Medical Ethics course at Old Dominion University became more complex and difficult when the use of technology and computers became involved. The concept of computer ethics originated in the s with MIT professor Norbert Wiener , the American mathematician and philosopher. While working on anti-aircraft artillery during World War II , Wiener and his fellow engineers developed a system of communication between the part of a cannon that tracked a warplane, the part that performed calculations to estimate a trajectory, and the part responsible for firing. A bit later during the same year, the world's first computer crime was committed.
If the data on these computer systems is damaged, lost, or stolen, it can lead to disaster. Encryption is also used to secure data sent over wireless networks.
Describe the types of computer security risks Discuss the types of devices available that protect computers from system failure. Identify ways to safeguard against computer Explain the options available for backing up viruses, worms, Trojan horses, denial of computer resources service attacks, back doors, and spoofing. Identify risks and safeguards associated with Discuss techniques to prevent unauthorized wireless communications computer access and use. Recognize issues related to information Identify safeguards against hardware theft accuracy, rights, and conduct and vandalism. Discuss issues surrounding information Explain the ways software manufacturers privacy protect against software piracy.
Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers. The commandments have been widely quoted in computer ethics literature  but also have been criticized by both the hacker community  and some in academia. For instance, Dr.
Honesty is the underlying principle for all computer use. At one extreme, significant violations of academic integrity may result in penalties including dismissal from the university. More generally, common sense, civility, and respect for another's rights and computer property is as important to our CSE community as proper treatment of our equipment.