chapter 10: ethics, privacy, and security copyright © 2013 pearson education, inc. publishing as...

23
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1

Upload: gilbert-melton

Post on 25-Dec-2015

229 views

Category:

Documents


2 download

TRANSCRIPT

Chapter 10:Ethics, Privacy, and Security

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1

Learning objectives

1. Ethics

2. Challenges

3. Privacy

4. Security

5. Human behavior

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 2

Wikipedia

• Freedom of speech

• Ethical dilemmas

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 3

Ethical frameworks

• Natural law and rights

• Utilitarianism

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 4

Ethics and the law

• Ethical principles

• Political pressures

• Legality vs. ethics

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 5

Ethical issues and ICT

• New elements

• Free speech

• Decision making

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 6

Information ethics

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 7

Intellectual propertyand plagiarism

• Intellectual property

• Digital rights management

• Plagiarism

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 8

• Elusive

• What is privacy?

• Information privacy

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 9

Privacy (1:2)

Privacy (2:2)

• Convenience

• Anonymity

• Surveillance

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 10

Information security

• Risk management

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 11

• Malware and

botnets

• Distributed denial of

service

• Phishing

• Information leakage

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 12

Identifying threats

• Risk assessment

• Controls

• Risk matrix

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 13

Assessing vulnerability

• Processes

• Policies

• Incidence response

plan

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 14

Administrativesecurity controls

Technical security controls

• Authentication strategies

• Encryption

• Intrusion prevention

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 15

• Security considerations

• Standards and best practices

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 16

Information security andcloud computing

• Cognitive issues• Passwords

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 17

Human element (1:2)

Human element (2:2)

• Social engineering

• Security awareness

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 18

Ethical decision making

• Sales rep

• Sixth grader

• University employee

• Coworker

• CFO

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 19

Summary

1. Ethics

2. Challenges

3. Privacy

4. Security

5. Human behavior

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20

• Retargeting• Privacy concerns• Transparency

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 21

Criteo case

Spamhaus case

• Mission

• Block list

• Legal issues

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 22

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 23