By Kathryn DuFresne. WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should.

Slides:



Advertisements
Similar presentations
Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Digital Citizenship in the Classroom
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Information Warfare Theory of Information Warfare
Computers in Society Week 8: Computer Security and Hacking.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Network Security of The United States of America By: Jeffery T. Pelletier.
COMPUTER AND INFORMATION ETHICS By: Richard Ramos.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Cyber-Warfare: The Future is Now!
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Computer ethics.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
A sophisticated Malware Arpit Singh CPSC 420
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Unethical use of Computers and Networks
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Information Warfare Playgrounds to Battlegrounds.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Monitoring Employees on Networks: Unethical or Good Business?
W h y D o I N e e d C y b e r L i a b i l i t y I n s u r a n c e ?
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Information Warfare Playgrounds to Battlegrounds.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
NETWORK SECURITY LAB Rehab AlFallaj. Learning Objective ■In this Lecture you will learn: –Ethical Issues related to network security.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
DDoS Things You Need To Know About DDoS Attacks DDoS.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
Information Security and Privacy in HRIS
International Conflict & Cyber Security
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Hotspot Shield Protect Your Online Identity
Hackers and Crackers iJacsn.
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Five Unethical Uses of Computers
Chapter 13 Security and Ethical Challenges.
How to keep the bad guys out and your data safe
Forensic and Investigative Accounting
Protecting Data and Information
Securing your system, protecting your digital data and devices.
Presentation transcript:

By Kathryn DuFresne

WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct via the computer. This could include topics such as copyright infringement, internet control, and general internet privacy.

WHY is this important? Ethics leaves you talking a lot about what is good and what is bad to do on the internet. Does the Internet foster democracy and freedom of speech? Or does it hurt us in the long run? Is it immoral or wrong to copy software, music, or movies? With more storage of personal data for social networking arises the problem of selling that information for monetary gain. How safe is our information?

WHAT is cyber warfare? Through using computers and the Internet as weapons, it is completely possible for a hacker with a computer to disable critical infrastructure in a major city and disrupt essential services, to steal millions of dollars from banks all over the world, infiltrate defense systems, extort millions from public companies, and even sabotage weapon systems. A 2010 report from Norton found that nearly two-thirds of people worldwide have been the victim of cybercrime. A 2009 study done by McAfee shows cybercrime, including data theft and security breaches, may have cost global businesses as much as $1 trillion globally.

WHY is this important? Dropping a new kind of bomb, while exposing the codes for the attacks. They can become freely available, and allow others to use them. Some viruses can create huge disasters, such as explosions or opening flood gates on a dam, or even steal documents concerning National Security (and other countries who hate other countries would not be so happy about this, and immediately start pointing fingers.)

Examples _more _more YOUR PANTS Minor problem, a large section (months worth) of data lost ANONYMOUS and SYRIAN MINSTRY OF DEFENSE Anonymous is a loosely organized group of individuals identifying with a certain weird bunch of values like anarchy and "don't mess with us." They hack things that piss them off. There are apparent political motivations with this, however the hacktivisim seems secondary to the thrill of the actual hacking. RUSSIAN MAFIA Revenues in the BILLIONS from stealing credit card numbers STUXNET and IRAN FOUR 0-day exploits [An exploit that has not been released into the wild. Only the hacker, and possibly their close associates, know about the security hole at this point] (no computer virus has used more than 1), infected thousands of computers using industrial programs, only activated in the centrifuges refining uranium.

Proposed solutions to solve these problems THERE ARE NONE Although, Legislation will more than likely be created to protect us, and that will a) ruin all the good things about the internet and b) not ever be effective.

Conclusion Cyber warfare proposes a whole new type of threat, that is almost impossible to track down and prosecute.

Sources threat/p threat/p ore ore 87.shtml 87.shtml

Any suggestions on how to make this better?