Information Security at the University of Pennsylvania: Practical Applications and Experience with Information Ethics CIS 401 Senior Design Course Joshua.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Chapter 1: The Context of SA&D Methods
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Institutional Research Compliance Juliann Tenney, JD Research Compliance and Privacy Officer Director, Institutional Research Compliance Program.
Computer Ethics for Computer Users
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Do software developers have an ethical duty? KELLEN STUART.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
COMPUTER ETHICS AND LEGAL ISSUES
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 16 – Careers in Information Technology
The Legal System and Ethics in Information Security
Unit 3- Introduction to Computer Ethics
Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Introduction to Computer Ethics
Computer Ethics.
Presentation transcript:

Information Security at the University of Pennsylvania: Practical Applications and Experience with Information Ethics CIS 401 Senior Design Course Joshua Beeman University Information Security Officer February 23, 2012

Agenda UPenn InfoSec - Who we are and what we do Computer Ethics – Context and History Ethics in practice – Examples from UPenn Policy & Incidents Workplace issues Intellectual Property and Copyright Cybercrime Privacy Professional Codes of Conduct Globalization

Office of Information Security Jim Choate (Executive Director, ISC/AIT) Senior Information Security Specialists: John Lupton Melissa Muth Dana Taylor Contact and reach all of Joshua Beeman (University Information Security Officer)

Office of Information Security Information Security’s core mission is to develop strategies and practices that protect Penn’s confidential and sensitive information assets.

Information Security Services Development of policy Information Security- related projects and initiatives Security consultation, awareness & training Risk assessment, risk management, threat monitoring, and related communications Reporting on events and trends Incident handling, response, investigation and notification Point of contact and coordination Office of Information Security

Brief Video…

Why it’s relevant Facemash - Zuckerberg was charged by the administration with breach of security, violating copyrights, and violating individual privacy. Later used in an Art History class as a “social study tool”. Image from:

Ethics Defined The rules of conduct recognized in certain associations or departments of human life. - (O.E.D.) More simply: the distinction between right and wrong in a given context.

Computer Ethics – History & Key Themes 1940's Norbert Wiener: Originator of cybernetics – the structure of regulatory systems - which he saw as having profound ethical implications when applied to technology Metaphysical concepts around information 1970's Walter Maner Developed "Starter Kit" for Teaching Computer Ethics (1978) Defined topics, including: Privacy and Confidentiality, Computer Crime, Professional ethics, etc. Believed computers introduced *new* ethical challenges Deborah Johnson Saw computers highlighting pre-existing ethical problems in interesting - but not *new* ways. Resulted in the "uniqueness" debate.

Computer Ethics – History & Key Themes 1980's Deborah Johnson published "Computer Ethics" textbook (1985) James Moor article "What is Computer Ethics", which describes "policy vacuums" and "conceptual muddles". 1990's Donald Gotterbarn emphasized codes of conduct for computing professionals "Computer Ethics: Responsibility Regained (1991) Establishment of professional organizations code of conducts, as well as programs and tools to assist with ethical behavior (ACM, IEEE, EFF, SEERI, SoDIS, etc.) Universal/Key concepts: Technological impact on core human values, such as health, happiness, abilities, knowledge, freedom, security, etc. (Wiener, Moor, others) Context of cultural norms, practices, rules and laws that form the basis for societal ethics (right and wrong).

Policy and the Relationship to Ethics Policy documents what you can and cannot do. Some key Penn resources: AUP Electronic Privacy Guidelines on Open Expression What guides policy? Directly related to the mission of your organization Frequently the place where we identify “conceptual muddles” Strongly driven by human values (e.g., Wiener, Moor)

Workplace Issues Employment/Labor Cases University Employee unauthorized use of IT resources, unlawful behavior, violation of terms of employment, etc. Faculty responsibility to be SME? Penn Cloud assessments

Intellectual Property and Copyright Copyright and IP issues Digital Millennium Copyright Act (DMCA) Professional misconduct (e.g., plagiarism) Changing laws Context matters Different populations / different cultures / different ethical norms Copyright incidents Briton Chance website

Cyber Crime Penn Incidents & Examples Hacking & Malware WebApp Backdoor Zeus bot Drive-by malware Theft & cloud Hacktivism climate research s at East Anglia University 2010 – 2011 – Numerous hacktivitst attacks by Anonymous group on both governments and private sector. Enabling in the name of teaching/demonstration Square debate Image courtesy of

Privacy Business of Penn – collecting information about students, alumni, business partners, etc. Regulations – PII, HIPAA, FERPA Cloud privacy concerns Social Media – UPenn MED grant Rutgers suicide Duke powerpoint Dr. Matt Blaze & Clipper Chip Other current events: FB lawsuit & Google Privacy Shift EPIC lawsuit

Professional Codes of Conduct Penn Institutional Review Board (IRB) Wikipedia research example Maner/Johnston uniqueness debate Note also: UPenn Social Media Guidance Ethical (“white hat”) hacking Gotterbarn in practice ACM, IEEE GCEH ISC2 The Ten Commandments of Computer Ethics:

Professional Codes of Conduct Example from The Computer Ethics Institute 1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people's computer work. 3.Thou shalt not snoop around in other people's computer files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness. 6.Thou shalt not copy or use proprietary software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization or proper compensation. 8.Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

Globalization Collaboration Access Control and Shibboleth International Laws and Impact Wikileaks - Julian Assange IP and global economy Transcending Mission Arab Spring MIT open classroom & education gap

Some References & Resources Computer and Information Ethics, Stanford Encyclopedia of Philosophy; Oct 23, University of Pennsylvania Policy on Acceptable Use of Electronic Resources: University of Pennsylvania Policy on Privacy in the Electronic Environment: University of Pennsylvania Guidelines on Open Expression: Maner, W. (1980), Starter Kit in Computer Ethics, Hyde Park, NY: Helvetia Press and the National Information and Resource Center for Teaching Philosophy. Johnson, D. (1985), Computer Ethics, Third Edition Upper Saddle River, NJ: Prentice-Hall, West, A.G., Hayati, P., Potdar, V., and Lee, I. (2012). Spamming for Science: Active Measurement in Web 2.0 Abuse Research. In WECSR '12: Proceedings of the 3rd Workshop on Ethics in Computer Security Research, Kralendijk, Bonaire. Dittrich, D., Bailey, M., Dietrich, S.: Building an active computer security ethics community. IEEE Security and Privacy 9(4) (July/August 2011)

Peter Sunde (2012), Wired Magazine: “The Pirate Bay’s Peter Sunde: It’s Evolution, Stupid”, February 10, Tavernise, Sabrina, The New York Times, “Education Gap Grows Between Rich and Poor, Studies Say, February 9, show.html show.html Verifone Consumer Alert: Card Skimming with Square, Uploaded by VeriFoneInc on Mar 9, PÉREZ-PEÑA, Richard, The New York Times, "More Complex Picture Emerges in Rutgers Student’s Suicide, New York Times, August 12, complex-picture-emerges.html?_r=1https:// complex-picture-emerges.html?_r=1 Barber, C. Ryan, The Daily Tar Heel, "Yankaskas settles appeal, agrees to retire from UNC: Pay cut, demotion rescinded in deal", April 18, “Clipper Chip”, Wikipedia entry: