Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL:http://www.reuters.com/article/2011/12/28/us- trains-security-idUSTRE7BR0C520111228.

Slides:



Advertisements
Similar presentations
The impact of IT Around the world By Eddie Cole. The positive social impacts of IT Social networking sites are huge now, bringing in hundreds of millions.
Advertisements

THE ART OF PERSUASION PERSUASION To cause (someone) to do something by means of argument, reasoning or entreaty (request).
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
NC Community College Leadership Program February 21, 2014 Dr. Bob Shackleford.
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
BY: WILL READE Cyber and Drone Warfare. Overview Cyber attacks & Drones leave the human out of the battlefield Makes waging war “easier” when the technology.
ETHICAL THEORIES: OVERVIEW. Universal Moral Theories Utilitarianism Egoism Deontology Rules-based Rights-based Virtue ethics.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
Garrett DeBruin CSCE390 Professional Issues In Computer Science feb/feb html#
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
Internet probe can track you down to within 690 meters.
Professional Ethics and Responsibilities
“Scientists Work to Keep Hackers Out of Implanted Medical Devices” Justin Fisher.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
A Gift of Fire Third edition Sara Baase
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
Personal Assistance (PA) Informational Workshop : July 31st, 2008, 5:00 to 6:30 PM Engleman Hall – Room B-121 Workshop Facilitators: Deborah Fairchild,
Network Topologies.
Business Ethics BY: Joshua m. Standifer.
Positive Guidance Techniques
Volunteer Risk Management March What’s the Plan.
Ethical Awareness.  An ethical decision that is essentially a difficult decision to make because of your honor system coming into conflict with something.
Having Balance in Your Life. Is Your Life in Balance Quiz? Directions: Answer true or false to each statement below. 1.I find myself spending more and.
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Ethics - 1 Key Definitions  Moral: “relating to principles of right and wrong”  Ethics: “the discipline of dealing with what is good and bad and with.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Computer security By Shreya Houji. VirusesViruses.
Wolcott High School School Counseling Department.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.
Ethics Wednesday, 10th Week. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop.
Computer and Internet Security By: Steven Siggers Instructor: Dr. Marko Puljic.
Making Decisions About Your Health Mr. Royer. Definitions Risk Behavior – Possibility that an action may cause injury or harm to you or others. Decision.
Ethical Decision Making , Ethical Theories
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
1 Workplace Emotions, Values, and Ethics. 2 Agenda Collect team research questions and subtopics Review case study requirements Discuss emotions, then.
Selection between Article Submission Services and Socialbookmarking Services Any time you are developing a web site or attempting to measure which SEO.
Professional Ethics and Responsibilities
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Module 3 Ethics and Social Responsibility. Module 3 How do ethics and ethical behavior play out in the workplace? How can we maintain high standards of.
By: Jeremy Henry and Wen Yang Chew.  Professional Ethics ◦ What is it? ◦ How it differs from general ethics.  Ethical Guidelines for Computer Professionals.
PHIL 2 Philosophy: Ethics in Contemporary Society Week 2 Topic Outlines.
1 The World of Work Chapter 1.1 Importance of Careers Section.
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
$.S.E.E.I.T.T. Strategy.
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Balance Work and Family Life
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Week 11: Professional Ethics and Responsibilities
Introduction to Business
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Presentation transcript:

Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C

“Hackers, using the same technique to shut down a website by overwhelming them with web traffic, could shut down the computers that control train switching systems,” According to Stefan Katzenbeisser at Technische Universitat Darmstadt in Germany. While Katzenbeisser says that “the trains could not crash, but service could be disrupted for quite some time”

 The ethical issue of this case is the slowing down of the train schedule and its impact.  The stakeholders in this case are those who have jobs and businesses that require commuting by train. As well as the train operators and the people who have to work on the systems that control train switching.  Three solutions: a)make train switching manual, b)Make the system secure from all intrusion of any kind, c) Make only a few system admins with randomly generating passwords each week. The best case would be c) because it creates a system of relative security and has the best chance of being effective. The worst case is b) because it allows no work to be done on the system if something goes wrong. I personally would choose c) because it seems to be the most balanced.

 I would personally allow everyone to use the solution I have provided because it is a smart way to security. This solution also treats people as both means and ends, because it has people in every part of the process except for password generation.  This solution is natural in the context of the environment that it is relevant. This solution is also balanced because it allows for people to access the system, but it does not allow for an active scenario where hacking the system can occur, as only a few people have access to the system and the passwords vary from week to week.  There would be a majority that think that this solution is the most efficient means to the end, as it secures the system and allows for only a few people to access the system. It will produce the greatest good for the greatest amount of people provided that people could be honest.

 I personally feel that this solution is the best one by far because it provides the best security and in my own conscience, because it would be the most sensible and allow for the most flexibility.  I personally feel that no philosophy actually affected this plan, but rather my personal morals are what influenced the morality of this solution and my sense of logic is what influenced how the solution was set up.  For the solution, it follows the ACM codes parts , as it helps with human well being by allowing people to get to work on time with a secure train system, it avoids harm to others, economic or physical, and it forces the admins of the system to be honest and trustworthy and not give out the system passwords to others.