The Threat of Cyber War The Issue of Cyber Security.

Slides:



Advertisements
Similar presentations
Driverless Cars By: Chris Broom. Summary The dream of a car that can drive itself has grown over the last decade as the necessary technologies have gradually.
Advertisements

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
ICT Ethics 2 ICT 139.
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
JCSD-aw Citizenship in an e-World Johnston Community School District.
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
Interview Skills for Nurse Surveyors A skill you already have and use –Example. Talk with friends about something fun You listen You pay attention You.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
Internet probe can track you down to within 690 meters.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
Working group discussion 1 Cyber Risk Security, Privacy ?
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Ethics and Social Responsibility
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Social Informatics (8571) Review on literature review “Why Computer Talents Become Computer Hackers” By Billy Lu Leo Li.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Juan Ortega 8/20/09 NTS300. Right now IPv4 dominates the Internet with some experts believing the need for IPv6 isn’t necessary because of NAT. But even.
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
System Monitoring of Federal Agents Stephen Cevallos.
Eminent Domain Why do we have it and how has it changed over the years?
Embedded system security
Task Two – Suggested Structure By Catherine McSherry.
Law day 2017 May 1.
Cybersecurity, competence and preparedness
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Event Security Guard And Training
Chapter 3: IRS and FTC Data Security Rules
Data Security Team 1.
Ethical questions on the use of big data in official statistics
Business Law Ethics in Our Law.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
I UNDERSTAND CONCEPTS OF CYBERSECURITY
What is a Constitution?.
WikiLeaks avoids shutdown as supporters go on the offensive
What is a Constitution?.
WELCOME AOI Tech Solutions Get Instant Tech Help & Support.
Is this respect. What does this tell me about you
WELCOME AOI Tech Solutions - Network Security.
Developing Your Decision Making Skills
Good Social Health Conflict Resolution.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Chapter 1 Key Security Terms.
What is a Constitution?.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Presentation transcript:

The Threat of Cyber War The Issue of Cyber Security

A large California water system was tested and deemed to be very vulnerable with holes in security. US officials report that China has already laced the US power grid and other systems with malware ready to be activated. Government lacks authority to secure these networks. Most of the responsibility of security relies on the independent industries in charge of their own systems. Ethical issues include government interference to privately owned industries in exchange for safety.

1. Should government interfere with privately owned businesses in exchange for security? 2. The government and possibly some of the public would like to sacrifice these liberties for national security. The other portion of the public may believe in liberties for the businesses, especially the owners of the business themselves. 3. a) The government may do whatever it takes to have appropriate safety measures for the companies at any time. – Best case would be that there is never any infringement on national security. – Worse case would be the government oversteps their authority and manipulates the companies for their own benefit using security as a probable cause. b) The government has no authority to apply safety protocols Best case would be the companies themselves apply appropriate safety measures themselves and avoid cases of cyber war. Worse case would be the companies leave themselves vulnerable to attacks from the net due to costs of applying security protocols. c) The two parties compromise and set a balance of security protocols. Possibly with government monitoring through periodic checks and tests. Best case would be the companies comply with these standards and it is enough that it is secure enough to malicious attacks. Worst case would be the protocols would be too weak since the two parties must compromise, causing a large risk for cyber attacks. I would choose C since it is most likely appropriate enough with a much better best case and less hazardous worst case. 4. Yes, everybody would be willing since it is very relativistic that it would fit many situations. It may go towards the ends more than the means but it still protects civil liberties fair enough.

5. It is a very realist grounding of the situation. It is unlikely for one of the two parties to completely yield. So it is balanced. 6. Yes, there would be majority agreement since it is a compromise. It may not cause the greatest good since there are so many hypothetical's that could happen. 7. Yes, the solution I chose is personally committed towards my own conscience. I feel like this situation may affect me later in the future. 8. Realism definitely takes precedence here. I feel that a solution that is in accord with logistics will be most effective.

ACM Code This solution is conducive to the code since it respects the privacy of the independent company from government breach, mostly. It is also helpful to society to issue security protocols to prevent cyber crimes affecting national security. It is fair in accordance to both sides. A compromise is made, to agreement of both sides.