Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.

Slides:



Advertisements
Similar presentations
Business Ethics: Assigned Articles Day 2 discussion.
Advertisements

By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
Chapter 1 An Overview of Ethics
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
BY: WILL READE Cyber and Drone Warfare. Overview Cyber attacks & Drones leave the human out of the battlefield Makes waging war “easier” when the technology.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
U.S. federal judge rejects $125 million legal settlement between Google and groups representing authors and publishers. The settlement would have given.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Ethical Decision Making Process. How to Resolve Ethical Dilemmas in Business Identify relevant facts Identify relevant issue(s) Identify primary stakeholders.
Internet probe can track you down to within 690 meters.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
“Real ID, Real Debate” Alice Lipowicz May 25, 2007 Colin Griffin Article Analysis:
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
SOCIAL RESPONSIBILITY AND ADMINISTRATIVE ETHIS. CONCEPTS OF SOCIAL RESPONSIBILITY  Classic Concept: Idea that the only social responsibility of the administration.
5-1 Ethics To examine the role of ethical behavior in business finance. 2. To illustrate the role of unethical behavior in the downfall of.
Copyright  2010 Pearson Education Canada / J A McLachlan Chapter Nine Making Ethical Decisions.
IIA Fraud Presentation (Press Space Bar to Continue)
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
Making Ethical Decisions and Managing a Socially Responsible Business Chapter 2 *includes other resources.
Corporate Social Responsibility
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
Legal Aid of Cambodia Bangkok, August 2015 Mr. RUN Saray Executiva Director and Lawyer Legal Aid of Cambodia V ICTIM ’ S REMEDIESPresented.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
1 Chapter 3: Ethics and Social Responsibility Copyright Cengage Learning 2013 All Rights Reserved Introduction to Designed & Prepared by Laura Rush B-books,
Copyright ©2009 by Cengage Learning Inc. All rights reserved 1 Prepared by Amit Shah Frostburg State University CHAPTER 3 Designed by Eric Brengle B-books,
Lecture 09 Ethics & Social Responsibility. Social involvement as a business concept? Pre 1900’s business purpose exclusively economic.
history, hardware, software, safety, and computer ethics
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Ethics and Social Responsibility
Ethics.
McGraw-Hill© 2003 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill© 2003 The McGraw-Hill Companies, Inc. All rights reserved Chapter.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
Making Good Choices. What’s the difference between just making a decision and making a good decision?
Evaluation Chapter 9. Chapter Objectives Learn: –How evaluation incorporates into the overall problem solving process. –Ethical considerations for solution.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Aged and Disabled Waiver Conflict-Free Case Management November 1, 2015.
UN vs the Internet Summary
How we make ethical decisions
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
Learning Area 1 Information And Communication Technology and Society
CSCE 390 Professional Issues in Computer Science and Engineering Ch
WikiLeaks avoids shutdown as supporters go on the offensive
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CS-480b Network Security Dick Steflik
Presentation transcript:

Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva

What is it?  The Defense Ministry (of Japan) is in the process of developing a computer virus that tracks, identifies and disable sources of cyber attacks.  Most distinctive feature of the virus is its ability to trace cyber-attack sources.  Identify immediate source AND “springboard” computers used to transmit the virus  Virus can disable attacking program and collect relevant information  But analysts say that it could violate Japanese law that bans virus production

How it works?

Ethical Decision-Making Process  1) Problem is there are cyber attacks going on  2) Stakeholders are the computer owners: companies, businesses, individuals  3) Solution: Cyber weapon mentioned  4) Everyone should be be permitted to use the solution.  5) This solution is natural however, to fight the virus, a virus itself is being developed to stop cybert attacks.  6) There should be a majority agreement that the solution is the most efficient. It is currently being used in the USA and China but not in Japan. And it surely will produce the greatest good for the greatest number of people

Ethical Decision-Making Process (cont.)  7) This solution is the one I personally feel most committed to regardless of whether or not it benefits me personally. The process makes it easier to prosecute the one starting the cyber attacks by tracking them. I choose this solution free from the influence of others.  8) The Philosophy that I feel influences my solution in this case is pragmatism.

ACM Code  This solution applies to first ACM code under General Moral Imperatives: 1.2 Avoid harm to others. “Harm means injury or negative consequences, such as undesirable loss of information, loss of property damage, or unwanted environmental impacts… Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources.”  This cyber weapon virus will help prevent serious problems that attackers can cause.