Download presentation
Presentation is loading. Please wait.
1
SECURITY CYBER CRIME AND ABUSE
2
SECURITY Protecting ICT systems from intruders is a central focus of security. The reliability of ICT systems is critical to information societies. Reliability is broader than security; reliable computing depends both on security and well-designed IT. Bugs and other kind of flaws in the production of hardware and the programming of software can be dangerous and undermine the functions of the ICT systems of which they are part.
3
Computer security is an instrumental value
Computer security is an instrumental value. Security is instrumental to whatever good is aimed at the particular ICT system. Computer security in transportation systems is instrumental to safe and reliable transportation; the security of financial systems is instrumental to the protection of financial resources and the accuracy of accounting; and the security of personal computers is instrumental to personal privacy. So, security is a means to a wide variety of goods and is targeted to protect ICT systems from intruders, and the disruption they can cause.
4
Security is achieved sociotechnically
Security is achieved sociotechnically. A good deal of effort is put into developing hardware and software techniques for achieving security, but these tools and techniques work in conjuction with policies and practices that regulate human behavior. Example: The use of passwords to protect against intruders. Security has to be implemented sociotechnically to achieve its goal. It is achieved through a combination of social and technical means, and any missteps in either arena make the system more vulnerable.
5
Intruders develop devices and techniques that assist them in breaking in; security experts figure out and deploy techniques to prevent the use of these devices. In a race of this kind, combatants are compelled to invest time, money, effort, and attention to defeat the other side. When security is breached, questions of blame and accountability are raised. Although the intruder is obviously at fault, attention may also turn to those who were responsible for security.
6
The security is a matter of protecting and achieving an order
The security is a matter of protecting and achieving an order. The most controversial ethical issue in security has to do with trade-offs. The value of security comes into conflict with the value of privacy. The challenge and importance of finding a balance cannot be overstated.
7
Thus, achieving adequate security involves balancing the good at which it aims against other social values and individual rights. Security shouldn’t trump any and every other value. On the other hand, security is critical to the smooth and reliable functioning of information societies. Computer security is an instrumental value. Although no simple or absolute rule can be provided to achieve the optimal balance between security and other values, any serious ethical analysis of security must include consideration of the values at which it aims (i.e., what it seeks to secure) and other values (especially privacy). When these values are articulated and taken into account, better trade-offs can be made.
8
CYBER CRIME and ABUSE There are some similitaries and differences with conventional crime. Cyber Crime: Computers are a tool or the target. The reasons might be: - inquisitiveness to explore - to prove themselves - organized / professional hackers - uncontented employee - psychological/ disorders, problems
9
To whom/ against: persons organizations institutions society at large
10
Crime and Abuse Types: Theft of information Theft of money Theft of identity Internet time theft Harassment bombing Cyber stalking/ harrassment Pornography Salami attacks/ Small undetected attack Trojan attacks/ files installed as useful item Data diddling/ false data entry Web-jacking Logic bombs/ set of instructions secretly incorporated into a program, runs when some condition become true Defamation Virus, worms/ standalone malware computer program which replicate itself
11
Bibliography: Computer Ethics; Deborah Johnson, Pearson Education Inc., 2009 (4th edtn.) p
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.