Download presentation
Presentation is loading. Please wait.
1
Intro & Ethics Cyber Security
2
Scenario 1 A student has a homework assignment that requires research on the internet. Currently, they do not have access to internet at their house. The student’s neighbor does not have a password for their wifi so they use their neighbor’s internet.
3
Scenario 1 What would you do? Did the people involve act ethically?
Who was harmed in this interaction, who is the victim?
4
Scenario 2 A friend of mine told me about a new musician I might like.
I checked to see if their music was available streaming but it was not. I went to a file sharing site and downloaded their most recent album without paying. As it turns out, I really like the artist and have since purchased other albums and attended a concert.
5
Scenario 2 What would you do? Did the people involve act ethically?
Who was harmed in this interaction, who is the victim?
6
Scenario 3 In my Cyber Security class, we learned about breaking into a MasterLock lock. I wanted to show my friends how easy it was. I opened their locker and showed them all of their stuff I was able to remove without them knowing.
7
Scenario 3 What would you do? Did the people involve act ethically?
Who was harmed in this interaction, who is the victim?
8
Scenario 4 The school blocks sites like YouTube for students but not for teachers. My teacher knows that I am doing work for class that requires YouTube. If I ask, they always type in their password so I can access the video. Chrome asked if I wanted to “remember password” after they left, so now I can access YouTube without asking.
9
Scenario 4 What would you do? Did the people involve act ethically?
Who was harmed in this interaction, who is the victim?
10
Scenario 5 I really like Game of Thrones. I don’t want to pay for HBO.
I use a password from a friend to access their subscription to HBO. In turn, I give my friend my password for HULU. Dragons are awesome!
11
Scenario 5 What would you do? Did the people involve act ethically?
Who was harmed in this interaction, who is the victim?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.