Download presentation
Presentation is loading. Please wait.
Published byWalter Glenn Modified over 9 years ago
1
Cyber Crime
2
Statistics The 2000 Computer Security Institute/FBI Computer Crime and Security Survey Ninety percent of the study's 585 respondents reported computer security breaches within the last twelve months Financial losses for the 273 organizations that could quantify them adds up to $265,586,240 http://www.cybercitizenship.org/ethics/whitepaper.html
3
Computer Usage by Children 5 to 17 year olds have extensive access to computers Among households with computer access 60% of children ages 3-5 years are actively accessing the computer 84% of ages 6-11 use the computer 89% of ages 12-17 http://www.cybercitizenship.org/ethics/whitepaper.html
4
What Can We Do Have a security policy Conduct risk management Do vulnerability assessment Use strong cryptographic algorithms Perform penetration testing Conduct regular audits Use proven security protocols Develop legislation Practice self-regulation Perform mass education
5
Proven Security Protocols Authentication Something you know Something you have Something you are Access Control
6
Ten Commandments of Computer Ethics 1.Thou shalt not use a computer to harm other people. 2.Thou shalt not interfere with other people's computer work. 3.Thou shalt not snoop around in other people's files. 4.Thou shalt not use a computer to steal. 5.Thou shalt not use a computer to bear false witness. 6.Thou shalt not use or copy software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization. 8.Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you write. 10.Thou shalt use a computer in ways that show consideration and respect. http://www.cybercitizenship.org/ethics/whitepaper.html
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.