Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1.

Similar presentations


Presentation on theme: "Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1."— Presentation transcript:

1 Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1

2 Learning objectives 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 2

3 Wikipedia Freedom of speech Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 3

4 Ethical frameworks Natural law and rights Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 4

5 Ethics and the law Ethical principles Political pressures Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 5

6 Ethical issues and ICT New elements Free speech Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 6

7 Information ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 7

8 Intellectual property and plagiarism Intellectual property Digital rights management Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 8

9 Elusive What is privacy? Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 9 Privacy (1:2)

10 Privacy (2:2) Convenience Anonymity Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 10

11 Information security Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 11

12 Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 12 Identifying threats

13 Risk assessment Controls Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 13 Assessing vulnerability

14 Processes Policies Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 14 Administrative security controls

15 Technical security controls Authentication strategies Encryption Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 15

16 Security considerations Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 16 Information security and cloud computing

17 Cognitive issues Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 17 Human element (1:2)

18 Human element (2:2) Social engineering Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 18

19 Ethical decision making Sales rep Sixth grader University employee Coworker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 19

20 Summary 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20

21 Retargeting Privacy concerns Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 21 Criteo case

22 Spamhaus case Mission Block list Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 22

23 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 23


Download ppt "Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1."

Similar presentations


Ads by Google