Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1.

Similar presentations


Presentation on theme: "Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1."— Presentation transcript:

1 Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1

2 Learning objectives 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 2

3 Wikipedia Freedom of speech Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 3

4 Ethical frameworks Natural law and rights Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 4

5 Ethics and the law Ethical principles Political pressures Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 5

6 Ethical issues and ICT New elements Free speech Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 6

7 Information ethics Intellectual property rights Hacking Plagiarism Parasitic computing Spam Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 7

8 Intellectual property and plagiarism Intellectual property rights Digital rights management Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 8

9 Privacy (1:2) Elusive What is privacy? Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 9

10 Privacy (2:2) Convenience Anonymity Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 10

11 Information security Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 11

12 Identifying threats Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 12

13 Assessing vulnerability Risk assessment Controls Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 13

14 Administrative security controls Processes Policies Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 14

15 Technical security controls Authentication strategies Encryption Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 15

16 Information security and cloud computing Security considerations Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 16

17 Human element (1:2) Cognitive issues Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 17

18 Human element (2:2) Social engineering Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 18

19 Ethical decision making Sales rep Sixth grader University employee Co-worker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 19

20 Summary 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20

21 Criteo case Retargeting Privacy concerns Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 21

22 Spamhaus Mission Block list Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 22

23 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 23


Download ppt "Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1."

Similar presentations


Ads by Google