Download presentation
Presentation is loading. Please wait.
Published byHarvey Evans Modified over 9 years ago
1
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 1
2
Learning objectives 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 2
3
Wikipedia Freedom of speech Ethical dilemmas Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 3
4
Ethical frameworks Natural law and rights Utilitarianism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 4
5
Ethics and the law Ethical principles Political pressures Legality vs. ethics Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 5
6
Ethical issues and ICT New elements Free speech Decision making Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 6
7
Information ethics Intellectual property rights Hacking Plagiarism Parasitic computing Spam Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 7
8
Intellectual property and plagiarism Intellectual property rights Digital rights management Plagiarism Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 8
9
Privacy (1:2) Elusive What is privacy? Information privacy Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 9
10
Privacy (2:2) Convenience Anonymity Surveillance Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 10
11
Information security Risk management Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 11
12
Identifying threats Malware and botnets Distributed denial of service Phishing Information leakage Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 12
13
Assessing vulnerability Risk assessment Controls Risk matrix Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 13
14
Administrative security controls Processes Policies Incidence response plan Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 14
15
Technical security controls Authentication strategies Encryption Intrusion prevention Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 15
16
Information security and cloud computing Security considerations Standards and best practices Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 16
17
Human element (1:2) Cognitive issues Passwords Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 17
18
Human element (2:2) Social engineering Security awareness Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 18
19
Ethical decision making Sales rep Sixth grader University employee Co-worker CFO Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 19
20
Summary 1.Ethics 2.Challenges 3.Privacy 4.Security 5.Human behavior Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 20
21
Criteo case Retargeting Privacy concerns Transparency Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 21
22
Spamhaus Mission Block list Legal issues Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 22
23
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 - 23
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.