19.Computer.Security.and.Ethics - Computer Security Ethics...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Computer Security & Ethics With thanks to Dr. Sunny Jeong Lecture 19
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Outline r Ethical issues surrounding information technology r Identify the differences between an ethical ethical computer use policy and an acceptable acceptable computer use policy r Explain many types of computer crime r Explain how to protect privacy while on the web r How to create an information security plan
Background image of page 2
3 Computer Ethics and Security r Computer Ethics (references a, b) s Four Primary Issues of computer Ethics s ETHICS IN THE WORKPLACE r Computer Crime (reference a) s Malicious Programmes s Denial of Service (DoS) Attack s Internet Scams s Information Theft s Cracking r Protection (references b, c, d) s DRM s Firewalls s protection privacy while on the web s information security plan
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Computer Ethics r Ethics Ethics – the principles and standards that guide our behaviour toward other people r Computer ethics can provide standards to computer users when they collect information and produce information r Issues affected by technology advances s Intellectual property s Copyright s Fair use doctrine s Pirated software s Counterfeit software
Background image of page 4
5 4 Primary Issues of Computer Ethics 1. Privacy Privacy : the right to be left alone when you want to be. It concerns the collection and use of data about individuals 2. Accuracy Accuracy : relates to the responsibility of those who collect information to ensure that the information is correct
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 3. Property Property : relates to ownership and rights to the information or software 4. Access Access : relates to the responsibility of those who have data to control and who is able to use that data 4 Primary Issues of Computer Ethics
Background image of page 6
7 Ethics in the Workplace r
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/28/2010 for the course COMPUTER H 2012 taught by Professor Dave during the Spring '10 term at Quebec Abitibi-Temiscamingue.

Page1 / 24

19.Computer.Security.and.Ethics - Computer Security Ethics...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online