L06 - TEP1281 Ethics and Professional Conduct Session 2,...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia TEP1281 Ethics and Professional Conduct Lecture 6 Security in Cyberspace Session 2, 2011/2012
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Contents 1. Security in the context of cybertechnology 2. Three categories of cybersecurity 3. Ethical aspects of cybersecurity 4. Cyberterrorism 5. Information Warfare 6. Security Countermeasures 7. Is total security in cyberspace a reasonable expectation?
Background image of page 2
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Computer Security • The expression computer security often conjures up notions that are related to: – reliability, availability, safety, integrity, confidentiality,and privacy. • Joseph Kizza (2003) suggests that computer security can be defined in terms of three elements: – confidentiality ; • protecting against unauthorized disclosure of information to third parties. – integrity ; • preventing unauthorized modification of files. 1
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Computer Security – availability. • preventing unauthorized withholding of information from those who need it when they need it. • Peter Neumann (2004) notes that in addition to providing desired confidentiality, integrity, and availability, computer security has a more general purpose in that it: – aims at preventing “misuse, accidents, and malfunctions” with respect to computer systems. • Neumann also notes that computer security can be a “double-edged sword.” – For example, it can be used to protect privacy, but it can also be used to undermine freedom of access for users. 1
Background image of page 4
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Computer Security and Computer Crime • Virtually every violation of security involving cybertechnology is also criminal in nature. • But not every instance of crime in cyberspace necessarily involves a breach or violation of security. • Some computer-related crimes have no direct implications for computer security. • An individual can use a personal computer to: – make unauthorized copies of software programs; – stalk a victim in cyberspace; – distribute child pornography; – engage in illegal gambling activities. 1
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Security as Related to Privacy • Cyber-related issues involving privacy and security often overlap. • Some important distinctions can be drawn.
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 48

L06 - TEP1281 Ethics and Professional Conduct Session 2,...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online