{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Lecture30 - Science CSCI 328 Fall 2011 Session 30 Security...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Ethical Issues in Computer  Science   CSCI 328, Fall 2011 Session 30 Security, Knowledge and Freedom of Expression
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Is Security an Intrinsic or Instrumental Value? Different types of security: Computer security: Instrumental or intrinsic? If instrumental, what good is it instrumental to?
Background image of page 2
3 Security is Sociotechnical Hardware and software security tools combine with human behavior. Example: Password protections. Combination of hardware and software requirements. Can be foiled by careless users. Users find work-arounds for convenience. Coshaping: Security systems developed based on who is a threat. Criminals shaped by security systems. Security arms race.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Who is to blame for security breaches? Who is to blame for security breaches? 1. Intruder 2. Those responsible for security 3. Personal computer owner. May cost time and money to protect computer from computers, so is it fair to blame owners? Analogy:
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 10

Lecture30 - Science CSCI 328 Fall 2011 Session 30 Security...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online