GENERAL COMUTER AND ORGANISATIONS ETHICS

TeddyDaka 27 views 13 slides Jul 07, 2024
Slide 1
Slide 1 of 13
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13

About This Presentation

Cyber security


Slide Content

COMPUTER ETHICS Cybersecurity and Cybercrime

Cyber S ecurity Security is the process of maintaining an acceptable level of perceived risk. Confidentiality: Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it: Confidentiality Assurance that information is shared only among authorized persons or organizations. Integrity: Assurance that the information is authentic and complete. Integrity In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle. Features of Security

Cont ……. Availability: Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them. Availability: Availability of information refers to ensuring that authorized parties are able to access the information when needed

Cyber Space Cyberspace is "the environment in which communication over computer networks occurs .” And almost everybody in one way or the other is connected to it Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cyber Crime

What are cybersecurity Ethics? Ethics defines right and wrong actions in specific situations and is fundamental to society. In the cyber realm, ethics serves as a guidepost for cybersecurity professionals. It helps identify the type of online behaviour and conduct that harms individuals and businesses. Ethical principles are what separate cybersecurity professionals from hackers. For example, while the latter tries to steal data, the former tries to protect it. When hackers access data, they use it for nefarious purposes. On the other hand, cybersecurity professionals, who have access to the same data, use their skills to ensure that the data’s safe and secure.

Ethical issues in cybersecurity practices Harm to Privacy Harm to privacy refers to an individual’s privacy becoming compromised. Negative consequences include unauthorized access, identity theft, reputational damage and distress. A cybersecurity professional’s decisions ultimately impact privacy protection. They can safeguard privacy in several ways, including implementing security measures, tools and practices; calling out designs and apps that mislead users into sharing excessive information; ensuring compliance with security frameworks; and mitigating risks.

Cont ….. Harm to Property Harm to property refers to damage to both physical and digital assets. It can lead to unauthorized access and the disruption of services. For a cybersecurity professional, prioritizing network security becomes an ethical matter. They have a responsibility to implement countermeasures, which can include risk assessments, firewalls and continuous monitoring. Failure to do so can lead to property harm caused by a cyber attack.

Cont ….. Cybersecurity Resource Allocation Determining what to invest in cybersecurity activities can be a challenge. Large companies can invest more resources to enhance their cyber defences, improving their chances of detecting anomalies or intrusions. More important, knowing how to allocate resources is essential. Cybersecurity professionals must properly use resources for the greater good of the organization and its stakeholders. Deploying a patch for a critical software vulnerability may be costly and time consuming, but not doing so may risk a data breach that impacts millions of customers.

Cont ….. Transparency and Disclosure Companies should promptly reveal critical vulnerabilities in their software upon learning about them. This level of transparency can not only help cybersecurity professionals collaborate and share information to respond quickly to attacks but also allow customers whose data is threatened to take appropriate action to diminish their own risks. Approaches to transparency and disclosure depend on the organization .

Ethical Challenges Faced by Cybersecurity Professionals Confidentiality Cybersecurity professionals handle sensitive information, from personal customer data to a business’s proprietary information. Disclosing this data can have severe consequences, so cybersecurity professionals must never reveal confidential information, unless a significant public benefit exists for doing so. Threats and Risks Cybersecurity professionals are duty-bound to respond to cyber threats. Remaining vigilant is always a priority, and their response is crucial. While individuals may overlook notifications or leave their computers unattended, cybersecurity experts should never do so .

Cont …… Balancing Security With Business Interests Cybersecurity professionals may encounter unethical practices within a business unit. Reporting the issue to supervisors may be the best first step. In the case of illegal activity, a cybersecurity professional may consider reporting it to authorities or the media.

Cont ….. User Privacy Cybersecurity professionals have to balance security and user privacy. In protecting their organizations from cyber attacks, cybersecurity professionals sometimes have to access employees’ online activities. Without carefully considering user privacy, this can come close to violating a person’s rights.

Promoting Ethical Practices in Cybersecurity Cybersecurity professionals often have unique access to sensitive data. They’re responsible for defending this data against malicious actors. This requires an understanding of ethical practices. However , the cyber realm often blurs the line between security and privacy, making it imperative for professionals to have clear codes of conduct and demonstrate trustworthiness. By staying updated on evolving cybercrimes, enhancing competencies and pursuing advanced education, individuals can develop cybersecurity strategies and strengthen their knowledge of ethical principles.
Tags