Chat with us, powered by LiveChat Principles Of Technology Ethics. 2. Hacking 3. Cyber Terrorism subjects of their own interest, from weekly chapter readings. They are to write an APA style 3 page minimum synthesizing those - Writeedu

Principles Of Technology Ethics. 2. Hacking 3. Cyber Terrorism subjects of their own interest, from weekly chapter readings. They are to write an APA style 3 page minimum synthesizing those

 
Students must choose 3 (1. Principles Of Technology Ethics. 2. Hacking 3. Cyber Terrorism) subjects of their own interest, from weekly chapter readings. They are to write an APA style 3 page minimum synthesizing those subjects. It should have a cover page and references page, too. The summary should also include an applied reaction concept. As an example: How would you apply this information to the work place? Review the chapters to help focus areas of summary. Use this assignment to demonstrate your level of comprehension. 

Security and Ethical Challenges

Chapter
13

McGraw-Hill/Irwin

Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Multimedia Lecture Support Package to Accompany Basic Marketing

Lecture Script 6-*

13-*

Learning Objectives

  • Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
  • Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology.

13-*

Learning Objectives

  • Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology.

13-*

Corporate Social Responsibility Theories

  • Stockholder Theory
  • Managers are agents of the stockholders
  • Only responsible to increase profits without violating the law or fraud
  • Social Contract Theory
  • Responsible to all of society
  • Stakeholder Theory
  • Responsible to anyone affected by company

Stockholder Theory

Managers are agents of the stockholders

Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices

Social Contract Theory

Companies have ethical responsibilities to all members of society, who allow corporations
to exist

Stakeholder Theory

Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders

Stakeholders are all individuals and groups that have a stake in, or claim on, a company

*

13-*

Principles of Technology Ethics

  • Proportionality
  • Good must outweigh the harm or risk
  • Informed Consent
  • Those affected should understand and accept risks
  • Justice
  • Benefits and burdens distributed fairly
  • Minimized Risk
  • Avoid all unnecessary risk

Proportionality

The good achieved by the technology must outweigh the harm or risk; there must be no alternative that achieves the same or comparable benefits with less harm or risk

Informed Consent

Those affected by the technology should understand and accept the risks

Justice

The benefits and burdens of the technology should be distributed fairly.

Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk

Minimized Risk

Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

*

13-*

Hacking

  • Obsessive use of computers
  • Unauthorized access and use of networked computer systems
  • Electronic Breaking and Entering
  • Accessing without stealing nor damaging
  • Cracker (black hat or darkside hacker)
  • Maintains knowledge of vulnerabilities for private advantage
  • Common Hacking Tactics
  • Figure 13.7

Denial of Service

Hammering a website’s equipment with too
many requests for information

Clogging the system, slowing performance,
or crashing the site

Scans

Widespread probes of the Internet to determine types of computers, services, and connections

Looking for weaknesses

Trojan House

A program that, unknown to the user, contains instructions that exploit a known vulnerability
in some software

Back Doors

A hidden point of entry to be used in case the original entry point is detected or blocked

Malicious Applets

Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords

War Dialing

Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection

Logic Bombs

An instruction in a computer program that triggers a malicious act

Buffer Overflow

Crashing or gaining control of a computer by sending too much data to buffer memory

Password Crackers

Software that can guess passwords

Social Engineering

Gaining access to computer systems by talking unsuspecting company employees out of
valuable information, such as passwords

Dumpster Diving

Sifting through a company’s garbage to find information to help break into their computers

*

13-*

Cyber Theft

  • Most involve theft of money
  • “Inside jobs”
  • Unauthorized activity
  • Attacks through the Internet
  • Most companies don’t report

Most involve theft of money

The majority are “inside jobs” that involve unauthorized network entry and alternation of computer databases to cover the tracks of the employees involved

Many attacks occur through the Internet

Most companies don’t reveal that they have been targets or victims of cybercrime

*

13-*

Cyberterrorism

  • Use IT to attack electronic infrastructure, exchange information or make threats
  • Terror related
  • More political motivation than criminal
  • Examples
  • Attempt to disrupt life support at Antarctic research station
  • Release of untreated sewage in Australia
  • Shut down of government network and banks in Estonia
  • Non-deliberate shut down of systems at nuclear reactor

The National Conference of State Legislatures (NCSL) puts a much finer point

on the definition of the term:

the use of information technology by terrorist groups and individuals to further their

agenda. This can include use of information technology to organize and execute attacks

against networks, computer systems and telecommunications infrastructures, or for

exchanging information or making threats electronically.

*

13-*

Software Piracy

  • Unauthorized copying of computer programs
  • Licensing
  • Purchase – payment for fair use
  • Site license – allows a certain number of copies
  • Shareware – allows copies
  • Public Domain – not copyrighted
  • Software industry losses
  • ⅓ to ½ of revenues
  • Millions of copies in educational market
  • 90% pirated software in China
  • Sales negligible

Software Piracy

Unauthorized copying of computer programs

Licensing

Purchasing software is really a payment for a license for fair use

Site license allows a certain number of copies

A third of the software industry’s revenues are lost to piracy

Software companies are reluctant to pursue the educational market due to concerns that

several copies of purchased software may lead to millions of copies of illegal software,

produced “in the name of educating children.”

*

13-*

Theft of Intellectual Property

  • Intellectual Property
  • Copyrighted material
  • Music, videos, images, articles, books, software
  • Copyright Infringement is Illegal
  • Easy to trade pirated intellectual property
  • Publishers Offer Inexpensive Online Music
  • Illegal downloading is declining

Intellectual Property

Copyrighted material

Music, videos, images, articles, books, software

Copyright Infringement is Illegal

Peer-to-peer networking techniques have made it easy to trade pirated intellectual property

Publishers Offer Inexpensive Online Music

Illegal downloading of music and video is down and continues to drop

*

13-*

Adware and Spyware

  • Adware
  • Useful software allows ads without consent
  • Spyware
  • Type of Adware
  • Can steal private information
  • Add advertising links to Web pages
  • Redirect affiliate payments
  • Change a users home page and search settings
  • Make modem call premium-rate numbers
  • Leave security holes that let Trojans in
  • Degrade system performance
  • Removal often not completely successful

Adware

Software that purports to serve a useful purpose, and often does

Allows advertisers to display pop-up and banner ads without the consent of the computer users

Spyware

Adware that uses an Internet connection in the background, without the user’s permission
or knowledge

Captures information about the user and sends it over the Internet

*

13-*

Computer Libel and Censorship

  • The opposite side of the privacy debate…
  • Freedom of information, speech, and press
  • Biggest battlegrounds
  • Bulletin boards
  • Email boxes
  • Online files of Internet and public networks
  • Weapons used in this battle
  • Spamming
  • Flame mail
  • Libel laws
  • Censorship

Spamming

Indiscriminate sending of unsolicited email messages to many Internet users

Flaming

Sending extremely critical, derogatory, and often vulgar email messages or newsgroup posting to other users on the Internet or online services

Especially prevalent on special-interest newsgroups

*

13-*

Health Issues

  • Cumulative Trauma Disorders (CTDs)
  • Disorders caused by fast-paced repetitive keystroke jobs
  • Carpal Tunnel Syndrome
  • Painful, crippling ailment of the hand and wrist
  • Typically requires surgery to cure
  • Ergonomics
  • Designing healthy work environments

Cumulative Trauma Disorders (CTDs)

Disorders suffered by people who sit at a PC or terminal and do fast-paced repetitive keystroke jobs

Carpal Tunnel Syndrome

Painful, crippling ailment of the hand and wrist

Typically requires surgery to cure

Ergonomics

Designing healthy work environments

Safe, comfortable, and pleasant for people
to work in

Increases employee morale and productivity

Also called human factors engineering

*

13-*

Societal Solutions

  • Use IT to solve human and social problems
  • Medical diagnosis
  • Computer-assisted instruction (CAI)
  • Computer based training (CBT)
  • Governmental program planning
  • Environmental quality control
  • Law enforcement
  • Job placement
  • Detrimental effects
  • Actions without ethical responsibility

13-*

Denial of Service Attacks

  • Depend on three layers of networked computer systems
  • The victim’s website
  • The victim’s Internet service provider
  • Zombie or slave computers commandeered by cybercriminals
  • Defense
  • At Zombie Machines
  • Set and enforce security policies
  • Scan for vulnerabilities
  • At the ISP
  • Monitor and block traffic spikes
  • At the Victim’s Website
  • Create backup servers and network connections

Denial of service attacks depend on three layers of networked computer systems

The victim’s website

The victim’s Internet service provider

Zombie or slave computers that have been commandeered by the cybercriminals

Defense

At Zombie Machines

Set and enforce security policies

Scan for vulnerabilities

At the ISP

Monitor and block traffic spikes

At the Victim’s Website

Create backup servers and network connections

*

,

Security and Ethical Challenges

Chapter
13

McGraw-Hill/Irwin

Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Multimedia Lecture Support Package to Accompany Basic Marketing

Lecture Script 6-*

13-*

Learning Objectives

  • Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
  • Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology.

13-*

Learning Objectives

  • Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology.

13-*

Corporate Social Responsibility Theories

  • Stockholder Theory
  • Managers are agents of the stockholders
  • Only responsible to increase profits without violating the law or fraud
  • Social Contract Theory
  • Responsible to all of society
  • Stakeholder Theory
  • Responsible to anyone affected by company

Stockholder Theory

Managers are agents of the stockholders

Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices

Social Contract Theory

Companies have ethical responsibilities to all members of society, who allow corporations
to exist

Stakeholder Theory

Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders

Stakeholders are all individuals and groups that have a stake in, or claim on, a company

*

13-*

Principles of Technology Ethics

  • Proportionality
  • Good must outweigh the harm or risk
  • Informed Consent
  • Those affected should understand and accept risks
  • Justice
  • Benefits and burdens distributed fairly
  • Minimized Risk
  • Avoid all unnecessary risk

Proportionality

The good achieved by the technology must outweigh the harm or risk; there must be no alternative that achieves the same or comparable benefits with less harm or risk

Informed Consent

Those affected by the technology should understand and accept the risks

Justice

The benefits and burdens of the technology should be distributed fairly.

Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk

Minimized Risk

Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

*

13-*

Hacking

  • Obsessive use of computers
  • Unauthorized access and use of networked computer systems
  • Electronic Breaking and Entering
  • Accessing without stealing nor damaging
  • Cracker (black hat or darkside hacker)
  • Maintains knowledge of vulnerabilities for private advantage
  • Common Hacking Tactics
  • Figure 13.7

Denial of Service

Hammering a website’s equipment with too
many requests for information

Clogging the system, slowing performance,
or crashing the site

Scans

Widespread probes of the Internet to determine types of computers, services, and connections

Looking for weaknesses

Trojan House

A program that, unknown to the user, contains instructions that exploit a known vulnerability
in some software

Back Doors

A hidden point of entry to be used in case the original entry point is detected or blocked

Malicious Applets

Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords

War Dialing

Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection

Logic Bombs

An instruction in a computer program that triggers a malicious act

Buffer Overflow

Crashing or gaining control of a computer by sending too much data to buffer memory

Password Crackers

Software that can guess passwords

Social Engineering

Gaining access to computer systems by talking unsuspecting company employees out of
valuable information, such as passwords

Dumpster Diving

Sifting through a company’s garbage to find information to help break into their computers

*

13-*

Cyber Theft

  • Most involve theft of money
  • “Inside jobs”
  • Unauthorized activity
  • Attacks through the Internet
  • Most companies don’t report

Most involve theft of money

The majority are “inside jobs&#x201D

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now