Legal Responsibilities
Ethical Responsibilities
Cybersecurity Laws
Scenerios
Case Studies
100

Are rules the members of a society create to balance the individual rights to self-determination against the needs of the society as a whole

What are laws

100

Are considered to be a set of moral principles which outline the standards of right and wrong

Ethical Responsibilities

100

What is the purpose of cybersecurity laws?

designed to protect individuals, organizations, and nations from cyber threats such as hacking, data breaches, and identity theft.

100

Sara uploads and shares content on a peer-to-peer file sharing site. What is this?

Online Piracy

100

Bob Thomas write the virus  "Creeper", what is this considered?

The First Computer Virus (1970s)

200

What is the significance of the Computer Fraud and Abuse Act?

Prohibits accessing a computer without authorization or in excess of authorization

200

What are some Unethical Practices in Information Technology 

− inappropriate computer use 

− defamation 

− privacy invasion 

− cyberbullying

200

True or False - All unethical behavior is illegal.

False

200

 A group of people send email attachments containing hidden malware. They also disguise the emails to make them appear to originate from trusted sender. What is this?

Phishing

200

Greg Chuang of Boeing stole $2 billion worth of aerospace documents and leaked them to China. WHat Case study is this?

Largest Insider Attack (1976)

300

What is intellectual property?

defined as “property (as an idea, invention or process) that derives from the work of mind or intellect”

300

the act of damaging or attacking the reputation of someone or something in a malicious or false way

Defamation

300

What refers to the legal contract between a software developer and the user of the software?

End User License Agreement (EULA)

300

An internet service provider wants to protect itself from liability for copyright infringement by its users. What law is this?

Digital Millennium Copyright Act

300

In 2013 Yahoo incurred a breach by a group of hackers which jeopardized the accounts of three billion users.

Largest Data Breach (2013-2014)

400

What does GDPR stand for?

GDPR stands for the General Data Protection Regulation

400

the intrusion into the personal life of another individual without just cause

Privacy Invasion

400

On what levels do governments have the authority to create laws?

Local, National, International

400

Alex is trying to download some copyrighted contents from the internet. Which of the following types of contents requires permission from the copyright owner? A. Private wedding photos, B. News reporting, C. Research papers, D. Teaching materials

Private wedding photos

400

WannaCry virus was the first ____?

Ransom Worm

500

What are the consequences of violating privacy laws?

heavy fines, legal action, reputational damage, loss of customer trust, and in some cases, imprisonment

500

Name a 10 Commandments of Computer Ethics 

not use a computer to harm other people, not interfere with other people’s computer work, not snoop around in other people’s computer files, not use a computer to steal, not use a computer to bear false witness, not copy or use proprietary software for which you have not paid, not use other people’s computer resources without authorization or proper compensation, not appropriate other people’s intellectual output

500

Tomas wants to steal credit card numbers from others to acquire financial gain. He seeks to compromise bank systems to get the information. What is this considered? 

Hacking

500

What are the penalties for cybercrime?

Penalties for cybercrime can include fines, imprisonment, and civil damages.

500

Equifax failed to patch a vulnerability in their system and it caused the data to be compromised for an estimated 143 million Americans.

Largest Credit Card Attack (2017)

M
e
n
u