Are rules the members of a society create to balance the individual rights to self-determination against the needs of the society as a whole
What are laws
Are considered to be a set of moral principles which outline the standards of right and wrong
Ethical Responsibilities
What is the purpose of cybersecurity laws?
designed to protect individuals, organizations, and nations from cyber threats such as hacking, data breaches, and identity theft.
Sara uploads and shares content on a peer-to-peer file sharing site. What is this?
Online Piracy
Bob Thomas write the virus "Creeper", what is this considered?
The First Computer Virus (1970s)
What is the significance of the Computer Fraud and Abuse Act?
Prohibits accessing a computer without authorization or in excess of authorization
What are some Unethical Practices in Information Technology
− inappropriate computer use
− defamation
− privacy invasion
− cyberbullying
True or False - All unethical behavior is illegal.
False
A group of people send email attachments containing hidden malware. They also disguise the emails to make them appear to originate from trusted sender. What is this?
Phishing
Greg Chuang of Boeing stole $2 billion worth of aerospace documents and leaked them to China. WHat Case study is this?
Largest Insider Attack (1976)
What is intellectual property?
defined as “property (as an idea, invention or process) that derives from the work of mind or intellect”
the act of damaging or attacking the reputation of someone or something in a malicious or false way
Defamation
What refers to the legal contract between a software developer and the user of the software?
End User License Agreement (EULA)
An internet service provider wants to protect itself from liability for copyright infringement by its users. What law is this?
Digital Millennium Copyright Act
In 2013 Yahoo incurred a breach by a group of hackers which jeopardized the accounts of three billion users.
Largest Data Breach (2013-2014)
What does GDPR stand for?
GDPR stands for the General Data Protection Regulation
the intrusion into the personal life of another individual without just cause
Privacy Invasion
On what levels do governments have the authority to create laws?
Local, National, International
Alex is trying to download some copyrighted contents from the internet. Which of the following types of contents requires permission from the copyright owner? A. Private wedding photos, B. News reporting, C. Research papers, D. Teaching materials
Private wedding photos
WannaCry virus was the first ____?
Ransom Worm
What are the consequences of violating privacy laws?
heavy fines, legal action, reputational damage, loss of customer trust, and in some cases, imprisonment
Name a 10 Commandments of Computer Ethics
not use a computer to harm other people, not interfere with other people’s computer work, not snoop around in other people’s computer files, not use a computer to steal, not use a computer to bear false witness, not copy or use proprietary software for which you have not paid, not use other people’s computer resources without authorization or proper compensation, not appropriate other people’s intellectual output
Tomas wants to steal credit card numbers from others to acquire financial gain. He seeks to compromise bank systems to get the information. What is this considered?
Hacking
What are the penalties for cybercrime?
Penalties for cybercrime can include fines, imprisonment, and civil damages.
Equifax failed to patch a vulnerability in their system and it caused the data to be compromised for an estimated 143 million Americans.
Largest Credit Card Attack (2017)