Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Ethical issues in computer security
Effects of cyber crime in society
Ethics and behavior in computer security
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Ethical issues in computer security
Computer Security Ethics and Privacy
By Jeff Casmer
Aug 17, 2007
Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can't access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions.
A computer security risk is any action that could cause lost of information, software, data, processing incompatibilities,
…show more content…
One could be the money they can get from selling top secret information, or some may be bitter and want revenge. A script kiddie is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs. A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information. Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice. Business and home users must do their best to protect or safeguard their computers from security …show more content…
Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer program that infects a computer negatively and altering the way the computer operates without the user's consent. Once the virus is in the computer it can spread throughout infecting other files and potentially damaging the operating system itself. It's similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. The similarity is, the best way to avoid is
Why do hackers go through all the trouble to do what they do? Most people in society do not spend the time to break into computer systems. It does not have much appeal to them. Why then do certain people spend so much of their time and energy accomplishing these feats of technological wizardry? What is the cause that turns those mostly above-average intelligent people to pursue a criminal career, and destroy their otherwise very successful careers? Why do they commit these computer related crimes as an obsession?
In taking a wide overview of the computer world today, it is very easy to identify possible security risks. Especially in a connected network of worldwide computers, the limitless stream of bytes and data may invite viruses and hackers into any one single computer. According to PC Magazine Online, “Intel execs say the computer industry is lagging in support of data-security initiatives.”1 The difficulty lies sometimes in predicting areas of security weakness. Sometimes seemingly secure code may be subject to innovative attacks which can compromise security.
To stay safe from many different forms of viruses, the best way to go is to download a couple different kinds of anti-virus programs. Harley says it is almost impossible to get through three different anti-virus programs. He also says that it is easily solved when it comes to Trojans, worms, viruses, and malware. If you do not grant access to unidentified or unsafe programs, then it is very hard for viruses to be granted access onto your computer.
Millions of people all around the world are using Smartphones, like iPhones, which turns out to be crucial part of our lives. We are using them not only for calling but we also store unbelievably huge amount of personal information. We have there all our contacts, calls and messages and all our pictures that we save and keep in the phones. A
...e user while using the software applications. This could be word processor documents, spreadsheets, presentations, web pages or game save files. It is important to keep this data secure, as it could include important information such as customer details, employee payroll data or financial information. There are huge amounts of user data stored by businesses that are absolutely vital to the running of the business.it is therefore extremely important to keep a copy of this data that is currently stored on the system.
Computer viruses can be spread from removable media, from downloads off the internet and from email attachments.
In today’s society technology is used for everything. With the invention of computers and the internet this open doors to the cyber world. Today you can do almost anything without having to leave your home. The internet gives us the opportunity of shopping online, ordering food online, working from home and video chatting with friends and family across the world. Everyone has a computer and internet access in their homes. While the internet is really convenient it also opens doors for cybercrimes, loss of privacy and the need for computer security.
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
For thousands of years cryptography and encryption have been used to secure communication. Military communication has been the leader of the use of cryptography and the advancements. From the start of the internet there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security. The internet allows people to communicate sensitive information, and if received into the wrong hands can cause many problems for that person.
Technology has revolutionized the world. Nowadays, people depend on technology to modify, store, and organize their data and information. Therefore, it is significant that users consider the risks and protect their computers, electronic devices, and data. The data information from online purchase is valuable and important for users. Digital security risk has become a serious problem in the society.It could lead up to a loss of or damage to computer or mobile device. Digital security risks include unauthorized access and use of electronic device, internet and network attacks, hardware theft, software theft, information theft, and system failure. The common examples for digital security risks are intercepting wireless communications, virus attack,
Captivated by a technological revolution, modern society relies heavily on computers for their speed and efficiency. Computers perform a plethora of tasks including connecting individuals through intercommunications, running programs, and completing arithmetic computations. Moreover, they enabled ideas such as a lunar landing to develope into reality. Computers significantly enhance day to day activities, but they do have one major drawback. Computers, like humans, can get sick. A computer virus is very similar to a human virus, in how they infect a computer and multiply. Computer viruses negatively affect computers, and they often hinder a computer’s ability to function. Computer viruses use multiple methods to spread and damage computers and files.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.
Computer security is needed to protect the computer and the data that is stored or accessed in the computer. Computers are used on jobs, in schools, and for research. They also support critical business processes. Computers protect personal and sensitive information for businesses too. The meaning of computer security has changed over the years. In the past people did not have to worry about someone putting a virus on their computer, the only problem they had then was someone taking it from them. There were viruses, but they were used for the mainframe so they would not work, not for personal computers. Even at this time there were not a lot of personal computers in use. A lot of people could not afford them in the past. Then you had people that did not know what computers were and what they did. Now today you cannot find a person that doesn’t know what a computer is for. Today most people have at least one computer of some type in their homes. In the business world people would lock up the computers in the computer room to keep people from messing up the machine. The machines were too big to carry out. The main frames were massive machines that took up a lot of space. You did not have to worry about someone moving them. Today computer sizes are a lot smaller. These computers are portable so they can be carried off but that is not the main problem. The main problem come in to play when you have people stealing data off of your machine while you are on the internet surfing. All users want to prevent theft of their computer and theft to the data that is in their computer. Users do not want anyone to put viruses on their computer or anything that may damage the computer. Some business will only allow strict acce...