1 / 18

Advanced Networks and Computer Security

Advanced Networks and Computer Security. Dr. Udo Pooch Texas A&M University. Computer Ethics & Security. Lesson Objectives Understand definition of ethics Compare online vs real life ethics Identify key principles for our ethics Discuss example applications of ethics.

leyna
Télécharger la présentation

Advanced Networks and Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Advanced Networks and Computer Security Dr. Udo Pooch Texas A&M University

  2. Computer Ethics & Security • Lesson Objectives • Understand definition of ethics • Compare online vs real life ethics • Identify key principles for our ethics • Discuss example applications of ethics

  3. Understand definition of ethics

  4. What is ethics? • A set of principles of right conduct • A theory or a system of moral values • The study of the general nature of morals and of the specific moral choices to be made by a person; moral philosophy. • The rules or standards governing the conduct of a person or the members of a profession

  5. Computer Ethics Examples • CPSR • http://www.cpsr.org/program/ethics/cei.html • ACM • http://www.acm.org/constitution/code.html • IEEE • http://www.ieee.org/about/whatis/code.html

  6. Example: Computer Ethics Institute • Thou shalt not use a computer to harm other people. • Thou shalt not interfere with other people's computer work. • Thou shalt not snoop around in other people's computer files. • Thou shalt not use a computer to steal. • Thou shalt not use a computer to bear false witness. • Thou shalt not copy or use proprietary software for which you have not paid. • Thou shalt not use other people's computer resources without authorization or proper compensation. • Thou shalt not appropriate other people's intellectual output. • Thou shalt think about the social consequences of the program you are writing or the system you are designing. • Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.

  7. Other Computer Ethics • Gnu • 2600

  8. Compare online vs real life ethics

  9. Real Life vs Cyberspace • Some people think ethical systems are separate. • “Information is free.” • Browsing Systems Files • Napster, anonymous FTP, Web access • Use of remote systems. • No harm, no foul.

  10. Identify key principles for our ethics

  11. Our Ethical Principles • Explicit agreement is required. • The default answer is “No”. • Violations are punished harshly.

  12. Permission • ‘Can’ vs ‘May’

  13. Discuss example applications of ethics

  14. Discussion I • System Administrator, worried about disk space, publishes lists of everyone’s picture files.

  15. Discussion II • Individual runs ‘Crack’ on password files from another site.

  16. Discussion III • User looks for home directories with permission bits set for ‘Other’ access.

  17. Discussion IV • Student runs scanning tools on department or ISP.

  18. References • Information Warfare and Security, Denning • The Cyberthief and the Samurai, Goodell • Halting the Hacker, Pipkin • Netlaw: Your Rights in the Online World, Rose

More Related