This document discusses ethics, culture, and professional issues related to cybersecurity. It defines ethics as external moral standards that guide human behavior, in contrast to individual morals or societal beliefs. Unethical cyber behaviors like spamming can spread viruses and overwhelm email servers. To address these issues, organizations should foster an ethical culture with transparency, accountability, and protections for reporting unethical conduct. Individuals should also educate themselves on cybersecurity best practices like using spam filters and strong passwords.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
42 views2 pages
SocProfIssues Prelims
This document discusses ethics, culture, and professional issues related to cybersecurity. It defines ethics as external moral standards that guide human behavior, in contrast to individual morals or societal beliefs. Unethical cyber behaviors like spamming can spread viruses and overwhelm email servers. To address these issues, organizations should foster an ethical culture with transparency, accountability, and protections for reporting unethical conduct. Individuals should also educate themselves on cybersecurity best practices like using spam filters and strong passwords.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
1.
Why we need ETHICS & Leading example – consistently adhering
CULTURE? high ethical standards in their own actions and 3. Social & Professional Issues (SPAM) decisions. Ethics – external standards Fostering Trust – build trust among their Spamming – use of electronic messaging - Branch of philosophy deals with teams by being transparent, honest, and open systems to send unsolicited messages(spam) moral principles, values, standards in their communication. - Can spread computer viruses, trojan - Guides human behavior and decision Encouraging Ethical Behavior – actively horses, malicious software. making. promote and reward ethical behavior among Social Issues: - What is wrong, right, good, bad. their employees. Email Spam – unsolicited emails promoting Supporting Growth and Development – products, services or scams. Moral- individual or societal beliefs, values, provide opportunities for employees to Social Media Spam – create fake profile, post and judgments. develop their ethical decision-making skills irrelevant or offensive content. - accepted from an authority. and offer guidance in navigating dilemmas. Comment spam – blogs, forum, social media, - Usually cultural or religious Creating a Safe Environment – employees spammers may post irrelevant comments with - Influenced by culture or society. feel comfortable reporting unethical behavior links to their websites. - Personal principles without fear of retaliation. Messenger Spam – receive spam messages Policy – provides framework to act response Ethical Decision-Making – involve through messaging apps. to a various situation. employees in ethical decision-making processes and seek input from various Professional Issues: Law – separate matter from ethics perspectives. Business Email Spam – Orgs face email - Formal rules established by a Promoting Social Responsibility – prioritizespam that can overwhelm their emails servers legislative body. not only organizational success but also and pose security risks if phishing attempts are - Legally binding and enforce by the consider the impact of their decision on successful. state. society and the environment. LinkedIn Spam – receive connection requests - Designed to regulate and govern and messages from spammers trying to aspects of society. Negative Ethical Leadership: who engage in promote products or services. unethical behavior or create an environment Job Recruitment Spam – job seekers may Culture – mixture of norms, standards, and that tolerates unethical conduct. receive unsolicited job offers that turn out to expectations for member of a community. Unethical Behavior – engage in dishonest, be scams or irrelevant to their qualifications. manipulation, favoritism or other unethical Cooperation – essential to function practices set a poor example for their teams. Lack of Accountability – avoid taking effectively and address a wide range of Ways to Address Spam: responsibility for their actions or blame others for challenges. their mistakes. - Use spam filters Toxic Culture – contribute to toxic work - Report spam Standards and Values are an integral part of environment: distrust, fear, and lack of - Don’t respond culture. “Culture is a bedrock” supporting collaboration. - Adjust privacy settings every development. Inconsistent Standards – different standards for - Use disposable email addresses themselves and their employees, creating a sens of - Educate yourself and others Shareholder Oriented Business – ethical injustice. - Install antivirus and anti-malware debate revolves around whether a business’ Ignoring Concerns – dismiss or ignore concerns software raised by employees about ethical issues. responsibility is to maximize profits for Short-term Focus – prioritizes short-term gains or - Use captchas and verification shareholders, and the stakeholders. personal benefits over long-term health and - Implement email authentication sustainability of the org. protocols Social Responsible – Ethical practices: high ethical standards in all aspects of their 2. Vulnerability Disclosure 4. EMAIL SCAMS operations NDA (Non-disclosure Agreement) – legal Email Scam – is unsolicited emals that claims - Prioritize honesty, integrity, and contracts to protect sensitive info, the prospect of a bargain or something for transparency. confidential, disclosed to unauthorized parties. nothing. Employee Well-being – prioritize the well- - Form of email fraud. being of their employee by offering fair Vulnerability Non – Disclosure wages, providing safe and healthy working Sign non-disclosure agreement. If received scam email: conditions. - Do not click links Non will report vulnerability details outside. Motivation – keep system away from intruders - Do not reply till the fixes are done. Customer Satisfaction – focus on delivering - If clicked the link, do not put any info Black hat – individuals or groups who engage high quality products and services that meets - Do not open any attachments in unethical, illegal, or malicious activities customer’s needs and expectations. within the context of technology and 5. HACKING cybersecurity. Evaluate Ethics of an Organization Formal Ethics – opinions or perceptions Hacking – Is the practice of modifying the Understand Legal and Ethical Boundaries – officially written and share among employers. features of a system, in order to accomplish a familiarize to laws, regulations regards goal outside of the creator’s original purpose. cybersecurity. Informal Ethics – body of information is not Obtain permission written down or poorly documented. Hacker – engaging hacking activities, Document findings Contact the owner hacking lifestyle and philosophy of their Ethical Leadership – Positive or Negative Use secure communication channels choice. ethical leadership. Be patient and respectful Offer assistance Computer Hacking – most popular form of Formal Code of Ethics – to provide clear Avoid unauthorized access. hacking nowadays. guidance on how individuals associated with the organization should act in various Patch Development – detecting or fixing how hacking can impact social and situations. product vulnerabilities. professional settings: SOCIAL ISSUES: Positive Ethical Leadership: leaders who Responsible disclosure – allow customers of Privacy breaches – exposure of personal and consistently exhibit ethical behavior: a vendor product ample time to protect their private information. system from exploitation and attack. Social media hacking - unauthorized access Detection and Removal – Antivirus software to soc med accs, theft of personal data, spread and security scans are typically effective at Original Data – start with the information u false information. detecting and removing viruses. want to protect. Email and Messaging account hacks – send Encryption – using special algorithm, u fraudulent messages, phishing emails, or Trojan Horse – aka Trojan, malicious jumble up the data into a secret code. This spam. software (malware) that disguises itself as a code looks like a random mess to anyone hu Online Harassment – target individuals for legitimate program or file to deceive users and doesn’t have key. harassment, impersonations, or the gain unauthorized access to their computer Key – to read the encrypted data, seceret dissemination of personal info. systems. decoder ring that can unscramble code. Characteristics: Encrypted data - Now, you have your data PROFESSIONAL ISSUES: Deceptive appearance – name by story of all scrambled up, and only someone with the Data breaches – compromising sensitive Greek Myth, soldiers hid inside wooden. key can unscramble it back into its original business ino, intellectual property, customer Non-Self-Replicating – no ability to spread form. data. their own, must be downloaded or executed by Decryption – the person who has the key can Corporate Espionage – Competing user. use it to decrypt the data, turning back into the businesses or foreign entities may hack into a Unauthorized Access – may perform various original, readable info. company’s system. malicious actions. Ransomware attack – deploy ransomware to Distribution Mehods – phising email, encrypt an organizations data, demanding a malicious downloads, fake sofwatre updates, Back-up keys – additional copies of ransom for its release. infected files share on networks. encryption keys used to access encrypted data. Financial Fraud – hacking can be used to Protection and Prevention – u should VPN Encryption – securing your internet gain unauthorized access to financial systems, exercise caution when downloading files, keep connection by encrypting the data that travels steal funds, engage in fraudulent activities. OS updated, use anti-virus, regularly backup between ur device and a VPN server. important data. Ways to address hacking: Sending Unencrypted Document – - Strong passwords 7. CONFLICT OF INTEREST transmitting a file or message in its original, - Regulate software updates Sources: unprotected form. - Employee training o Financial - Network security o Professional Victim of Industrial Espionage Ethics – - Incident response plans o Personal unethical and often illegal practices, such as - Reporting o Prejudicial stealing confidential information for financial - Legal action or competitive gain. - Security audits Avoid Conflicts: - Data backup 1. Self Awareness: Law Enforcement & Viewing Irrelevant Spoofing – cyberattacks to deceive or Recognize your Biases Data - Law enforcement agencies must follow manipulate systems, networks, or individuals Reflect on Motivations strict legal and ethical guidelines when by falsifying information. The purpose is to conducting investigations. Viewing irrelevant Emotional Regulation gain unauthorized access, trick users, hide data that is not related to a specific 2. Ethical Decision-Making: identity. investigation may be considered a breach of Follow Ethical Guidelines o Email spoofing privacy and could raise legal and ethical Seek Objectivity concerns. o IP Address spoofing Consult Trusted Colleagues o Caller ID spoofing 3. Transparency and Disclosure: Selling Encryption Tools Globally – a o Website spoofing Full Disclosure legitimate business practice, provided it Recusal complies with relevant export and import 4. Effective Communication: regulations. Active Listening Express Yourself Calmly 5. Establish Boundaries: Set Clear Boundaries Avoid Dual Roles 6. Seek Guidance and Training: Training and Education 6. WORMS AND VIRUSES Consult HR or Ethics Committees Computer Virus – malware program that replicates inserting copies of itself into other 8.PREVENTION computer programs. Encryption – the most effective way to achieve data security. Worms – standalone malware computer - To read encrypted file, u must have to program that replicates itself in order to spread access to a secret key password that to other computers. enables you to decrypt it. Viruses: Plain Text – unencrypted data Propagation Method – attached to legitimate Cipher text – refers to encrypted data. programs or files, rely on user action to spread. Host Dependency – require a host file or program to attach themselves to. Propagation Speed – often spread more slowly than worms because their transmission relies on user interactions or sharing of infected files. Payload – damaging or modifying files, stealing information, or causing nuisance.