0% found this document useful (0 votes)
42 views2 pages

SocProfIssues Prelims

This document discusses ethics, culture, and professional issues related to cybersecurity. It defines ethics as external moral standards that guide human behavior, in contrast to individual morals or societal beliefs. Unethical cyber behaviors like spamming can spread viruses and overwhelm email servers. To address these issues, organizations should foster an ethical culture with transparency, accountability, and protections for reporting unethical conduct. Individuals should also educate themselves on cybersecurity best practices like using spam filters and strong passwords.

Uploaded by

Ryu Villota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views2 pages

SocProfIssues Prelims

This document discusses ethics, culture, and professional issues related to cybersecurity. It defines ethics as external moral standards that guide human behavior, in contrast to individual morals or societal beliefs. Unethical cyber behaviors like spamming can spread viruses and overwhelm email servers. To address these issues, organizations should foster an ethical culture with transparency, accountability, and protections for reporting unethical conduct. Individuals should also educate themselves on cybersecurity best practices like using spam filters and strong passwords.

Uploaded by

Ryu Villota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

Why we need ETHICS & Leading example – consistently adhering


CULTURE? high ethical standards in their own actions and 3. Social & Professional Issues (SPAM)
decisions.
Ethics – external standards Fostering Trust – build trust among their Spamming – use of electronic messaging
- Branch of philosophy deals with teams by being transparent, honest, and open systems to send unsolicited messages(spam)
moral principles, values, standards in their communication. - Can spread computer viruses, trojan
- Guides human behavior and decision Encouraging Ethical Behavior – actively horses, malicious software.
making. promote and reward ethical behavior among Social Issues:
- What is wrong, right, good, bad. their employees. Email Spam – unsolicited emails promoting
Supporting Growth and Development – products, services or scams.
Moral- individual or societal beliefs, values, provide opportunities for employees to Social Media Spam – create fake profile, post
and judgments. develop their ethical decision-making skills irrelevant or offensive content.
- accepted from an authority. and offer guidance in navigating dilemmas. Comment spam – blogs, forum, social media,
- Usually cultural or religious Creating a Safe Environment – employees spammers may post irrelevant comments with
- Influenced by culture or society. feel comfortable reporting unethical behavior links to their websites.
- Personal principles without fear of retaliation. Messenger Spam – receive spam messages
Policy – provides framework to act response Ethical Decision-Making – involve through messaging apps.
to a various situation. employees in ethical decision-making
processes and seek input from various Professional Issues:
Law – separate matter from ethics perspectives. Business Email Spam – Orgs face email
- Formal rules established by a Promoting Social Responsibility – prioritizespam that can overwhelm their emails servers
legislative body. not only organizational success but also and pose security risks if phishing attempts are
- Legally binding and enforce by the consider the impact of their decision on successful.
state. society and the environment. LinkedIn Spam – receive connection requests
- Designed to regulate and govern and messages from spammers trying to
aspects of society. Negative Ethical Leadership: who engage in promote products or services.
unethical behavior or create an environment Job Recruitment Spam – job seekers may
Culture – mixture of norms, standards, and that tolerates unethical conduct. receive unsolicited job offers that turn out to
expectations for member of a community. Unethical Behavior – engage in dishonest, be scams or irrelevant to their qualifications.
manipulation, favoritism or other unethical
Cooperation – essential to function practices set a poor example for their teams.
Lack of Accountability – avoid taking
effectively and address a wide range of Ways to Address Spam:
responsibility for their actions or blame others for
challenges. their mistakes. - Use spam filters
Toxic Culture – contribute to toxic work - Report spam
Standards and Values are an integral part of environment: distrust, fear, and lack of - Don’t respond
culture. “Culture is a bedrock” supporting collaboration. - Adjust privacy settings
every development. Inconsistent Standards – different standards for - Use disposable email addresses
themselves and their employees, creating a sens of - Educate yourself and others
Shareholder Oriented Business – ethical injustice. - Install antivirus and anti-malware
debate revolves around whether a business’ Ignoring Concerns – dismiss or ignore concerns software
raised by employees about ethical issues.
responsibility is to maximize profits for Short-term Focus – prioritizes short-term gains or
- Use captchas and verification
shareholders, and the stakeholders. personal benefits over long-term health and - Implement email authentication
sustainability of the org. protocols
Social Responsible – Ethical practices: high
ethical standards in all aspects of their 2. Vulnerability Disclosure 4. EMAIL SCAMS
operations NDA (Non-disclosure Agreement) – legal Email Scam – is unsolicited emals that claims
- Prioritize honesty, integrity, and contracts to protect sensitive info, the prospect of a bargain or something for
transparency. confidential, disclosed to unauthorized parties. nothing.
Employee Well-being – prioritize the well- - Form of email fraud.
being of their employee by offering fair Vulnerability Non – Disclosure
wages, providing safe and healthy working  Sign non-disclosure agreement. If received scam email:
conditions.  - Do not click links
Non will report vulnerability details outside.
 Motivation – keep system away from intruders
- Do not reply
till the fixes are done.
Customer Satisfaction – focus on delivering - If clicked the link, do not put any info
Black hat – individuals or groups who engage
high quality products and services that meets - Do not open any attachments
in unethical, illegal, or malicious activities
customer’s needs and expectations.
within the context of technology and
5. HACKING
cybersecurity.
Evaluate Ethics of an Organization
Formal Ethics – opinions or perceptions Hacking – Is the practice of modifying the
Understand Legal and Ethical Boundaries –
officially written and share among employers. features of a system, in order to accomplish a
familiarize to laws, regulations regards
goal outside of the creator’s original purpose.
cybersecurity.
Informal Ethics – body of information is not
 Obtain permission
written down or poorly documented. Hacker – engaging hacking activities,
 Document findings
 Contact the owner
hacking lifestyle and philosophy of their
Ethical Leadership – Positive or Negative  Use secure communication channels choice.
ethical leadership.  Be patient and respectful
 Offer assistance Computer Hacking – most popular form of
Formal Code of Ethics – to provide clear  Avoid unauthorized access. hacking nowadays.
guidance on how individuals associated with
the organization should act in various Patch Development – detecting or fixing how hacking can impact social and
situations. product vulnerabilities. professional settings:
SOCIAL ISSUES:
Positive Ethical Leadership: leaders who Responsible disclosure – allow customers of Privacy breaches – exposure of personal and
consistently exhibit ethical behavior: a vendor product ample time to protect their private information.
system from exploitation and attack.
Social media hacking - unauthorized access Detection and Removal – Antivirus software
to soc med accs, theft of personal data, spread and security scans are typically effective at
Original Data – start with the information u
false information. detecting and removing viruses. want to protect.
Email and Messaging account hacks – send Encryption – using special algorithm, u
fraudulent messages, phishing emails, or Trojan Horse – aka Trojan, malicious jumble up the data into a secret code. This
spam. software (malware) that disguises itself as a code looks like a random mess to anyone hu
Online Harassment – target individuals for legitimate program or file to deceive users and doesn’t have key.
harassment, impersonations, or the gain unauthorized access to their computer Key – to read the encrypted data, seceret
dissemination of personal info. systems. decoder ring that can unscramble code.
Characteristics: Encrypted data - Now, you have your data
PROFESSIONAL ISSUES: Deceptive appearance – name by story of all scrambled up, and only someone with the
Data breaches – compromising sensitive Greek Myth, soldiers hid inside wooden. key can unscramble it back into its original
business ino, intellectual property, customer Non-Self-Replicating – no ability to spread form.
data. their own, must be downloaded or executed by Decryption – the person who has the key can
Corporate Espionage – Competing user. use it to decrypt the data, turning back into the
businesses or foreign entities may hack into a Unauthorized Access – may perform various original, readable info.
company’s system. malicious actions.
Ransomware attack – deploy ransomware to Distribution Mehods – phising email,
encrypt an organizations data, demanding a malicious downloads, fake sofwatre updates, Back-up keys – additional copies of
ransom for its release. infected files share on networks. encryption keys used to access encrypted data.
Financial Fraud – hacking can be used to Protection and Prevention – u should VPN Encryption – securing your internet
gain unauthorized access to financial systems, exercise caution when downloading files, keep connection by encrypting the data that travels
steal funds, engage in fraudulent activities. OS updated, use anti-virus, regularly backup between ur device and a VPN server.
important data.
Ways to address hacking: Sending Unencrypted Document –
- Strong passwords 7. CONFLICT OF INTEREST transmitting a file or message in its original,
- Regulate software updates Sources: unprotected form.
- Employee training o Financial
- Network security o Professional Victim of Industrial Espionage Ethics –
- Incident response plans o Personal unethical and often illegal practices, such as
- Reporting o Prejudicial stealing confidential information for financial
- Legal action or competitive gain.
- Security audits Avoid Conflicts:
- Data backup 1. Self Awareness: Law Enforcement & Viewing Irrelevant
Spoofing – cyberattacks to deceive or  Recognize your Biases Data - Law enforcement agencies must follow
manipulate systems, networks, or individuals  Reflect on Motivations strict legal and ethical guidelines when
by falsifying information. The purpose is to conducting investigations. Viewing irrelevant
 Emotional Regulation
gain unauthorized access, trick users, hide data that is not related to a specific
2. Ethical Decision-Making:
identity. investigation may be considered a breach of
 Follow Ethical Guidelines
o Email spoofing privacy and could raise legal and ethical
 Seek Objectivity concerns.
o IP Address spoofing
 Consult Trusted Colleagues
o Caller ID spoofing
3. Transparency and Disclosure: Selling Encryption Tools Globally – a
o Website spoofing
 Full Disclosure legitimate business practice, provided it
 Recusal complies with relevant export and import
4. Effective Communication: regulations.
 Active Listening
 Express Yourself Calmly
5. Establish Boundaries:
 Set Clear Boundaries
 Avoid Dual Roles
6. Seek Guidance and Training:
 Training and Education
6. WORMS AND VIRUSES  Consult HR or Ethics Committees
Computer Virus – malware program that
replicates inserting copies of itself into other 8.PREVENTION
computer programs. Encryption – the most effective way to
achieve data security.
Worms – standalone malware computer - To read encrypted file, u must have to
program that replicates itself in order to spread access to a secret key password that
to other computers. enables you to decrypt it.
Viruses: Plain Text – unencrypted data
Propagation Method – attached to legitimate Cipher text – refers to encrypted data.
programs or files, rely on user action to
spread.
Host Dependency – require a host file or
program to attach themselves to.
Propagation Speed – often spread more
slowly than worms because their transmission
relies on user interactions or sharing of
infected files.
Payload – damaging or modifying files,
stealing information, or causing nuisance.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy