Please enable JavaScript.
Coggle requires JavaScript to display documents.
Final project (What are the effects of cyber threats and what can be done…
Final project
-
Cyber Threats
Email
-
-
Malware attachments - Viruses, worms, etc.
Websites
-
Unauthorized Downloading: Downloading Malware Hidden - AdwareKeyloggers - annoying spam, Do you really think you won $1,000,000?
-
Downloads
downloading and/or inadvertently spreading viruses, malware, spyware
-
Downloading lockers, aka a form of Ransomware that locks your data and demands money before releasing. If no payment received, may permanently encrypt, delete, or share your data with all people on the internet. WANNACRY attack is a good example of a locker!
Ethical Theories -
Use to justify the implementation of Cyber Security solutions aka "This theory suggests the reason why you need this is because . . . "
Kantianism PULL FROM ETHICAL IMPLICATIONS/SOLUTIONS AND JUSTIFY WHY TO HAVE SAID SOLUTION USING THIS THEORY!
Rule Utilitarianism PULL FROM ETHICAL IMPLICATIONS/SOLUTIONS AND JUSTIFY WHY TO HAVE SAID SOLUTION USING THIS THEORY!
Act Utilitarianism PULL FROM ETHICAL IMPLICATIONS/SOLUTIONS AND JUSTIFY WHY TO HAVE SAID SOLUTION USING THIS THEORY!
-
Ethical Implications
Of conducting, or being behind cyber attacks/threats:
It is wrong and violates the ethical theories to conduct cyber attacks and create cyber threats like malware.
You are violating one's right to their own data and privacy, by stealing. Stealing is wrong no matter the attempted justification. LAWS EXIST FOR A REASON!
-