Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURITY AND ETHICAL ISSUES - Coggle Diagram
SECURITY AND
ETHICAL ISSUES
HACKERS
Types of Hackers
Grey Hat Hacker
exploit the internet systems only to make public
Blue Hat Hacker
amateur, their techniques are deployed out of ill motives
White Hat Hacker
create algorithms to break existing internet networks so as to
solve the loopholes in them
Red Hat Hacker
find black hat hackers,
intercept and destroy their schemes
Black Hat Hacker
break into computer networks with purely negative motives such as monetary gain or reputation
Green Hat Hacker
the set of individuals who simply want to observe and
learn about the world of hacking
Common types of hacking
Corporate espionage
unsavory spying techniques to obtain privileged
insider information from a business competitor
State-sponsored hacking
The potential rewards from security hacking can be so great,
even governments want to get in on the party
Hacking for financial gain
stealing money, enabling later theft via data hijacking, or selling the acquired data to other cybercriminals
CONFIDENTIALITY
General idea
RSA cryptosystem
Asymmetric-key ciphers
Symmetric-key ciphers
ETHICAL PRINCIPLES
Moral rules
consider if the decision is made in accordance with a universally accepted principle of morality
Utilization
ethical if it results in consequences which are useful for society
Social contract
an act is ethical when a majority of people in society agrees with it
PRIVACY
Why Data Privacy is important?
Involvement of Government
Third-Party Apps
Data breaches on Rise
Right to Privacy
Investing In Privacy Converts Into Higher ROI
It is the responsibility of business to Protect Data
Trust is the key
Non-Disclosure Agreement(confidentiality, non-use or trade secret agreement)
a legally binding contract between parties that requires them to keep certain information confidential
Codes of ethics
Allow individuals to know what data have been collected
Allow individuals to correct the collected data if necessary
Be sure that the collected data are accurate
Be sure that collected data are used only for the original purpose
Collect only data that are needed
Use encryption techniques