{"id":239,"date":"2024-05-20T23:17:43","date_gmt":"2024-05-20T23:17:43","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=239"},"modified":"2024-06-23T14:01:57","modified_gmt":"2024-06-23T14:01:57","slug":"cyse-494","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/cyse-494\/","title":{"rendered":"Eportfolio Entry #2"},"content":{"rendered":"<p><strong>1. Describe four ethical issues that arise when storing electronic information about individuals.<\/strong><\/p>\n<p><strong>2. Compare cybersecurity risks in the U.S. and another country.<\/strong><\/p>\n<p><span data-contrast=\"auto\">When storing electronic information about individuals, several ethical issues can arise:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\"> **Privacy Concerns**: One of the primary ethical issues is the invasion of privacy. Collecting and storing personal data without consent or proper security measures can lead to privacy breaches and unauthorized access to sensitive information.<\/span><\/li>\n<\/ol>\n<ol start=\"2\">\n<li><span data-contrast=\"auto\"> **Data Security**: Ensuring the security of stored electronic information is crucial. Failing to implement adequate security measures can result in data breaches, exposing individuals to identity theft, financial fraud, and other risks.<\/span><\/li>\n<\/ol>\n<ol start=\"3\">\n<li><span data-contrast=\"auto\"> **Data Accuracy and Integrity**: Maintaining the accuracy and integrity of stored data is essential. Ethical concerns arise when inaccurate or outdated information is stored, leading to potential harm or discrimination against individuals based on incorrect data.<\/span><\/li>\n<\/ol>\n<ol start=\"4\">\n<li><span data-contrast=\"auto\"> **Data Retention and Transparency**: Ethical considerations also include how long data is retained and the transparency of data practices. Individuals should be informed about what data is being stored, for how long, and for what purposes to maintain trust and accountability.<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Regarding cybersecurity risks, comparing the U.S. with another country, such as Nigeria, for example, shows some differences:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><span data-contrast=\"auto\">In the U.S.:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; Cybersecurity awareness and investment are relatively high, with a strong focus on protecting critical infrastructure and sensitive data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; The U.S. faces sophisticated cyber threats from both state-sponsored actors and cybercriminals, leading to a constant need for advanced cybersecurity measures.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><span data-contrast=\"auto\">In Nigeria:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; Cybersecurity awareness and investment may vary, with some sectors facing challenges in implementing robust cybersecurity practices.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; Nigeria, like many developing countries, may be more susceptible to certain cyber threats due to limited resources for cybersecurity infrastructure and training.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><span data-contrast=\"auto\">Both countries experience cybersecurity risks, but the level of awareness, investment, and preparedness can differ, impacting the overall cybersecurity landscape.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Describe four ethical issues that arise when storing electronic information about individuals. 2. Compare cybersecurity risks in the U.S. and another country. When storing electronic information about individuals, several ethical issues can arise:\u00a0 **Privacy Concerns**: One of the primary ethical issues is the invasion of privacy. Collecting and storing personal data without consent or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/cyse-494\/\">Read More<\/a><\/div>\n","protected":false},"author":24192,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/pages\/239"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/users\/24192"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/pages\/239\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/pages\/239\/revisions\/304"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200t-summer\/wp-json\/wp\/v2\/media?parent=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}