Question 1.
Four ethical issues that arise when storing electronic information about individuals involves Confidentiality, Integrity, Availability, and Privacy:
- Confidentiality is preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information. This basically means we are keeping information secure to only those are allowed to view it by the information owner. Ethical issues arise when companies are unable to keep customer data secure, Internally, an example of this would be developing permissions within a company to limit IT personnel from viewing customer billing information. Externally, an example would be to implement a firewall to keep bad actors out of secure systems.
- Integrity is guarding against improper information modification or destruction. Ensuring that data a user has entered has not been altered or tampered in any way by unauthorized systems or people. Ethical concerns arise when inaccurate data is stored. An insider threat could alter numbers on a financial sheet and cost a company millions of dollars. Companies can safeguard against this by monitoring audit trails and encrypting data.
- Availability means that authorized users have timely and easy access to information services. This involves protecting systems from threats such as malicious code, DDOS attacks, and even physical ones such as damage to the electrical grid or theft. Ethical concerns occur when an attack prevents a system from being available to its consumer and impacts essential services such as gas and electricity.
- When users store data on a site or with a company, they expect that data to be contained and not given to other companies for their use. Ethical issues arise when more data is stored improperly or sold to other companies in turn resulting in identity theft or a violation of the user’s privacy rights.
Ref: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-59.pdf
Question 2.
Cyber security risks exist in every country not just the United States. Usually, unless an attack is state sponsored, bad actors don’t care who or what country they are attacking- they just have a goal of collecting data, stealing money, or disrupting service. In a study conducted by comparitech.com, 75 different countries were reviewed for their cyber security fitness. The least cyber secure countries included Tajikistan, Bangladesh, and China. The types of attacks and risks did vary however, with Tajikistan on the receiving end of the most banking malware attacks, ransomware trojans, and crypto miners coming from outside of their country. While the most secure was Denmark, Sweden, and Ireland. Denmark has been place in the top 10- having zero users attached by mobile ransomware trojans or mobile banking trojans. Where did the U.S fall? The United States fared well, averaging right in the middle between least and most safe.
ref: https:// (www.) comparitech.com/blog/vpn-privacy/cybersecurity-by-country/