Course Description: This course examines ethical issues relevant to computing and information technology, including: privacy; freedom of speech and content control on the Internet; individual and social responsibility; cybersecurity; cybercrimes; social impact of computers and other digital technologies; and ethical obligations of IT professionals. Students will gain a broad understanding of central issues in cyberethics and the ways that …
Category: Uncategorized
Nov 26
CIA Triad – Security Model
Since I was interested in cybersecurity until this day, I always had an assignment on CIA triads. According to the Coursera article, the CIA is a framework or model cybersecurity experts use when auditing, implementing, and improving systems, tools, and programs for organizations. CIA stands for confidentiality, integrity, and availability of those elements that form …
Nov 26
Insider Threat
Last week, our CTO at my work changed the firewall in the server room in the office. For some reason, the server room door was slightly opened. I was going to the kitchen when I saw the door and my vice president in the kitchen. She was exhausted, and she told me, “You are studying …
Nov 25
Jonas’s Perspective on Technology
I recently read “Technology And Responsibility,” by Hans Jonas in 1973. For some reason, I felt Jonas had insight into the future. For instance, Jonas has mentioned a set of ethics that technology must obey. Jonas has mentioned the thesis on the first page: “More specifically, it will be my contention that certain development of …
Nov 06
What makes your Password the strongest
Can you be more creative with the password? When the user creates a password, they think of something personal, which, in my suggestion, is entirely wrong. Personal passwords are often the most vulnerable way for users to use. According to the academic article written by Wash, “Good passwords have two goals that are very difficult …
Oct 11
Cyberbullying Impact on Social Science
Unfortunately, we live in a world where the knowledge we learn is used against each other. Although Cyber Security was started by Bob Thomas in 1971, now we are seeing the outcome of the internet. Woefully, women who are the beauty of this life are experiencing cyberbullying. Why would cybersecurity choose women as victims? According …