1. Describe four ethical issues that arise when storing electronic information about individuals.
2. Compare cybersecurity risks in the U.S. and another country.
When storing electronic information about individuals there are a lot of ethical issues that could arise. Some of which are confidentiality, privacy, freedom, and data ownership. Organizations that store the private information could easily run into these issues because of the advancements in cybersecurity technology. Hackers can get unauthorized access to a system or network and steal individuals private data. This would be a misuse of the individuals private information. It would lead to the organization breaking confidentiality because the attacker can access information like name, address, banking and credit card information, medical records, and a lot of other private data. This also leads into privacy because now the attackers can steal or modify the individuals private data. They could use this to steal their identity or many other horrible things to cause them harm. It breaks the trust between an individual and an organization. Freedom is a big thing in society and storing private information that individuals upload onto their systems is taking away their freedom. People should have the right to decide who can and cannot see or access their personal data but with organizations doing this they take away that right. The ethical issues I talked about are prominent in the U.S. because it is a country built around citizens having the right to things like freedom of speech and privacy. This is not always the case in some other countries. Nevertheless, the U.S. and other countries still have to deal with similar cybersecurity risks. For example, the U.S. and China both deal with malware infections in computer systems. They both also have to deal with a huge amount of Denial of Service Attacks (DDoS) in their country. These attacks focus on disrupting the traffic on a network, system, or server by over-flooding with a huge load of internet traffic. They leave systems vulnerable to attackers to do whatever they want which could be to steal, modify, or destroy data.