Cybersecurity and Ethical Considerations

Iniziamo. È gratuito!
o registrati con il tuo indirizzo email
Cybersecurity and Ethical Considerations da Mind Map: Cybersecurity and Ethical Considerations

1. Case Study 2 : ATM Heist by Latin American Gangs (2014)

1.1. Overview

1.1.1. Over RM 3 million stolen from multiple ATMs using malware by Latin American gangs

1.2. Ethical Issues

1.2.1. Cybercrime

1.2.1.1. the growing threat of international cybercrime

1.2.2. Security Measure

1.2.2.1. The effectiveness of current security measures in financial institutions.

1.3. Ethical Principles

1.3.1. Deontology

1.3.1.1. Financial organisations have an obligation to protect consumer assets

1.3.2. Virtue Ethics

1.3.2.1. The integrity and ethical responsibility of bank executives to prevent and respond to cybercrime

1.4. Challenge and Ethical Dilemmas

1.4.1. Attribution

1.4.2. Transparency and Trust

1.5. Key Concepts

1.5.1. Risk Management

1.5.1.1. Making ethical decisions while assessing risks and implementing strong security measures

2. Case Study 3 : Apple vs. FBI (2016)

2.1. Overview

2.1.1. The FBI requested Apple's assistance to unlock an iPhone used by a terrorist but Apple refused

2.2. Ethical Issues

2.2.1. Security

2.2.1.1. Create a backdoor for government access encrypted data

2.2.2. Corporate Responsibility

2.2.2.1. The role of tech companies in protecting user data

2.3. Ethical Principles

2.3.1. Transperancy

2.3.1.1. Being open about data protection practices and policies

2.3.2. Integrity

2.3.2.1. Fair and equal protection of data for all users, without discrimination or bias

2.4. Challenge and Ethical Dilemmas

2.4.1. Privacy

2.4.1.1. Balancing individual privacy and national security needs

2.4.2. Public Trust

2.4.2.1. Maintaining user trust while cooperating with law enforcement

2.5. Key Concepts

2.5.1. Technological Autonomy

2.5.1.1. The capability of tech companies to maintain control over their security measures without government interference

3. Case Study 1 : MyKad Data Breach (2018)

3.1. Overview

3.1.1. Millions of Malaysians' sensitive personal information was reportedly stolen and sold on the dark web.

3.2. Ethical Issues

3.2.1. Data Privacy

3.2.1.1. The breach disclosed sensitive personal information

3.2.2. Transparency

3.2.2.1. Concerns about the transparency of how the incident was handled and communicated to the public.

3.3. Ethical Principles

3.3.1. Rights-Based Ethics

3.3.1.1. The breach violated individuals' rights to privacy

3.3.2. Accountability

3.3.2.1. need for clear accountability and responsibility for protecting personal data.

3.4. Challenge and Ethical Dilemmas

3.4.1. Balancing Security and Privacy

3.4.2. Transparency and Trust

3.5. Key Concepts

3.5.1. Confidentiality, Integrity, Availability (CIA Triad)

3.5.1.1. Ensure that the core principles of cybersecurity are respected