SlideShare a Scribd company logo
1 of 10
The information
ethics of
surveillence and
security
John Blake
Ethical Approaches
• Utilitarianism
An ethical theory that determines right from
wrong based on the outcomes of actions.
• Deontological Ethics
An ethical theory that judges morality based
on adherence to rules and duties.
• Virtue Ethics
An ethical theory that focuses on character
traits and what it means to live a good life.
• Rights-based Ethics
An ethical theory based on inherent human
rights that all people deserve.
• Social Contract Theory
An ethical theory based on an implicit
agreement within a society to cooperate for
social benefits.
Security Concepts
• Encryption
Encryption encodes data to protect
confidentiality and prevent unauthorized
access
• Firewalls
Firewalls control network traffic and protect
systems from intrusions
• Intrusion Detection Systems
Intrusion detection systems monitor networks
for malicious activity and policy violations
• Secure Socket Layer (SSL)
SSL encrypts communications and
authenticates servers to enable secure
connections
• Two-Factor Authentication
(2FA)
2FA requires an additional verification factor
beyond just a password for secure user
authentication
Surveillance Types
• Closed-Circuit Television
(CCTV)
Video cameras used to monitor people in
public places, search icon
• Data Mining
Analyzing large data sets to identify patterns,
data icon
• Internet Monitoring
Tracking online activities and
communications, worldwide icon
• Wiretapping
Intercepting phone calls and electronic
communications, phone icon
• Facial Recognition
Identifying individuals by facial
characteristics, face icon
Ethical Hacking Techniques
• Penetration Testing
Authorized simulated attacks to evaluate
security of a computer system
• Social Engineering
Manipulating people into sharing confidential
info or performing actions
• Phishing
Fraudulent emails or websites to steal user
data
• Vulnerability Assessment
Systematic examination to identify security
weaknesses
• Red Teaming
Assume an adversarial role to test
effectiveness of defenses
Legal Frameworks and Policies
• General Data Protection
Regulation (GDPR)
European privacy regulation focused on
personal data protection and privacy.
• Computer Fraud and Abuse Act
(CFAA)
US law focused on prosecuting computer
crimes like hacking.
• Federal Information Security
Management Act (FISMA)
US law focused on information security for
government agencies.
• Right to be Forgotten
Allows individuals to request removal of
personal data.
• Consent Decrees
Agreements to stop prohibited acts, often for
privacy violations.
Privacy Concepts
• Anonymity
Protecting identities of users by not linking
data to individuals
• Data Minimization
Collecting least amount of data needed for
specific purpose
• Opt-in vs. Opt-out
Getting explicit consent vs passive
agreement for data collection
• Information Lifecycle
Managing data from collection to deletion
with access controls
• Do Not Track
Allowing users to opt out of data collection by
websites
Stakeholders
• End Users
Individuals who use information systems and
are impacted by security practices
• Security Analysts
Experts who implement security controls and
assess vulnerabilities
• Government Agencies
Oversee regulations and investigate security
incidents
• Ethical Hackers
Test systems for vulnerabilities to improve
security
• Data Brokers
Collect and sell user data often without
consent
Social and Cultural Factors
• Digital Divide
The gap between demographics and regions
that have access to modern information and
communications technology, and those that
don't.
• Surveillance Capitalism
An economic system centered around the
commodification of personal data with the
core purpose of profit-making.
• Privacy Paradox
The disconnect between people's intended
privacy attitudes and their actual privacy
behaviors.
• Security Theater
Security measures that provide the feeling of
improved security without actually improving
security.
• Trust Economy
An economic system where trust facilitates
transactions directly between participants,
without centralized institutions.
Ethical Dilemmas and Scenarios
• Backdoors
Backdoors in software and hardware can
undermine security and privacy.
• Data Breaches
Data breaches leak sensitive user
information, violating privacy.
• Insider Threats
Insiders with access can abuse privileges
and compromise systems.
• Whistleblowing
Whistleblowers expose unethical practices
but may violate laws.
• Dark Web
The dark web enables illegal activities hidden
from surveillance.

More Related Content

Similar to Surveillance and security.pptx

CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
Information Security
Information Security Information Security
Information Security Alok Katiyar
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Future of Information Ethics.pptx
Future of Information Ethics.pptxFuture of Information Ethics.pptx
Future of Information Ethics.pptxjohn6938
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRPrecisely
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 

Similar to Surveillance and security.pptx (20)

CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
Information Security
Information Security Information Security
Information Security
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Information Security
Information SecurityInformation Security
Information Security
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Future of Information Ethics.pptx
Future of Information Ethics.pptxFuture of Information Ethics.pptx
Future of Information Ethics.pptx
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Flash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPRFlash Friday: Data Quality & GDPR
Flash Friday: Data Quality & GDPR
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 

More from john6938

Social Media Ethics.pptx
Social Media Ethics.pptxSocial Media Ethics.pptx
Social Media Ethics.pptxjohn6938
 
Bioethics.pptx
Bioethics.pptxBioethics.pptx
Bioethics.pptxjohn6938
 
Introduction to Expert Systems.pptx
Introduction to Expert Systems.pptxIntroduction to Expert Systems.pptx
Introduction to Expert Systems.pptxjohn6938
 
Starbuck.pptx
Starbuck.pptxStarbuck.pptx
Starbuck.pptxjohn6938
 
Unit 4 Problem breakdown.pptx
Unit 4 Problem breakdown.pptxUnit 4 Problem breakdown.pptx
Unit 4 Problem breakdown.pptxjohn6938
 
Image_recognition.pptx
Image_recognition.pptxImage_recognition.pptx
Image_recognition.pptxjohn6938
 
Algorithms.pptx
Algorithms.pptxAlgorithms.pptx
Algorithms.pptxjohn6938
 
Artificial_intelligence.pptx
Artificial_intelligence.pptxArtificial_intelligence.pptx
Artificial_intelligence.pptxjohn6938
 
Image_generation.pptx
Image_generation.pptxImage_generation.pptx
Image_generation.pptxjohn6938
 
Computer_Graphics.pptx
Computer_Graphics.pptxComputer_Graphics.pptx
Computer_Graphics.pptxjohn6938
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptxjohn6938
 
Gravitational_wave_detection.pptx
Gravitational_wave_detection.pptxGravitational_wave_detection.pptx
Gravitational_wave_detection.pptxjohn6938
 
Embedded_Systems.pptx
Embedded_Systems.pptxEmbedded_Systems.pptx
Embedded_Systems.pptxjohn6938
 
Software_engineering.pptx
Software_engineering.pptxSoftware_engineering.pptx
Software_engineering.pptxjohn6938
 
Quantum_computers.pptx
Quantum_computers.pptxQuantum_computers.pptx
Quantum_computers.pptxjohn6938
 
Sensors_SLAM.pptx
Sensors_SLAM.pptxSensors_SLAM.pptx
Sensors_SLAM.pptxjohn6938
 
Maths.pptx
Maths.pptxMaths.pptx
Maths.pptxjohn6938
 
Recommendation_systems.pptx
Recommendation_systems.pptxRecommendation_systems.pptx
Recommendation_systems.pptxjohn6938
 
Immersive_technologies.pptx
Immersive_technologies.pptxImmersive_technologies.pptx
Immersive_technologies.pptxjohn6938
 

More from john6938 (20)

Social Media Ethics.pptx
Social Media Ethics.pptxSocial Media Ethics.pptx
Social Media Ethics.pptx
 
Bioethics.pptx
Bioethics.pptxBioethics.pptx
Bioethics.pptx
 
Introduction to Expert Systems.pptx
Introduction to Expert Systems.pptxIntroduction to Expert Systems.pptx
Introduction to Expert Systems.pptx
 
Starbuck.pptx
Starbuck.pptxStarbuck.pptx
Starbuck.pptx
 
Unit 4 Problem breakdown.pptx
Unit 4 Problem breakdown.pptxUnit 4 Problem breakdown.pptx
Unit 4 Problem breakdown.pptx
 
Image_recognition.pptx
Image_recognition.pptxImage_recognition.pptx
Image_recognition.pptx
 
Algorithms.pptx
Algorithms.pptxAlgorithms.pptx
Algorithms.pptx
 
Artificial_intelligence.pptx
Artificial_intelligence.pptxArtificial_intelligence.pptx
Artificial_intelligence.pptx
 
Image_generation.pptx
Image_generation.pptxImage_generation.pptx
Image_generation.pptx
 
Computer_Graphics.pptx
Computer_Graphics.pptxComputer_Graphics.pptx
Computer_Graphics.pptx
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
Gravitational_wave_detection.pptx
Gravitational_wave_detection.pptxGravitational_wave_detection.pptx
Gravitational_wave_detection.pptx
 
Embedded_Systems.pptx
Embedded_Systems.pptxEmbedded_Systems.pptx
Embedded_Systems.pptx
 
Software_engineering.pptx
Software_engineering.pptxSoftware_engineering.pptx
Software_engineering.pptx
 
Quantum_computers.pptx
Quantum_computers.pptxQuantum_computers.pptx
Quantum_computers.pptx
 
NLP.pptx
NLP.pptxNLP.pptx
NLP.pptx
 
Sensors_SLAM.pptx
Sensors_SLAM.pptxSensors_SLAM.pptx
Sensors_SLAM.pptx
 
Maths.pptx
Maths.pptxMaths.pptx
Maths.pptx
 
Recommendation_systems.pptx
Recommendation_systems.pptxRecommendation_systems.pptx
Recommendation_systems.pptx
 
Immersive_technologies.pptx
Immersive_technologies.pptxImmersive_technologies.pptx
Immersive_technologies.pptx
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Surveillance and security.pptx

  • 1. The information ethics of surveillence and security John Blake
  • 2. Ethical Approaches • Utilitarianism An ethical theory that determines right from wrong based on the outcomes of actions. • Deontological Ethics An ethical theory that judges morality based on adherence to rules and duties. • Virtue Ethics An ethical theory that focuses on character traits and what it means to live a good life. • Rights-based Ethics An ethical theory based on inherent human rights that all people deserve. • Social Contract Theory An ethical theory based on an implicit agreement within a society to cooperate for social benefits.
  • 3. Security Concepts • Encryption Encryption encodes data to protect confidentiality and prevent unauthorized access • Firewalls Firewalls control network traffic and protect systems from intrusions • Intrusion Detection Systems Intrusion detection systems monitor networks for malicious activity and policy violations • Secure Socket Layer (SSL) SSL encrypts communications and authenticates servers to enable secure connections • Two-Factor Authentication (2FA) 2FA requires an additional verification factor beyond just a password for secure user authentication
  • 4. Surveillance Types • Closed-Circuit Television (CCTV) Video cameras used to monitor people in public places, search icon • Data Mining Analyzing large data sets to identify patterns, data icon • Internet Monitoring Tracking online activities and communications, worldwide icon • Wiretapping Intercepting phone calls and electronic communications, phone icon • Facial Recognition Identifying individuals by facial characteristics, face icon
  • 5. Ethical Hacking Techniques • Penetration Testing Authorized simulated attacks to evaluate security of a computer system • Social Engineering Manipulating people into sharing confidential info or performing actions • Phishing Fraudulent emails or websites to steal user data • Vulnerability Assessment Systematic examination to identify security weaknesses • Red Teaming Assume an adversarial role to test effectiveness of defenses
  • 6. Legal Frameworks and Policies • General Data Protection Regulation (GDPR) European privacy regulation focused on personal data protection and privacy. • Computer Fraud and Abuse Act (CFAA) US law focused on prosecuting computer crimes like hacking. • Federal Information Security Management Act (FISMA) US law focused on information security for government agencies. • Right to be Forgotten Allows individuals to request removal of personal data. • Consent Decrees Agreements to stop prohibited acts, often for privacy violations.
  • 7. Privacy Concepts • Anonymity Protecting identities of users by not linking data to individuals • Data Minimization Collecting least amount of data needed for specific purpose • Opt-in vs. Opt-out Getting explicit consent vs passive agreement for data collection • Information Lifecycle Managing data from collection to deletion with access controls • Do Not Track Allowing users to opt out of data collection by websites
  • 8. Stakeholders • End Users Individuals who use information systems and are impacted by security practices • Security Analysts Experts who implement security controls and assess vulnerabilities • Government Agencies Oversee regulations and investigate security incidents • Ethical Hackers Test systems for vulnerabilities to improve security • Data Brokers Collect and sell user data often without consent
  • 9. Social and Cultural Factors • Digital Divide The gap between demographics and regions that have access to modern information and communications technology, and those that don't. • Surveillance Capitalism An economic system centered around the commodification of personal data with the core purpose of profit-making. • Privacy Paradox The disconnect between people's intended privacy attitudes and their actual privacy behaviors. • Security Theater Security measures that provide the feeling of improved security without actually improving security. • Trust Economy An economic system where trust facilitates transactions directly between participants, without centralized institutions.
  • 10. Ethical Dilemmas and Scenarios • Backdoors Backdoors in software and hardware can undermine security and privacy. • Data Breaches Data breaches leak sensitive user information, violating privacy. • Insider Threats Insiders with access can abuse privileges and compromise systems. • Whistleblowing Whistleblowers expose unethical practices but may violate laws. • Dark Web The dark web enables illegal activities hidden from surveillance.