BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Monday, October 26, 2009

Lec 10:Legal And Ethical Issue In Computer Security

INTRODUCTION

To know what protection the provides for computer and data to appropriate laws that protect the right of other with respect to computer, program and data, and to understand how existing laws provide a basis for recommending new laws to protect computers, data and computer.

Law is not always the appropriate way to deal with issues of human behavior.

LEGAL AND ETHICAL

  • Law
    • Law is not always the appropriate way to deal with issue of human behavior.
    • Impossible or impractical to develop laws to describe and enforce all form or behavior acceptable to society.
    • Society relies on ethics or morals to prescribe generally accepted standards of proper behavior.
  • Ethics
    • An ethic is an objective defined standard of right and wrong.
    • Ethical standard are often idealistic principles.
    • Each person is responsible for deciding what to do in a specific situation, hence defines a personal set of ethical practies.
DIFFERENCES BETWEEN LAWS AND ETHICS

LAW
  • Formal, documented
  • Interpreted by courts
  • Established by legislature representing everyone
  • Applicable to everyone
  • Priority determined by courts if two laws conflict
  • Enforceable by police and courts
ETHIC
  • Described by unwritten principles
  • Interpreted by individuals
  • Presented by philosophers, religions, professional group
  • Personal choice
  • Priority determined by individual if two principles conflict
ETHIC CONCEPT IN INFORMATION SECURITY
  • ž
    žEthical Differences Across Cultures
  • Software License Infringement
  • Illicit use
  • Misuse of Corporate Resources
  • Ethics and Education
  • žDeterrence
PROTECTING PROGRAM AND DATA
  • Copyright
    • Are designed to protect the expression of idea.
    • Must apply to an original work and it must be in some tangible medium of expression. Example printed, recorded, or mode concrete in some other way.
    • must apply to an original work and it must be in some tangible medium of expression
  • Patents
    • Designed to protect the device pr process for carrying out an idea, not the idea itself.
    • Can valid only for something that is truly novel or unique.
    • The invention to be patented must not been previously patented.
    • Patented object may be marked with a patent number to warn others that the technology is patent.
  • Trade Secret
    • ¡must be kept a secret
    • the owner must protect the secret by any means, such as by storing it in a safe, encrypting it and by making employees sign a statement that they will not disclose the secret
    • trade secret protection can also vanish through reverse engineering
INFORMATION AND THE LAW
  • Information as an object

    • Information is valuable in that it is used in businesses and everyday life. Businesses pay for credit reports and client list. We also want inside information about competitors. Information does not fit other familiar commercial paradigms.

  • Features of information as an object
    • It is not depletable
    • It can be replicated
    • It has a minimal marginal cost
    • It's value if often timely
    • It is often tranferred intangibly
Right of Employees and Employers
  • Ownership of a Patent
  • Ownership of copyright
  • Work for Hire
  • Licenses
  • Trade Secret Protection
  • Employment Contracts
Computer Crimes
A separate category for computer crime is needed because of the following reason:
  • Rules of properties
  • Rules of Evidence
  • Threats to Integrity and Confidentiality
  • Value of Data
  • Acceptance of Computer Terminology
Privacy
Many ethical issue in security seem to be in the domain of individual's right to privacy verses to greater good of a larger entity. Example: tracking employee computer use, crowd surveillance and etc.

There are four ethical issues of information age:
  • Privacy
  • Accuracy
  • Property
  • Accessibility
Control Protecting Privacy
Several controls methods can be used to protect privacy:
  • Authentication
  • Anonymity
  • Computer Voting
  • Pseudonymity
  • Legal Control
Ethical Issues in Computer Security
  • Ethics and Religion
  • Ethics is not universal
  • Ethics Does Not Provide Answers
  • Ethical Reasoning
Examining a Case for Ethical Issue
  • Understand the situation
  • know several theories of ethical reasoning.
  • List the ethical principles involed
  • Determine which principles outweigh others.





0 comments: