190 likes | 409 Views
Advanced Networks and Computer Security. Dr. Udo Pooch Texas A&M University. Computer Ethics & Security. Lesson Objectives Understand definition of ethics Compare online vs real life ethics Identify key principles for our ethics Discuss example applications of ethics.
E N D
Advanced Networks and Computer Security Dr. Udo Pooch Texas A&M University
Computer Ethics & Security • Lesson Objectives • Understand definition of ethics • Compare online vs real life ethics • Identify key principles for our ethics • Discuss example applications of ethics
What is ethics? • A set of principles of right conduct • A theory or a system of moral values • The study of the general nature of morals and of the specific moral choices to be made by a person; moral philosophy. • The rules or standards governing the conduct of a person or the members of a profession
Computer Ethics Examples • CPSR • http://www.cpsr.org/program/ethics/cei.html • ACM • http://www.acm.org/constitution/code.html • IEEE • http://www.ieee.org/about/whatis/code.html
Example: Computer Ethics Institute • Thou shalt not use a computer to harm other people. • Thou shalt not interfere with other people's computer work. • Thou shalt not snoop around in other people's computer files. • Thou shalt not use a computer to steal. • Thou shalt not use a computer to bear false witness. • Thou shalt not copy or use proprietary software for which you have not paid. • Thou shalt not use other people's computer resources without authorization or proper compensation. • Thou shalt not appropriate other people's intellectual output. • Thou shalt think about the social consequences of the program you are writing or the system you are designing. • Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.
Other Computer Ethics • Gnu • 2600
Real Life vs Cyberspace • Some people think ethical systems are separate. • “Information is free.” • Browsing Systems Files • Napster, anonymous FTP, Web access • Use of remote systems. • No harm, no foul.
Our Ethical Principles • Explicit agreement is required. • The default answer is “No”. • Violations are punished harshly.
Permission • ‘Can’ vs ‘May’
Discussion I • System Administrator, worried about disk space, publishes lists of everyone’s picture files.
Discussion II • Individual runs ‘Crack’ on password files from another site.
Discussion III • User looks for home directories with permission bits set for ‘Other’ access.
Discussion IV • Student runs scanning tools on department or ISP.
References • Information Warfare and Security, Denning • The Cyberthief and the Samurai, Goodell • Halting the Hacker, Pipkin • Netlaw: Your Rights in the Online World, Rose