CS405 & CS406 REVIEWER
CS405 & CS406 REVIEWER
WHAT IS INFORMATION?
WHAT IS SECURITY?
It is a state of being secure and free from danger or harm, the actions taken to
make someone or something secure.
INFORMATION SECURITY?
The protection of information and its critical elements including systems and
hardware that is use and transmit information.
1. Operations
2. Physical Infrastructure
3. People
4. Functions
5. Communications
6. Information
1. Availability
Enables authorized users’ people or computer systems to access
information without interference or obstruction and to receive it in the
required format.
2. Accuracy
Information has an accuracy when it is free from mistakes or errors and
has the value that the end user expects. If information has been
intentionally or unintentionally modified, it is no longer accurate.
3. Authenticity
Authenticity of information is the quality or state of being genuine or
original, rather than a reproduction or fabrication. Information is
authentic when it is in the same state in which it was created, placed,
stored or transferred.
4. Confidentiality
Information has confidentiality when it is protected from disclosure or
exposure to unauthorized individuals or systems.
5. Integrity
Information has integrity when it is whole, complete and uncorrupted.
6. Utility
The utility of information is the quality or state of having value for
some purpose or end. In other words, infrastructure has a value when
it can serve a purpose.
7. Possession
The possession of information is the quality or state of ownership or
control.
Information System (IS) is the entire set of people, procedures and technology that
enables business to use information.
1. Software
2. Hardware
3. Data
4. People
5. Procedures
6. Networks
COMPUTER SECURITY
Confidentiality
Confidentiality ensures that sensitive information is only accessible to
authorized individuals or systems. It prevents unauthorized disclosure of
information, safeguarding privacy and secrecy.
KEY PRACTICES:
o ENCRYPTION: transforming data into unreadable formats to prevent
unauthorized access.
o ACCESS CONTROL: Implementing policies to restrict access to data
based on user roles and permissions.
o MULTI-FACTOR AUTHENTICATION (MFA): Adding an extra layer of
security by requiring multiple verification steps.
REAL-WORLD EXAMPLES:
Integrity
Integrity ensures that data is accurate, and consistent, and cannot be
altered or tampered with without detection. It prevents unauthorized
modification, ensuring that data remains trustworthy.
KEY PRACTICES:
o CHECKSUMS: Verifying data integrity by comparing hash values.
o DIGITAL SIGNATURES: Ensuring authenticity and integrity of
electronic communications.
o SECURE HASH ALGORITHMS (E.G., SHA-256): Preventing
unauthorized data modification.
REAL-WORLD EXAMPLE:
REAL-WORLD EXAMPLES:
1. Software Solutions:
2. Hardware Solutions:
6. Compliance Solutions:
EXTENT OF RESPONSIBILITIES
These are individuals within the organization who become dissatisfied and may
misuse their insider access intentionally to harm the organization.
These are the employees or contract workers who feel undervalued, mistreated, or
wronged by their employer and may become a security risk. Their insider access to
sensitive systems, data, and infrastructure gives them the ability to cause
significant harm, whether out of revenge, frustration, or financial gain. These
individuals may act alone or collaborate with external parties, such as competitors,
or cybercriminals, to exploit organizational weakness.
Examples of Threats
Preventive Measures
Examples of Threats
Preventive Measures
Cyber Criminal
Examples of Threats
Preventive Measures
Competitors
Examples of Threats
Preventive Measures
Hackers
Hackers are individuals with advanced technical skills who breach systems for
various motivations, such as personal gain, activism, or curiosity.
Examples of Threats
Preventive Measures
Government
These threats come from State-sponsored entities that may engage in cyber
operations for intelligence gathering, sabotage, or warfare.
Examples of Threats
CS 406
INTRODUCTION TO ETHICS
Ethics is the philosophical study of moral phenomena. Also called moral
philosophy, it investigates normative questions about what people ought to do or
which behavior is morally right.
Ethics is the rational reflection on what is right, what is wrong, what is just, what is
good, & what is bad in terms of human behavior.
ORIGIN OF ETHICS
The word Ethics is derived from Latin word “Ethicus” & the Greek word
“Ethikos”
Ethics are an arrangement of decent principles & branch of attitude which
defines what is good for individuals & society.
There are many well known figures in the history of ethics, Greek
philosophers Plato & Aristotle, modern influences include people as Immanuel
Kant, Jeremy Bentham, John Stuart Mill, D.W. Ross, C.L. Stevenson, Alasdair
Maclntyre & John Rawls
EVOLUTION OF ETHICS
MODELS OF ETHIS
Façade
o in its metaphorical sense referring to a person and his/her actions –
irrevocably carries negative ethical value: it is associated with
superficiality, sham, pretense, deception, and hypocrisy.
o Examples:
A façade is the front of a building , or a kind of a front people put
up emotionally. If you’re mad but acting happy, you’re putting
up a façade. This word has to do with the outer layer of
something.
Walk their Talk
o When an individual or organization follows through on their wors and
belief by taking actions that align with their stated values and goals. It
means demonstrating consistency between what they say and what
they actually do.
o Examples:
Someone who acts very tough and talks very tough, if an actual
tough situation comes up and they are able to deal with it you
could say that they “walk the talk” but if they can’t, you would
say they are “all talk”.
Opportunist
o The practice of taking advantage of circumstances – with little regard
for principles or with what the consequences are for others.
Opportunist actions are expedient actions guided primarily by self-
interested motives.
o Examples:
He was portrayed as a ruthless opportunist who exploited the
publicity at every opportunity, using situation to get power or an
advantage. The burglary was probably carried out by an
opportunist thief who notices the door was open.
Salt f of the Earth
o The idiom salt of the earth refers to a person or a group of people who
are honest, hardworking, and reliable. “Salt of the Earth” originates
from the Bible, specifically the Sermon on the Mount. Jesus tells the
people, “You are the salt of the earth” referring to the high value
placed on salt.
o Examples:
“David is the salt of the earth. He’s always the first to help when
someone is in trouble”.
TYPES OF ETHICS
META-ETHICS
o Meta-ethics is the branch of ethics that seeks to understand the nature
of ethical properties, statement, attitudes, and judgements.
o A meta-ethical question is abstract and relates to a wide range of more
specific practical questions.
o Examples:
“Abortion is morally wrong”
“Going to war is never morally justified”
NORMATIVE – ETHICS
o Normative ethics is focused on exploring what actions are morally
correct or incorrect and how one ought to conduct themselves in
various situations.
o Definition
According to Bishai (2021), normative ethics “… is the branch of
philosophical ethics that investigates the set of questions that
arise when considering how one ought to, morally speaking” (p.
155).
o Types
Virtue ethics : places emphasis on character and values
Deontology: Emphasizes the importance of following moral
rules
Consequentialism: emphasizes the importance of the
consequences of an action
o Examples:
“simple judgment of liking or pleasurable”.
APPLIED ETHICS
o The application of ethics to real-world problems. Practical ethics
attempts to answer the question of how people should act in specific
situations.
o Examples:
Sex before marriage.
Gay/Lesbian marriage
Death Penalty
DESCRIPTIVE ETHICS
o A form of empirical research into the attitudes of individuals or groups
of people. In other words, this is the division of philosophical or general
ethics that involves the observation of the moral decision – making
process with the goal of describing the phenomenon.
o Examples:
Descriptive ethics are judgements about the “rightness” of
“wrongness” of things in terms of people’s opinions. Some
examples of descriptive ethics include : “68% of respondents
said they disapprove of the administration”.
“This movie has a pretty bad rating on Rotten Tomatoes”
a field of study that examines how societal problems, like discrimination, inequality,
and privacy concerns, intersect with professional conduct, requiring individuals in
various fields to consider the ethical implications of their actions within a broader
social context.
1. Economic Issues
Poverty and unemployment
Income inequality
Homelessness
2. Political and Human Rights Issues
Corruption
Discrimination (race, gender, religion, etc.)
Violation of human rights
3. Health and Education Issues
Lack of access to healthcare
Mental health stigma
Education disparity
4. Environmental Issues
Climate change
Pollution
Deforestation
5. Social and Cultural Issues
Gender inequality
Crime and violence
Substance abuse