lect5_ch06
lect5_ch06
10/2020
1
Overview
Aim s & requirem ents :
Providing students understandings about Cyberethics issuses related to cyber security.
Requirements:
- Reading materials before the lecture
- Attending required
Lecturing form at:
Content:
What is cybersecurity, and how are security issues involving computers and
cybertechnology different from privacy issues in cyberspace?
How are violations involving cybersecurity similar to and different from issues of
cybercrime?
Which key features differentiate data security, system security, and network
security?
What is “cloud computing,” and which kinds of challenges does it pose for
cybersecurity?
What is meant by “hacking” and the “hacker ethic”?
Can a clear distinction be drawn between “hacktivism” and cyberterrorism?
What is the difference between cyberterrorism and information warfare (IW)?
Discussion: Categories of cyber securities
Self-study: Cyber Security tools
Exercise: Your thoughts on the Problem of “De-Perimeterization”.
Reading m aterial: Chapter 6, Textbook
1. SECURITY IN THE CONTEXT
OF CYBERTECHNOLOGY
The expressions computer security and
cybersecurity are often associated with issues
having to do with:
reliability
availability
safety
of computer systems
integrity
confidentiality
protection
of data
Defining Cyber Security
(continued)
Richard Epstein (2007) suggests that security concerns
affecting computers and cybertechnology can be viewed
in terms of three key elements:
confidentiality
integrity
accessibility
Figure 6-1
Data Security
Another sense of “cyber security" is
concerned with vulnerability to unauthorized
access of data.
The data can be either:
(a) resident in one or more disk drives or
databases in a computer system;
(b) transmitted between two or more computer
systems.
We call this “data security.”
Data Security
In particular, data security issues affect the
confidentiality, integrity, and availability of
information.
Spinello (2000) notes that information integrity
requires that:
…proprietary or sensitive information under one's
custodial care is kept confidential and secure, that
information being transmitted is not altered in form or
content and cannot be read by unauthorized parties,
and that all information being disseminated or
otherwise made accessible through Web sites and on-
line data repositories is as accessible and reliable as
possible.
Data Security
Data security is now also threatened by “cloud-computing”
services, as more and more corporations and ordinary
users elect to store their data in “the Cloud.”
Cloud storage devices provide users with one means to
Community Cloud.
Public Cloud.
Hybrid Cloud.