Difference between revisions of "Cybersecurity Ethics in the United States of America"

From SI410
Jump to: navigation, search
Line 2: Line 2:
 
Ethics describes the way people want to best live their lives. With regards to technology, ethics describes the way people use technology to live well. Many people across the world believe that ethics must be included in teaching within technical disciplines. <ref> https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf </ref>
 
Ethics describes the way people want to best live their lives. With regards to technology, ethics describes the way people use technology to live well. Many people across the world believe that ethics must be included in teaching within technical disciplines. <ref> https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf </ref>
  
Cybersecurity refers to defending networks, computer programs, and systems from malicious actors who seek to damage such infrastructure. Malicious actors use cyberattacks in order to steal information or money or can try to damage a victim's reputation. <ref> https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html </ref>
+
Cybersecurity refers to defending networks, computer programs, and systems from malicious actors who seek to damage such infrastructure. Malicious actors use cyberattacks for different reasons, including stealing information or money, or damaging a victim's reputation. <ref> https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html </ref>

Revision as of 01:03, 15 January 2023

Summary

Ethics describes the way people want to best live their lives. With regards to technology, ethics describes the way people use technology to live well. Many people across the world believe that ethics must be included in teaching within technical disciplines. [1]

Cybersecurity refers to defending networks, computer programs, and systems from malicious actors who seek to damage such infrastructure. Malicious actors use cyberattacks for different reasons, including stealing information or money, or damaging a victim's reputation. [2]
  1. https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf
  2. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html