SlideShare a Scribd company logo
1 of 46
Download to read offline
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
CYBER ETHICS MODULE
0
• Understand what ethics are and why they are
important
• Understand how to act ethically
• Understand the responsibility that comes with
knowing and using cybersecurity principles
• Understand how to apply ethics to real-world
situations
Objectives
1
• Ethics is about right and wrong
• What is right?
• What is wrong?
• How do we know?
2
Introduction
• Promotes a sense of fairness
• Creates a set of rules or acceptable behaviors
• Ethical practices help us identify and what
unacceptable behavior “looks” and “feels” like
3
Why Ethics?
• Standards for right and wrong
‐ What we should do in different situations
‐ Can be both written and unwritten
• Written: company mission statements, school policies on
academic dishonesty
• Unwritten: don’t “cut” in a line, opening doors or holding
elevators for people
4
What is Ethics?
• Laws
• Feelings
• Societal Norms
• Religion
• Philosophy
• Family
5
Sources of Ethics
• Do people make good decisions?
• Do people always make good decisions?
• Do YOU make good decisions?
• Do YOU always make good decisions?
• Does a bad decision mean you’re unethical?
6
Ethical Behavior
• Knowing right from wrong doesn’t
automatically mean we DO the right thing
7
Understanding vs. Behavior
• Courage
‐ See something, say something
‐ Be willing to go against your friends/peers
‐ Stand up to bullies
• Humility
‐ Even you can make a wrong decision
‐ Are you a better than the average driver?
‐ Are you more ethical than the average person?
8
Ethical Behavior Requires
• Does the Internet make it easier or harder to
act ethically?
• Is it easier or harder to do the right thing when
others are watching?
• Is it easier or harder to do the right thing when
it means that you have to choose between
friends?
9
Questions
Do not:
Do not use a computer to harm other people.
Do not interfere with other people's computer
work.
Do not snoop around in other people's
computer files.
Do not use a computer to steal.
Do not use a computer to bear false witness.
Do not copy or use proprietary software for
which you have not paid.
Do not use other people's computer resources
without authorization or proper compensation.
Do not appropriate other people's intellectual
output.
Do:
Do think about the social consequences of the
program you are writing or the system you are
designing.
Do always use a computer in ways that ensure
consideration and respect for your fellow humans.
10
Principles of Cyber Ethics
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
CURRENT EVENT ONE
Terry Childs
11
As told by former San Francisco Mayor Gavin Newsom
to Slate Magazine
• Should Terry Childs have been arrested?
• Which principle(s) of cyber ethics did Terry
Childs violate, if any?
12
Terry Childs
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
CURRENT EVENT TWO
Desmond Hague
13
Former CEO of Centerplate
• Should Mr. Hague have been forced to resign?
14
Desmond Hague
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
CURRENT EVENT THREE
Wesley Autrey
15
Subway Superman
• Could we have done the same thing?
16
Wesley Autrey
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
AFA CYBER ETHICS MODULE
Ethics Activity
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
SCENARIO 1
Hack, No Hack?
18
Emily posted a picture of your friend Jayden on
Instagram. The picture makes it look as if Jayden
is consuming alcohol, but you know that he
wasn’t. Your friend Jayden is very upset and
Emily refuses to take the picture down. Jayden
asks for your help in getting into Emily’s
Instagram account to remove the picture.
What should you do?
Scenario 1: Hack, No Hack?
19
A. You don't want Jayden to get into trouble. So you tell him that
you're only going to help this once. Then you use a tool that you
found on the Internet to help Jayden get into Emily's Instagram
account and remove the picture.
B. You let Jayden know that Instagram allows people to report
images that violate their rules. You help Jayden contact
Instagram to have them remove the picture and you let him
know that it may take a few days to get an answer.
C. You don't want to be a bad friend, so you help Jayden remove
the picture. Then, you change the Emily’s password so she can't
repost the picture. Later, you borrow Emily’s phone and delete
the picture from there too so that this situation will be over.
D. You explain to Jayden that it's his fault for being in the picture in
the first place and Emily shouldn’t have to take down the
picture. You also explain how things can stay on the Internet
forever and that you don't want to be friends with people who
don’t make good decisions.
20
Scenario 1: Hack, No Hack?
Discussion
21
Scenario 1: Hack, No Hack?
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
SCENARIO 2
How do we deal with a bully?
22
You and your friends are playing an online game and
a classmate, Alex, is logging on and breaking the
rules. Alex’s obnoxious behavior is making it very
difficult for you and your friends to enjoy the game.
You have reported him to the game publisher, but he
keeps creating new accounts and harassing you.
You recently found a tool on the Internet that allows
you to remove a person’s computer from the game
temporarily. The website where you found the tool
says that it doesn’t cause any long term damage.
What should you do?
23
Scenario 2: Bullies
A. You should use the tool you found just this once
so you can enjoy your game in peace.
B. You and your friends have paid for this game like
everyone else and you deserve to play it without
being harassed. You should use the tool anytime
Alex comes on and starts harassing you.
C. You look up the standards of conduct and
complaint procedures for the game. You tell your
parents, or another adult, about Alex’s
harassment and ask them to help you report the
behavior appropriately.
D. All the things that Alex is doing to you, you
should do back to him. He should treat people
the way he wants to be treated.
24
Scenario 2: Bullies
Discussion
25
Scenario 2: Bullies
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
SCENARIO 3
Am I still responsible?
26
It is Sophia’s first day as an intern in a computer
security firm, and she and her supervisor,
Christopher, walk by another intern’s computer
workstation. The workstation has not been
locked down and they notice that the browser is
currently opened to the user’s banking website.
Christopher, is a well-respected person in the
firm, but a bit of a practical joker, and decides
play a joke on this person’s unsecured computer.
He logs out of the banking website to protect the
user and then proceeds to change the computer
desktop background to kitten images.
27
Scenario 3: Am I still responsible?
Sophia feels uncomfortable about what
Christopher is doing, and asks if his actions are a
good idea; he states “Nah, it’s not a big deal,
besides it’ll teach him a lesson.” She laughs and
says, “Okay, then we should make the
background My Little Ponies.” Christopher locks
down the station, and he and Sophia step aside
and wait to see what happens.
28
Scenario 3: Am I still responsible?
1. Have Sophia and Chris acted ethically? Why or why
not?
2. The intern returns, unlocks his station, and becomes
visibly upset. He logs back into his banking site and
furiously begins looking at his transaction history.
Sophia notices that he looks upset, approaches the
intern, and apologizes for what happened and
assures him that nothing malicious happened. The
intern is initially irritated but then tells her it is ok.
He was just initially scared and was worried about
someone stealing his banking information. Does the
intern’s acceptance of the joke exculpate Christopher
and Sophia’s actions ethically? Why or why not?
29
Scenario 3: Am I still responsible?
Discussion
30
Scenario 3: Am I still responsible?
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
SCENARIO 4
Good Intentions
Ashley recently took a computer security class
where she learned about Wi-Fi. She learned that
some Wi-Fi passwords can be easily broken.
Ashley, who is excited about what she has
learned in class, shares what she learned with
her aunt. Her aunt states that the store where
she works has Wi-Fi with one of these easily
broken passwords, but doesn’t disclose to Ashley
what that password is.
32
Scenario 4: Good Intentions
Ashley tells her aunt that is a problem but her
aunt tells her that they have very good IT people
who will keep them protected. Ashley really
wants to help the store where her aunt works, so
she breaks the password to prove to her aunt
that the system really is broken.
33
Scenario 4: Good Intentions
1. Has Ashley acted ethically? Why or why not?
2. Assume Ashley did not use the password to
access the Wi-Fi or any other systems
connected to the Wi-Fi. She only showed her
aunt the password to help make the store
more secure. Does this change your answer?
34
Scenario 4: Good Intentions
Discussion
35
Scenario 4: Good Intentions
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
SCENARIO 5
Privileged Information
Jessica has a group project due tomorrow, and
she and her friends have been working hard on
it. Yesterday, her group gave the final copy to
Derek so that he could print it out and turn it
in. Unfortunately, Derek is out sick today and
not answering his phone. The group is at risk of
getting a lower grade if the project is turned in
late. Jessica has seen Derek type in his password
multiple times and knows that she can get into
his email account where their project is stored.
What should she do?
37
Scenario 5: Privileged Information
A. She should use the password just this once to retrieve and print the
assignment so that the group doesn't get a bad grade. It would be
unfair if the group were punished because one person was sick. Derek
certainly wouldn't want them to get a bad grade.
B. She should use the password to get and print the assignment. When
Derek gets back, she should tell him what happened and help him
choose a new password. That way it's not a big deal because she told
him what happened and her friends won't get mad that she didn't use
what she knew to help them get a good grade.
C. She should tell the teacher the situation and ask the teacher to make
an exception just this once and allow the group to turn in the project
late. In the future, she should always make sure that multiple people in
the group have access to the final project to avoid this type of
situation.
D. She should log into Derek's account to get and print the assignment.
Then she should immediately change the password and let Derek know
the new password when he gets back. She should also show him how
to avoid other people learning his password by watching him type it in.
38
Scenario 5: Privileged Information
© Air Force Association
Discussion
39
Scenario 5: Privileged Information
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
Scenario 6
Responsible Actions
Joel is a competitor in the CyberPatriot National
Finals Competition. During the competition you
can overhear a member of another team talking
from across another partition. You’re not
actively trying to hear his conversation, but he is
a little louder than the others, and his voice
projects rather well.
41
Scenario 6: Responsible Actions
You overhear him suggest checking a port
number that you didn’t think about, and it
inspires you to check the same port for
vulnerability. The CyberPatriot Rules Book states
that you should receive no outside assistance
which includes direct and indirect advice.
42
Scenario 6: Responsible Actions
1. Is Joel obligated to report what he has
overheard? Why or why not?
2. What if Joel tells the participant to quiet
down and that he can hear him talking? Does
that exculpate Joel from what he has
overheard?
43
Scenario 6: Responsible Actions
Discussion
44
Scenario 6: Responsible Actions
• Understand what ethics are and why they are
important
• Understand how to act ethically
• Understand the responsibility that comes with
knowing and using cybersecurity principles
• Understand how to apply ethics to real-world
situations
Summary
45

More Related Content

What's hot

Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
History of internet
History of internetHistory of internet
History of internetUsman Sajid
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
World wide web An Introduction
World wide web An IntroductionWorld wide web An Introduction
World wide web An IntroductionSidrah Noor
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 

What's hot (20)

Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Network security
Network securityNetwork security
Network security
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
History of internet
History of internetHistory of internet
History of internet
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
World wide web An Introduction
World wide web An IntroductionWorld wide web An Introduction
World wide web An Introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 

Similar to Cyber Ethics

Social media parent night
Social media parent nightSocial media parent night
Social media parent nightJenny Jongste
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying jun ijan
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptxeditha arao
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awarenessMentorIT
 
For And Against Essay Smoking Should Be Banned In Public Places
For And Against Essay Smoking Should Be Banned In Public PlacesFor And Against Essay Smoking Should Be Banned In Public Places
For And Against Essay Smoking Should Be Banned In Public PlacesTiffany Rodriguez
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@MsCCostello
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipMsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKermit Agbas
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdfDobby12
 
Risky business cybersecurity 1
Risky business cybersecurity 1Risky business cybersecurity 1
Risky business cybersecurity 1Yumonomics
 
Digital drama
Digital dramaDigital drama
Digital dramaktcole
 

Similar to Cyber Ethics (20)

Social media parent night
Social media parent nightSocial media parent night
Social media parent night
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
Digital Citizenship.pptx
Digital Citizenship.pptxDigital Citizenship.pptx
Digital Citizenship.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
 
For And Against Essay Smoking Should Be Banned In Public Places
For And Against Essay Smoking Should Be Banned In Public PlacesFor And Against Essay Smoking Should Be Banned In Public Places
For And Against Essay Smoking Should Be Banned In Public Places
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Question aire hackcing.bullly,
Question aire hackcing.bullly, Question aire hackcing.bullly,
Question aire hackcing.bullly,
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
NetiquetteOaks.pptx
NetiquetteOaks.pptxNetiquetteOaks.pptx
NetiquetteOaks.pptx
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
 
Risky business cybersecurity 1
Risky business cybersecurity 1Risky business cybersecurity 1
Risky business cybersecurity 1
 
Digital drama
Digital dramaDigital drama
Digital drama
 

More from Erdo Deshiant Garnaby

More from Erdo Deshiant Garnaby (16)

Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
Org Design
Org DesignOrg Design
Org Design
 
HOS Talent management presentation
HOS Talent management presentationHOS Talent management presentation
HOS Talent management presentation
 
Talent management
Talent managementTalent management
Talent management
 
Unit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resourcesUnit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resources
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
 
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machinesUnit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safety
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityUnit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
 
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
 

Recently uploaded

Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 

Recently uploaded (20)

Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 

Cyber Ethics

  • 1. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT CYBER ETHICS MODULE 0
  • 2. • Understand what ethics are and why they are important • Understand how to act ethically • Understand the responsibility that comes with knowing and using cybersecurity principles • Understand how to apply ethics to real-world situations Objectives 1
  • 3. • Ethics is about right and wrong • What is right? • What is wrong? • How do we know? 2 Introduction
  • 4. • Promotes a sense of fairness • Creates a set of rules or acceptable behaviors • Ethical practices help us identify and what unacceptable behavior “looks” and “feels” like 3 Why Ethics?
  • 5. • Standards for right and wrong ‐ What we should do in different situations ‐ Can be both written and unwritten • Written: company mission statements, school policies on academic dishonesty • Unwritten: don’t “cut” in a line, opening doors or holding elevators for people 4 What is Ethics?
  • 6. • Laws • Feelings • Societal Norms • Religion • Philosophy • Family 5 Sources of Ethics
  • 7. • Do people make good decisions? • Do people always make good decisions? • Do YOU make good decisions? • Do YOU always make good decisions? • Does a bad decision mean you’re unethical? 6 Ethical Behavior
  • 8. • Knowing right from wrong doesn’t automatically mean we DO the right thing 7 Understanding vs. Behavior
  • 9. • Courage ‐ See something, say something ‐ Be willing to go against your friends/peers ‐ Stand up to bullies • Humility ‐ Even you can make a wrong decision ‐ Are you a better than the average driver? ‐ Are you more ethical than the average person? 8 Ethical Behavior Requires
  • 10. • Does the Internet make it easier or harder to act ethically? • Is it easier or harder to do the right thing when others are watching? • Is it easier or harder to do the right thing when it means that you have to choose between friends? 9 Questions
  • 11. Do not: Do not use a computer to harm other people. Do not interfere with other people's computer work. Do not snoop around in other people's computer files. Do not use a computer to steal. Do not use a computer to bear false witness. Do not copy or use proprietary software for which you have not paid. Do not use other people's computer resources without authorization or proper compensation. Do not appropriate other people's intellectual output. Do: Do think about the social consequences of the program you are writing or the system you are designing. Do always use a computer in ways that ensure consideration and respect for your fellow humans. 10 Principles of Cyber Ethics
  • 12. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT CURRENT EVENT ONE Terry Childs 11 As told by former San Francisco Mayor Gavin Newsom to Slate Magazine
  • 13. • Should Terry Childs have been arrested? • Which principle(s) of cyber ethics did Terry Childs violate, if any? 12 Terry Childs
  • 14. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT CURRENT EVENT TWO Desmond Hague 13 Former CEO of Centerplate
  • 15. • Should Mr. Hague have been forced to resign? 14 Desmond Hague
  • 16. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT CURRENT EVENT THREE Wesley Autrey 15 Subway Superman
  • 17. • Could we have done the same thing? 16 Wesley Autrey
  • 18. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT AFA CYBER ETHICS MODULE Ethics Activity
  • 19. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT SCENARIO 1 Hack, No Hack? 18
  • 20. Emily posted a picture of your friend Jayden on Instagram. The picture makes it look as if Jayden is consuming alcohol, but you know that he wasn’t. Your friend Jayden is very upset and Emily refuses to take the picture down. Jayden asks for your help in getting into Emily’s Instagram account to remove the picture. What should you do? Scenario 1: Hack, No Hack? 19
  • 21. A. You don't want Jayden to get into trouble. So you tell him that you're only going to help this once. Then you use a tool that you found on the Internet to help Jayden get into Emily's Instagram account and remove the picture. B. You let Jayden know that Instagram allows people to report images that violate their rules. You help Jayden contact Instagram to have them remove the picture and you let him know that it may take a few days to get an answer. C. You don't want to be a bad friend, so you help Jayden remove the picture. Then, you change the Emily’s password so she can't repost the picture. Later, you borrow Emily’s phone and delete the picture from there too so that this situation will be over. D. You explain to Jayden that it's his fault for being in the picture in the first place and Emily shouldn’t have to take down the picture. You also explain how things can stay on the Internet forever and that you don't want to be friends with people who don’t make good decisions. 20 Scenario 1: Hack, No Hack?
  • 23. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT SCENARIO 2 How do we deal with a bully? 22
  • 24. You and your friends are playing an online game and a classmate, Alex, is logging on and breaking the rules. Alex’s obnoxious behavior is making it very difficult for you and your friends to enjoy the game. You have reported him to the game publisher, but he keeps creating new accounts and harassing you. You recently found a tool on the Internet that allows you to remove a person’s computer from the game temporarily. The website where you found the tool says that it doesn’t cause any long term damage. What should you do? 23 Scenario 2: Bullies
  • 25. A. You should use the tool you found just this once so you can enjoy your game in peace. B. You and your friends have paid for this game like everyone else and you deserve to play it without being harassed. You should use the tool anytime Alex comes on and starts harassing you. C. You look up the standards of conduct and complaint procedures for the game. You tell your parents, or another adult, about Alex’s harassment and ask them to help you report the behavior appropriately. D. All the things that Alex is doing to you, you should do back to him. He should treat people the way he wants to be treated. 24 Scenario 2: Bullies
  • 27. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT SCENARIO 3 Am I still responsible? 26
  • 28. It is Sophia’s first day as an intern in a computer security firm, and she and her supervisor, Christopher, walk by another intern’s computer workstation. The workstation has not been locked down and they notice that the browser is currently opened to the user’s banking website. Christopher, is a well-respected person in the firm, but a bit of a practical joker, and decides play a joke on this person’s unsecured computer. He logs out of the banking website to protect the user and then proceeds to change the computer desktop background to kitten images. 27 Scenario 3: Am I still responsible?
  • 29. Sophia feels uncomfortable about what Christopher is doing, and asks if his actions are a good idea; he states “Nah, it’s not a big deal, besides it’ll teach him a lesson.” She laughs and says, “Okay, then we should make the background My Little Ponies.” Christopher locks down the station, and he and Sophia step aside and wait to see what happens. 28 Scenario 3: Am I still responsible?
  • 30. 1. Have Sophia and Chris acted ethically? Why or why not? 2. The intern returns, unlocks his station, and becomes visibly upset. He logs back into his banking site and furiously begins looking at his transaction history. Sophia notices that he looks upset, approaches the intern, and apologizes for what happened and assures him that nothing malicious happened. The intern is initially irritated but then tells her it is ok. He was just initially scared and was worried about someone stealing his banking information. Does the intern’s acceptance of the joke exculpate Christopher and Sophia’s actions ethically? Why or why not? 29 Scenario 3: Am I still responsible?
  • 31. Discussion 30 Scenario 3: Am I still responsible?
  • 32. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT SCENARIO 4 Good Intentions
  • 33. Ashley recently took a computer security class where she learned about Wi-Fi. She learned that some Wi-Fi passwords can be easily broken. Ashley, who is excited about what she has learned in class, shares what she learned with her aunt. Her aunt states that the store where she works has Wi-Fi with one of these easily broken passwords, but doesn’t disclose to Ashley what that password is. 32 Scenario 4: Good Intentions
  • 34. Ashley tells her aunt that is a problem but her aunt tells her that they have very good IT people who will keep them protected. Ashley really wants to help the store where her aunt works, so she breaks the password to prove to her aunt that the system really is broken. 33 Scenario 4: Good Intentions
  • 35. 1. Has Ashley acted ethically? Why or why not? 2. Assume Ashley did not use the password to access the Wi-Fi or any other systems connected to the Wi-Fi. She only showed her aunt the password to help make the store more secure. Does this change your answer? 34 Scenario 4: Good Intentions
  • 37. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT SCENARIO 5 Privileged Information
  • 38. Jessica has a group project due tomorrow, and she and her friends have been working hard on it. Yesterday, her group gave the final copy to Derek so that he could print it out and turn it in. Unfortunately, Derek is out sick today and not answering his phone. The group is at risk of getting a lower grade if the project is turned in late. Jessica has seen Derek type in his password multiple times and knows that she can get into his email account where their project is stored. What should she do? 37 Scenario 5: Privileged Information
  • 39. A. She should use the password just this once to retrieve and print the assignment so that the group doesn't get a bad grade. It would be unfair if the group were punished because one person was sick. Derek certainly wouldn't want them to get a bad grade. B. She should use the password to get and print the assignment. When Derek gets back, she should tell him what happened and help him choose a new password. That way it's not a big deal because she told him what happened and her friends won't get mad that she didn't use what she knew to help them get a good grade. C. She should tell the teacher the situation and ask the teacher to make an exception just this once and allow the group to turn in the project late. In the future, she should always make sure that multiple people in the group have access to the final project to avoid this type of situation. D. She should log into Derek's account to get and print the assignment. Then she should immediately change the password and let Derek know the new password when he gets back. She should also show him how to avoid other people learning his password by watching him type it in. 38 Scenario 5: Privileged Information
  • 40. © Air Force Association Discussion 39 Scenario 5: Privileged Information
  • 41. NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT Scenario 6 Responsible Actions
  • 42. Joel is a competitor in the CyberPatriot National Finals Competition. During the competition you can overhear a member of another team talking from across another partition. You’re not actively trying to hear his conversation, but he is a little louder than the others, and his voice projects rather well. 41 Scenario 6: Responsible Actions
  • 43. You overhear him suggest checking a port number that you didn’t think about, and it inspires you to check the same port for vulnerability. The CyberPatriot Rules Book states that you should receive no outside assistance which includes direct and indirect advice. 42 Scenario 6: Responsible Actions
  • 44. 1. Is Joel obligated to report what he has overheard? Why or why not? 2. What if Joel tells the participant to quiet down and that he can hear him talking? Does that exculpate Joel from what he has overheard? 43 Scenario 6: Responsible Actions
  • 46. • Understand what ethics are and why they are important • Understand how to act ethically • Understand the responsibility that comes with knowing and using cybersecurity principles • Understand how to apply ethics to real-world situations Summary 45